ldyyg 发表于 2018-2-8 11:29:28

RT-AC88U无网络

RT-AC88U,A5版本,升级3.0.0.4.384_20308后WAN口互联网连接正常,实际各个客户端(包括有线和无线)均无网络,重启就好了,然不足24小时,又会出现上述问题,求助各位大佬怎么解决啊?

Master 发表于 2018-2-8 13:43:40

把你的系统日志和设定档传上来

Sprite 发表于 2018-2-8 13:58:33

将你WAN页面的internet detected选项开启,选择PPP echo看看

ldyyg 发表于 2018-2-8 19:14:08

Master 发表于 2018-2-8 13:43
把你的系统日志和设定档传上来

Feb 14 00:00:25 syslogd started: BusyBox v1.17.4
Feb 14 00:00:25 kernel: klogd started: BusyBox v1.17.4 (2018-01-25 20:31:57 CST)
Feb 14 00:00:25 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Jan 25 20:41:22 CST 2018
Feb 14 00:00:25 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 00:00:25 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 00:00:25 kernel: Machine: Northstar Prototype
Feb 14 00:00:25 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 00:00:25 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 00:00:25 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 00:00:25 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 00:00:25 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 00:00:25 kernel: Virtual kernel memory layout:
Feb 14 00:00:25 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 00:00:25 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 00:00:25 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 00:00:25 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 00:00:25 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 00:00:25 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 00:00:25 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 00:00:25 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 00:00:25 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 00:00:25 kernel: * Invalid signature of oopsbuf: C5-41-00-28-40-40-40-00 (len 4210688)
Feb 14 00:00:25 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 00:00:25 kernel: Mount-cache hash table entries: 512
Feb 14 00:00:25 kernel: CPU1: Booted secondary processor
Feb 14 00:00:25 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 00:00:25 kernel: Total size:128MB
Feb 14 00:00:25 kernel: Block size:128KB
Feb 14 00:00:25 kernel: Page Size:   2048B
Feb 14 00:00:25 kernel: OOB Size:    64B
Feb 14 00:00:25 kernel: Sector size: 512B
Feb 14 00:00:25 kernel: Spare size:16B
Feb 14 00:00:25 kernel: ECC level:   8 (8-bit)
Feb 14 00:00:25 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 00:00:25 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 00:00:25 kernel: bio: create slab <bio-0> at 0
Feb 14 00:00:25 kernel: PCI: no core
Feb 14 00:00:25 kernel: PCI: no core
Feb 14 00:00:25 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 1
Feb 14 00:00:26 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 1
Feb 14 00:00:26 nat: apply redirect rules
Feb 14 00:00:26 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 00:00:26 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 00:00:26 kernel: pflash: found no supported devices
Feb 14 00:00:26 kernel: bcmsflash: found no supported devices
Feb 14 00:00:26 kernel: Boot partition size = 524288(0x80000)
Feb 14 00:00:26 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 00:00:26 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 00:00:26 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 00:00:26 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 00:00:26 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 00:00:26 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 00:00:26 kernel: 0x0000003bfe80-0x000004000000 : "rootfs"
Feb 14 00:00:26 kernel: === PPTP init ===
Feb 14 00:00:26 kernel: Registering the dns_resolver key type
Feb 14 00:00:26 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 00:00:26 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 00:00:26 kernel: Available 7 bytes at (off,len):
Feb 14 00:00:26 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 00:00:26 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 00:00:26 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 00:00:26 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 00:00:26 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 00:00:26 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 00:00:26 kernel: Disabling lock debugging due to kernel taint
Feb 14 00:00:26 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 00:00:26 kernel: rtk port_phyEnableAll ok
Feb 14 00:00:26 kernel: register rtl8365mb done (link down at first)
Feb 14 00:00:26 kernel: et_module_init: passivemode set to 0x0
Feb 14 00:00:26 kernel: et_module_init: txworkq set to 0x0
Feb 14 00:00:26 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 00:00:26 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 00:00:26 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 00:00:26 kernel: dpsta_init: msglevel set to 0x1
Feb 14 00:00:26 kernel: dpsta_init: fail to get ifnames!
Feb 14 00:00:26 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:26 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 00:00:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:80 started
Feb 14 00:00:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:26 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:26 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:26 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 00:00:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:84 started
Feb 14 00:00:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:26 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:26 dnsmasq: warning: no upstream servers configured
Feb 14 00:00:26 kernel: reset usb phy..
Feb 14 00:00:26 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 00:00:26 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 00:00:26 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 00:00:27 RT-AC88U: start httpd
Feb 14 00:00:27 kernel: Empty flash at 0x005c0bb8 ends at 0x005c1000
Feb 14 00:00:27 kernel: jffs2_scan_eraseblock(): Node at 0x005d97f8 {0x1985, 0xe002, 0x00000044) has invalid CRC 0xffffffff (calculated 0x98f7fb1d)
Feb 14 00:00:27 kernel: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x005d97fc: 0x0044 instead
Feb 14 00:00:27 kernel: rtk port_phyEnableAll (on) ok
Feb 14 00:00:27 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 00:00:27 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 00:00:27 syslog: Generating SSL certificate...
Feb 14 00:00:29 NAT Tunnel: AAE Service is stopped
Feb 14 00:00:29 AAE: AAE Service is started
Feb 14 00:00:29 jffs2: valid logs(1)
Feb 14 00:00:29 hour monitor: daemon is starting
Feb 14 00:00:29 disk monitor: be idle
Feb 14 00:00:29 hour monitor: daemon terminates
Feb 14 00:00:30 miniupnpd: version 1.9 started
Feb 14 00:00:30 miniupnpd: HTTP listening on port 47027
Feb 14 00:00:30 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:30 Mastiff: init
Feb 14 00:00:30 kernel: dhd_detach(): thread:dhd_watchdog_thread:84 terminated OK
Feb 14 00:00:30 kernel: dhd_detach(): thread:dhd_watchdog_thread:80 terminated OK
Feb 14 00:00:31 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:00:33 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:33 kernel: dhd_attach(): thread:dhd_watchdog_thread:206 started
Feb 14 00:00:34 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:34 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:34 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:34 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:34 kernel: dhd_attach(): thread:dhd_watchdog_thread:20a started
Feb 14 00:00:35 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:35 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:35 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:38 wan: ==
Feb 14 00:00:38 wan: udhcpc done
Feb 14 00:00:38 rc_service: udhcpc 601:notify_rc start_firewall
Feb 14 00:00:38 wan: finish adding multi routes
Feb 14 00:00:38 rc_service: udhcpc 601:notify_rc stop_upnp
Feb 14 00:00:38 rc_service: waitting "start_firewall" via udhcpc ...
Feb 14 00:00:40 WAN Connection: WAN was restored.
Feb 14 00:00:43 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 00:00:43 syslog: module leds-usb not found in modules.dep
Feb 14 00:00:43 kernel: SCSI subsystem initialized
Feb 14 00:00:44 miniupnpd: shutting down MiniUPnPd
Feb 14 00:00:44 nat: apply redirect rules
Feb 14 00:00:51 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 00:00:51 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 00:00:51 miniupnpd: version 1.9 started
Feb 14 00:00:51 miniupnpd: HTTP listening on port 37435
Feb 14 00:00:51 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:51 rc_service: udhcpc 601:notify_rc start_upnp
Feb 14 00:00:51 rc_service: waitting "stop_upnp" via udhcpc ...
Feb 14 00:00:51 miniupnpd: shutting down MiniUPnPd
Feb 14 00:00:53 miniupnpd: version 1.9 started
Feb 14 00:00:53 miniupnpd: HTTP listening on port 49460
Feb 14 00:00:53 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:58 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:03:04 roamast: eth1: add client to monitor list
Feb 14 00:00:15 syslogd started: BusyBox v1.17.4
Feb 14 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2018-01-25 20:31:57 CST)
Feb 14 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Jan 25 20:41:22 CST 2018
Feb 14 00:00:15 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 00:00:15 kernel: Machine: Northstar Prototype
Feb 14 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 00:00:15 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 00:00:15 kernel: Virtual kernel memory layout:
Feb 14 00:00:15 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 00:00:15 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 00:00:15 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 00:00:15 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 00:00:15 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 00:00:15 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 00:00:15 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 00:00:15 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 00:00:15 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 00:00:15 kernel: * Invalid signature of oopsbuf: E1-45-A0-28-48-C0-D0-30 (len 283332946)
Feb 14 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 00:00:15 kernel: Mount-cache hash table entries: 512
Feb 14 00:00:16 kernel: CPU1: Booted secondary processor
Feb 14 00:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 00:00:16 kernel: Total size:128MB
Feb 14 00:00:16 kernel: Block size:128KB
Feb 14 00:00:16 kernel: Page Size:   2048B
Feb 14 00:00:16 kernel: OOB Size:    64B
Feb 14 00:00:16 kernel: Sector size: 512B
Feb 14 00:00:16 kernel: Spare size:16B
Feb 14 00:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 00:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 00:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 00:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 00:00:16 kernel: PCI: no core
Feb 14 00:00:16 kernel: PCI: no core
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 1
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 1
Feb 14 00:00:16 nat: apply redirect rules
Feb 14 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 00:00:16 kernel: pflash: found no supported devices
Feb 14 00:00:16 kernel: bcmsflash: found no supported devices
Feb 14 00:00:16 kernel: Boot partition size = 524288(0x80000)
Feb 14 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 00:00:16 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 00:00:16 kernel: 0x0000003bfe80-0x000004000000 : "rootfs"
Feb 14 00:00:16 kernel: === PPTP init ===
Feb 14 00:00:17 kernel: Registering the dns_resolver key type
Feb 14 00:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 00:00:17 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 00:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 00:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 00:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 00:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 00:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 00:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 00:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 00:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 00:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 00:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 00:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 00:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 00:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 00:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 00:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 00:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 00:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 00:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 00:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 00:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 00:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:17 kernel: reset usb phy..
Feb 14 00:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 00:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 00:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 00:00:17 kernel: Empty flash at 0x005c0bb8 ends at 0x005c1000
Feb 14 00:00:17 kernel: jffs2_scan_eraseblock(): Node at 0x005d97f8 {0x1985, 0xe002, 0x00000044) has invalid CRC 0xe0011985 (calculated 0x98f7fb1d)
Feb 14 00:00:17 kernel: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x005d97fc: 0x0044 instead
Feb 14 00:00:17 kernel: JFFS2 notice: (233) check_node_data: wrong data CRC in data node at 0x00106f7c: read 0xe8a14997, calculated 0x597f6c69.
Feb 14 00:00:19 dnsmasq: warning: no upstream servers configured
Feb 14 00:00:19 kernel: rtk port_phyEnableAll (on) ok
Feb 14 00:00:19 RT-AC88U: start httpd
Feb 14 00:00:20 syslog: Generating SSL certificate...
Feb 14 00:00:20 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 00:00:20 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 00:00:21 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:00:22 NAT Tunnel: AAE Service is stopped
Feb 14 00:00:22 AAE: AAE Service is started
Feb 14 00:00:22 disk monitor: be idle
Feb 14 00:00:22 hour monitor: daemon is starting
Feb 14 00:00:22 jffs2: valid logs(1)
Feb 14 00:00:22 hour monitor: daemon terminates
Feb 14 00:00:22 miniupnpd: version 1.9 started
Feb 14 00:00:22 miniupnpd: HTTP listening on port 33538
Feb 14 00:00:22 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:22 Mastiff: init
Feb 14 00:00:22 wan: ==
Feb 14 00:00:22 wan: udhcpc done
Feb 14 00:00:23 rc_service: udhcpc 442:notify_rc start_firewall
Feb 14 00:00:23 wan: finish adding multi routes
Feb 14 00:00:23 rc_service: udhcpc 442:notify_rc stop_upnp
Feb 14 00:00:23 rc_service: waitting "start_firewall" via udhcpc ...
Feb 14 00:00:27 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 00:00:27 syslog: module leds-usb not found in modules.dep
Feb 14 00:00:27 kernel: SCSI subsystem initialized
Feb 14 00:00:28 WAN Connection: WAN was restored.
Feb 14 00:00:29 miniupnpd: shutting down MiniUPnPd
Feb 14 00:00:29 nat: apply redirect rules
Feb 14 00:00:35 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 00:00:35 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 00:00:36 miniupnpd: version 1.9 started
Feb 14 00:00:36 miniupnpd: HTTP listening on port 41741
Feb 14 00:00:36 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:36 rc_service: udhcpc 442:notify_rc start_upnp
Feb 14 00:00:36 rc_service: waitting "stop_upnp" via udhcpc ...
Feb 14 00:00:36 miniupnpd: shutting down MiniUPnPd
Feb 14 00:00:37 miniupnpd: version 1.9 started
Feb 14 00:00:37 miniupnpd: HTTP listening on port 60835
Feb 14 00:00:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:42 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:04:55 rc_service: httpd 363:notify_rc start_autodet
Feb 14 00:05:15 rc_service: httpd 363:notify_rc start_autodet
Feb 14 00:06:13 rc_service: httpd 363:notify_rc restart_wan_if 0
Feb 14 00:06:13 wan: udhcpc done
Feb 14 00:06:14 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:06:16 wan: ==
Feb 14 00:06:16 wan: udhcpc done
Feb 14 00:06:16 pppd: pppd 2.4.7 started by admin, uid 0
Feb 14 00:06:16 rc_service: udhcpc 697:notify_rc start_firewall
Feb 14 00:06:16 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:06:16 miniupnpd: shutting down MiniUPnPd
Feb 14 00:06:16 nat: apply redirect rules
Feb 14 00:06:17 WAN Connection: Fail to connect with some issues.
Feb 14 00:06:17 miniupnpd: version 1.9 started
Feb 14 00:06:17 miniupnpd: HTTP listening on port 37056
Feb 14 00:06:17 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:06:21 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 00:06:21 pppd: Connect: ppp0 <--> eth0
Feb 14 00:06:21 pppd: PAP authentication succeeded
Feb 14 00:06:21 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 00:06:22 pppd: localIP address 106.45.236.126
Feb 14 00:06:22 pppd: remote IP address 106.45.236.1
Feb 14 00:06:22 pppd: primary   DNS address 118.118.118.11
Feb 14 00:06:22 pppd: secondary DNS address 202.100.96.68
Feb 14 00:06:22 rc_service: ip-up 734:notify_rc start_firewall
Feb 14 00:06:22 miniupnpd: shutting down MiniUPnPd
Feb 14 00:06:23 wan: finish adding multi routes
Feb 14 08:06:23 rc_service: ip-up 734:notify_rc stop_upnp
Feb 14 08:06:23 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 00:06:23 nat: apply redirect rules
Feb 14 00:06:23 miniupnpd: version 1.9 started
Feb 14 00:06:23 miniupnpd: HTTP listening on port 48713
Feb 14 00:06:23 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:06:24 rc_service: ip-up 734:notify_rc start_upnp
Feb 14 08:06:24 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 00:06:24 miniupnpd: shutting down MiniUPnPd
Feb 14 00:06:24 WAN Connection: WAN was restored.
Feb 14 00:06:25 miniupnpd: version 1.9 started
Feb 14 00:06:25 miniupnpd: HTTP listening on port 49114
Feb 14 00:06:25 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:06:27 rc_service: httpd 363:notify_rc start_webs_update
Feb 14 00:06:29 ntp: start NTP update
Feb4 10:40:57 rc_service: ntp 459:notify_rc restart_upnp
Feb4 02:40:57 miniupnpd: shutting down MiniUPnPd
Feb4 02:40:58 miniupnpd: version 1.9 started
Feb4 02:40:58 miniupnpd: HTTP listening on port 58194
Feb4 02:40:58 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:40:59 rc_service: ntp 459:notify_rc restart_diskmon
Feb4 02:40:59 disk_monitor: Finish
Feb4 02:40:59 disk monitor: be idle
Feb4 02:41:30 crond: time disparity of 511355 minutes detected
Feb 14 08:00:15 syslogd started: BusyBox v1.17.4
Feb 14 08:00:15 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:15 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:15 kernel: Machine: Northstar Prototype
Feb 14 08:00:15 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 08:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:15 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:15 kernel: Virtual kernel memory layout:
Feb 14 08:00:15 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:15 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:15 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:15 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:15 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:15 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 08:00:15 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:15 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:15 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:15 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:15 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:128MB
Feb 14 08:00:16 kernel: Block size:128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:16 kernel: pflash: found no supported devices
Feb 14 08:00:16 kernel: bcmsflash: found no supported devices
Feb 14 08:00:16 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:16 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:16 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:16 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:16 nat: apply redirect rules
Feb 14 08:00:16 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:17 kernel: Empty flash at 0x001073e4 ends at 0x00107800
Feb 14 08:00:17 kernel: from 80000000, local len(2232)
Feb 14 08:00:17 kernel: _ Reboot message ... _______________________________________________________
Feb 14 08:00:17 kernel: <0>Restarting system.
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable ��ead fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, sizeto read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, sie to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5,
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cache entUnable to read page, block 1adf1 Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adr: Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS e 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cFS error: Unable to read page, bHFS error: Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUAment cache entry
Feb 14 08:00:17 kernel: <3>SQe, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SSQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read<3>SQUASHFS error: Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to r5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: ____________________________________________________________________________
Feb 14 08:00:19 dnsmasq: warning: no upstream servers configured
Feb 14 08:00:19 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:19 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:20 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:20 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:21 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:22 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:22 AAE: AAE Service is started
Feb 14 08:00:22 jffs2: valid logs(1)
Feb 14 08:00:22 hour monitor: daemon is starting
Feb 14 08:00:22 hour monitor: daemon terminates
Feb 14 08:00:22 disk monitor: be idle
Feb 14 08:00:22 miniupnpd: version 1.9 started
Feb 14 08:00:22 miniupnpd: HTTP listening on port 60025
Feb 14 08:00:22 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:22 Mastiff: init
Feb 14 08:00:23 wan: ==
Feb 14 08:00:23 wan: udhcpc done
Feb 14 08:00:23 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:23 rc_service: udhcpc 442:notify_rc start_firewall
Feb 14 08:00:23 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 08:00:23 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:23 pppd: Connect: ppp0 <--> eth0
Feb 14 08:00:26 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:26 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:26 kernel: SCSI subsystem initialized
Feb 14 08:00:27 pppd: PAP authentication succeeded
Feb 14 08:00:27 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:27 pppd: localIP address 106.45.236.181
Feb 14 08:00:27 pppd: remote IP address 106.45.236.1
Feb 14 08:00:27 pppd: primary   DNS address 118.118.118.11
Feb 14 08:00:27 pppd: secondary DNS address 202.100.96.68
Feb 14 08:00:27 rc_service: ip-up 542:notify_rc start_firewall
Feb 14 08:00:27 rc_service: waitting "start_firewall" via...
Feb 14 08:00:28 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:28 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:30 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:30 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:30 miniupnpd: version 1.9 started
Feb 14 08:00:30 miniupnpd: HTTP listening on port 38787
Feb 14 08:00:30 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:31 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:31 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:31 wan: finish adding multi routes
Feb 14 08:00:31 rc_service: ip-up 542:notify_rc stop_upnp
Feb 14 08:00:31 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:31 miniupnpd: version 1.9 started
Feb 14 08:00:31 miniupnpd: HTTP listening on port 55150
Feb 14 08:00:31 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:32 WAN Connection: WAN was restored.
Feb 14 08:00:32 rc_service: ip-up 542:notify_rc start_upnp
Feb 14 08:00:32 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:32 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:33 miniupnpd: version 1.9 started
Feb 14 08:00:33 miniupnpd: HTTP listening on port 57258
Feb 14 08:00:33 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:34 ntp: start NTP update
Feb4 10:46:41 rc_service: ntp 636:notify_rc restart_upnp
Feb4 10:46:41 miniupnpd: shutting down MiniUPnPd
Feb4 10:46:41 rc_service: ntp 636:notify_rc restart_diskmon
Feb4 10:46:41 disk_monitor: Finish
Feb4 10:46:41 miniupnpd: version 1.9 started
Feb4 10:46:41 miniupnpd: HTTP listening on port 34032
Feb4 10:46:41 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:46:42 disk monitor: be idle
Feb4 10:47:08 crond: time disparity of 511366 minutes detected
Feb4 10:47:10 roamast: eth2: add client to monitor list
Feb4 10:48:17 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb4 10:48:17 Mastiff: select error
Feb4 10:48:17 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb4 10:48:17 Mastiff: select error
Feb4 10:48:17 rc_service: httpd 363:notify_rc restart_ddns
Feb4 10:48:17 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 10:48:17 ddns update: ez-ipupdate: starting...
Feb4 10:48:17 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 10:48:18 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:48:17 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 10:48:18 ddns update: retval= 0, ddns_return_code (,200)
Feb4 10:48:18 ddns update: asusddns_update: 0
Feb4 10:48:18 ddns: ddns update ok
Feb4 10:48:36 watchdog: start ddns.
Feb4 10:48:36 rc_service: watchdog 367:notify_rc restart_ddns
Feb4 10:48:36 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 10:48:36 rc_service: httpd 363:notify_rc restart_firewall
Feb4 10:48:37 ddns update: ez-ipupdate: starting...
Feb4 10:48:37 miniupnpd: shutting down MiniUPnPd
Feb4 10:48:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:48:37 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 10:48:37 miniupnpd: version 1.9 started
Feb4 10:48:37 miniupnpd: HTTP listening on port 60127
Feb4 10:48:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:48:38 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:48:36 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 10:48:38 ddns update: retval= 0, ddns_return_code (,200)
Feb4 10:48:38 ddns update: asusddns_update: 0
Feb4 10:48:39 ddns: ddns update ok
Feb4 10:49:33 rc_service: cfg_server 1006:notify_rc restart_wireless
Feb4 10:49:36 kernel: dhd_detach(): thread:dhd_watchdog_thread:7e terminated OK
Feb4 10:49:36 kernel: dhd_detach(): thread:dhd_watchdog_thread:7a terminated OK
Feb4 10:49:40 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:49:40 kernel: dhd_attach(): thread:dhd_watchdog_thread:449 started
Feb4 10:49:41 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:49:41 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:49:41 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb4 10:49:41 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:49:41 kernel: dhd_attach(): thread:dhd_watchdog_thread:451 started
Feb4 10:49:42 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:49:42 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:49:42 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:50:03 rc_service: cfg_server 1225:notify_rc restart_wireless
Feb4 10:50:05 lldpd: unable to send packet on real device for eth1: Network is down
Feb4 10:50:05 lldpd: unable to send packet on real device for eth2: No such device or address
Feb4 10:50:05 kernel: dhd_detach(): thread:dhd_watchdog_thread:451 terminated OK
Feb4 10:50:05 kernel: dhd_detach(): thread:dhd_watchdog_thread:449 terminated OK
Feb4 10:50:09 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:50:09 kernel: dhd_attach(): thread:dhd_watchdog_thread:522 started
Feb4 10:50:09 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:50:09 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:50:09 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb4 10:50:09 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:50:10 kernel: dhd_attach(): thread:dhd_watchdog_thread:527 started
Feb4 10:50:10 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:50:10 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:50:10 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:50:35 WAN Connection: Fail to connect with some issues.
Feb4 10:50:36 DualWAN: skip single wan wan_led_control - WANRED off
Feb4 10:50:36 nat: apply redirect rules
Feb4 10:50:36 pppd: Connection terminated.
Feb4 10:50:36 pppd: Modem hangup
Feb4 10:50:46 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb4 10:50:46 pppd: Connect: ppp0 <--> eth0
Feb4 10:50:46 pppd: PAP authentication succeeded
Feb4 10:50:46 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb4 10:50:47 pppd: localIP address 106.45.237.16
Feb4 10:50:47 pppd: remote IP address 106.45.236.1
Feb4 10:50:47 pppd: primary   DNS address 118.118.118.11
Feb4 10:50:47 pppd: secondary DNS address 202.100.96.68
Feb4 10:50:47 rc_service: ip-up 1437:notify_rc start_firewall
Feb4 10:50:47 miniupnpd: shutting down MiniUPnPd
Feb4 10:50:47 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:50:47 wan: finish adding multi routes
Feb4 10:50:47 ntp: start NTP update
Feb4 10:50:47 rc_service: ip-up 1437:notify_rc stop_upnp
Feb4 10:50:47 rc_service: waitting "start_firewall" via ip-up ...
Feb4 10:50:48 miniupnpd: version 1.9 started
Feb4 10:50:48 miniupnpd: HTTP listening on port 40870
Feb4 10:50:48 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:50:48 rc_service: ip-up 1437:notify_rc start_upnp
Feb4 10:50:48 rc_service: waitting "stop_upnp" via ip-up ...
Feb4 10:50:48 miniupnpd: shutting down MiniUPnPd
Feb4 10:50:49 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 10:50:50 miniupnpd: version 1.9 started
Feb4 10:50:50 miniupnpd: HTTP listening on port 57985
Feb4 10:50:50 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:50:50 ddns update: ez-ipupdate: starting...
Feb4 10:50:50 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 10:50:51 WAN Connection: WAN was restored.
Feb4 10:50:52 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:50:50 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 10:50:52 ddns update: retval= 0, ddns_return_code (,200)
Feb4 10:50:52 ddns update: asusddns_update: 0
Feb4 10:50:52 ddns: ddns update ok
Feb4 10:51:11 rc_service: httpd 363:notify_rc restart_net_and_phy
Feb4 10:51:13 iTunes: daemon is stoped
Feb4 10:51:13 FTP Server: daemon is stoped
Feb4 10:51:14 Samba Server: smb daemon is stoped
Feb4 10:51:14 kernel: gro disabled
Feb4 10:51:14 miniupnpd: shutting down MiniUPnPd
Feb4 10:51:16 pppd: Connection terminated.
Feb4 10:51:16 wan: udhcpc done
Feb4 10:51:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:51:21 kernel: dhd_detach(): thread:dhd_watchdog_thread:527 terminated OK
Feb4 10:51:22 kernel: dhd_detach(): thread:dhd_watchdog_thread:522 terminated OK
Feb4 10:51:24 kernel: rtk port_phyEnableAll (off) ok
Feb4 10:51:25 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:51:25 kernel: dhd_attach(): thread:dhd_watchdog_thread:65c started
Feb4 10:51:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:51:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:51:26 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb4 10:51:26 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:51:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:660 started
Feb4 10:51:27 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:51:27 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:51:27 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:51:29 nat: apply redirect rules
Feb4 10:51:29 dnsmasq: warning: no upstream servers configured
Feb4 10:51:29 wan: ==
Feb4 10:51:29 wan: udhcpc done
Feb4 10:51:29 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb4 10:51:29 rc_service: udhcpc 1710:notify_rc start_firewall
Feb4 10:51:29 rc_service: waitting "restart_net_and_phy" via...
Feb4 10:51:29 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb4 10:51:29 pppd: Connect: ppp0 <--> eth0
Feb4 10:51:29 pppd: PAP authentication succeeded
Feb4 10:51:29 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb4 10:51:29 pppd: localIP address 106.45.237.16
Feb4 10:51:29 pppd: remote IP address 106.45.236.1
Feb4 10:51:29 pppd: primary   DNS address 118.118.118.11
Feb4 10:51:29 pppd: secondary DNS address 202.100.96.68
Feb4 10:51:29 rc_service: ip-up 1715:notify_rc start_firewall
Feb4 10:51:29 rc_service: waitting "restart_net_and_phy" via...
Feb4 10:51:32 kernel: rtk port_phyEnableAll (on) ok
Feb4 10:51:32 miniupnpd: version 1.9 started
Feb4 10:51:32 miniupnpd: HTTP listening on port 43249
Feb4 10:51:32 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:51:32 RT-AC88U: start httpd
Feb4 10:51:33 syslog: Generating SSL certificate...
Feb4 10:51:33 wan: finish adding multi routes
Feb4 10:51:33 WAN Connection: WAN was exceptionally disconnected.
Feb4 10:51:34 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb4 10:51:35 miniupnpd: shutting down MiniUPnPd
Feb4 10:51:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:51:35 WAN Connection: WAN was restored.
Feb4 10:51:36 miniupnpd: version 1.9 started
Feb4 10:51:36 miniupnpd: HTTP listening on port 42260
Feb4 10:51:36 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:51:37 miniupnpd: shutting down MiniUPnPd
Feb4 10:51:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:51:37 wan: finish adding multi routes
Feb4 10:51:37 rc_service: ip-up 1715:notify_rc stop_upnp
Feb4 10:51:37 rc_service: waitting "start_firewall" via ip-up ...
Feb4 10:51:38 miniupnpd: version 1.9 started
Feb4 10:51:38 miniupnpd: HTTP listening on port 48268
Feb4 10:51:38 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:51:38 rc_service: ip-up 1715:notify_rc start_upnp
Feb4 10:51:38 rc_service: waitting "stop_upnp" via ip-up ...
Feb4 10:51:38 miniupnpd: shutting down MiniUPnPd
Feb4 10:51:39 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 10:51:39 ddns update: ez-ipupdate: starting...
Feb4 10:51:39 miniupnpd: version 1.9 started
Feb4 10:51:39 miniupnpd: HTTP listening on port 58065
Feb4 10:51:39 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:51:43 ntp: start NTP update
Feb4 10:51:45 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 10:51:45 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:51:44 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 10:51:45 ddns update: retval= 0, ddns_return_code (,200)
Feb4 10:51:45 ddns update: asusddns_update: 0
Feb4 10:51:45 ddns: ddns update ok
Feb4 10:55:43 rc_service: cfg_server 1985:notify_rc restart_wireless;restart_qos;restart_firewall;
Feb4 10:55:45 kernel: dhd_detach(): thread:dhd_watchdog_thread:660 terminated OK
Feb4 10:55:45 kernel: dhd_detach(): thread:dhd_watchdog_thread:65c terminated OK
Feb4 10:55:49 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:55:49 kernel: dhd_attach(): thread:dhd_watchdog_thread:811 started
Feb4 10:55:50 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:55:50 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:55:50 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb4 10:55:50 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:55:50 kernel: dhd_attach(): thread:dhd_watchdog_thread:815 started
Feb4 10:55:51 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:55:51 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:55:51 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:55:52 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:55:58 miniupnpd: shutting down MiniUPnPd
Feb4 10:55:58 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:55:58 miniupnpd: version 1.9 started
Feb4 10:55:58 miniupnpd: HTTP listening on port 46637
Feb4 10:55:58 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:58:57 roamast: wl1.1: add client to monitor list
Feb4 11:00:42 disk_monitor: Got SIGALRM...
Feb4 11:01:07 roamast: eth1: add client to monitor list
Feb4 11:17:02 roamast: eth2: add client to monitor list
Feb4 11:17:26 Mastiff: Got AAE_SIG_EULA_FLAG_SIGNED
Feb4 11:17:26 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb4 11:17:26 Mastiff: select error
Feb4 11:17:41 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 11:17:41 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 11:17:42 kernel: sizeof forward pkt param = 192
Feb4 11:17:42 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb4 11:17:42 miniupnpd: shutting down MiniUPnPd
Feb4 11:17:43 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 11:17:44 miniupnpd: version 1.9 started
Feb4 11:17:44 miniupnpd: HTTP listening on port 50142
Feb4 11:17:44 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 11:17:46 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 20030 is big. Consider r2q change.
Feb4 11:17:48 kernel:*** ERROR: tdts_core_rule_parsing_trf_load() fail!
Feb4 11:17:49 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 11:17:49 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 11:17:49 kernel: sizeof forward pkt param = 192
Feb4 11:17:55 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb4 11:17:56 miniupnpd: shutting down MiniUPnPd
Feb4 11:17:56 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 11:17:56 miniupnpd: version 1.9 started
Feb4 11:17:57 kernel: tdts_udb: Unknown parameter `161'
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_ct_event_handler (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_devid_un_bootp (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_policy_match (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_usr_msg_handler (err 0)
Feb4 11:17:58 miniupnpd: HTTP listening on port 32962
Feb4 11:17:58 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_wan_detection (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol dev_wan (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol mode (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_unregister_qos_ops (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_get_action (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_devid_un_http_ua (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_do_fastpath_action (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_qos_data (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_register_qos_ops (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_reg_func_find_ct (err 0)
Feb4 11:17:58 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 11:17:59 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 11:17:59 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 11:17:59 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 11:17:59 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb4 11:18:11 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 11:18:11 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 11:18:11 kernel: sizeof forward pkt param = 192
Feb4 11:18:24 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 11:18:25 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 11:18:25 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 11:18:25 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 11:18:25 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb4 11:18:25 rc_service: bwdpi_check 415:notify_rc start_firewall
Feb4 11:18:25 miniupnpd: shutting down MiniUPnPd
Feb4 11:18:25 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 11:18:26 miniupnpd: version 1.9 started
Feb4 11:18:26 miniupnpd: HTTP listening on port 36449
Feb4 11:18:26 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 11:34:22 roamast: wl1.1: add client to monitor list
Feb4 11:57:07 roamast: wl1.1: add client to monitor list
Feb4 12:02:11 rc_service: httpd 1741:notify_rc restart_wan_if 0
Feb4 12:02:11 pppd: Connection terminated.
Feb4 12:02:12 wan: udhcpc done
Feb4 12:02:14 wan: ==
Feb4 12:02:14 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb4 12:02:14 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb4 12:02:15 pppd: Connect: ppp0 <--> eth0
Feb4 12:02:15 pppd: PAP authentication succeeded
Feb4 12:02:15 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb4 12:02:15 pppd: localIP address 14.135.64.229
Feb4 12:02:15 pppd: remote IP address 14.135.64.1
Feb4 12:02:15 pppd: primary   DNS address 118.118.118.11
Feb4 12:02:15 pppd: secondary DNS address 202.100.96.68
Feb4 12:02:15 rc_service: ip-up 4646:notify_rc start_firewall
Feb4 12:02:16 miniupnpd: delete_filter_rule() : iptc_commit(): Resource temporarily unavailable
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9906 -> 192.168.1.100:9906 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9907 -> 192.168.1.100:9907 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9908 -> 192.168.1.100:9908 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8730 -> 192.168.1.100:8730 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 51417 -> 192.168.1.100:51417 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 51417 -> 192.168.1.100:51417 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8001 -> 192.168.1.100:8001 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 21000 -> 192.168.1.100:21000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9800 -> 192.168.1.100:9800 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9802 -> 192.168.1.100:9802 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 38000 -> 192.168.1.100:38000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 44300 -> 192.168.1.100:44300 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 3306 -> 192.168.1.100:3306 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 1868 -> 192.168.1.100:1868 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 22220 -> 192.168.1.100:22220 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8000 -> 192.168.1.100:8000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8809 -> 192.168.1.100:8809 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8200 -> 192.168.1.100:8200 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8200 -> 192.168.1.100:8200 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 5001 -> 192.168.1.100:5001 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 5001 -> 192.168.1.100:5001 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 3689 -> 192.168.1.100:3689 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 3689 -> 192.168.1.100:3689 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8008 -> 192.168.1.100:8008 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8008 -> 192.168.1.100:8008 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8009 -> 192.168.1.100:8009 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8009 -> 192.168.1.100:8009 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8010 -> 192.168.1.100:8010 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8010 -> 192.168.1.100:8010 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8011 -> 192.168.1.100:8011 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8011 -> 192.168.1.100:8011 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8012 -> 192.168.1.100:8012 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8012 -> 192.168.1.100:8012 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8807 -> 192.168.1.100:8807 protocol UDP
Feb4 12:02:16 wan: finish adding multi routes
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 5548 -> 192.168.1.100:5548 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 1884 -> 192.168.1.100:1884 protocol TCP
Feb4 12:02:16 rc_service: ip-up 4646:notify_rc stop_upnp
Feb4 12:02:16 rc_service: waitting "start_firewall" via ip-up ...
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 12000 -> 192.168.1.100:12000 protocol TCP
Feb4 12:02:16 ntp: start NTP update
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 14000 -> 192.168.1.100:14000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 60000 -> 192.168.1.100:60000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 36667 -> 192.168.1.100:36667 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 1828 -> 192.168.1.100:1828 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 1828 -> 192.168.1.100:1828 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9900 -> 192.168.1.100:9900 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9901 -> 192.168.1.100:9901 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9902 -> 192.168.1.100:9902 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9903 -> 192.168.1.100:9903 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9904 -> 192.168.1.100:9904 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9905 -> 192.168.1.100:9905 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9906 -> 192.168.1.100:9906 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9907 -> 192.168.1.100:9907 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9908 -> 192.168.1.100:9908 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8730 -> 192.168.1.100:8730 protocol TCP
Feb4 12:02:16 miniupnpd: shutting down MiniUPnPd
Feb4 12:02:16 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 12:02:17 miniupnpd: version 1.9 started
Feb4 12:02:17 miniupnpd: HTTP listening on port 40056
Feb4 12:02:17 rc_service: ip-up 4646:notify_rc start_upnp
Feb4 12:02:17 rc_service: waitting "stop_upnp" via ip-up ...
Feb4 12:02:17 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 12:02:17 miniupnpd: shutting down MiniUPnPd
Feb4 12:02:18 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 12:02:19 ddns update: ez-ipupdate: starting...
Feb4 12:02:19 miniupnpd: version 1.9 started
Feb4 12:02:19 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 12:02:19 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 04:02:18 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 12:02:19 ddns update: retval= 0, ddns_return_code (,200)
Feb4 12:02:19 ddns update: asusddns_update: 0
Feb4 12:02:19 miniupnpd: HTTP listening on port 56620
Feb4 12:02:19 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 12:02:19 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 12:02:19 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 12:02:19 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 12:02:19 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 12:02:19 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb4 12:02:20 ddns: ddns update ok
Feb4 12:02:26 rc_service: zcip 4743:notify_rc start_firewall
Feb4 12:02:26 zcip client: configured 169.254.72.55
Feb4 12:02:27 miniupnpd: shutting down MiniUPnPd
Feb4 12:02:27 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 12:02:27 miniupnpd: version 1.9 started
Feb4 12:02:27 miniupnpd: HTTP listening on port 49274
Feb4 12:02:27 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 12:51:32 roamast: wl1.1: add client to monitor list
Feb4 13:04:37 roamast: eth2: add client to monitor list
Feb4 13:06:26 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb4 13:06:26 miniupnpd: shutting down MiniUPnPd
Feb4 13:06:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 13:06:27 miniupnpd: version 1.9 started
Feb4 13:06:29 miniupnpd: HTTP listening on port 43318
Feb4 13:06:29 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 13:06:29 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 13:06:29 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 13:06:29 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 13:06:29 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 13:06:29 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 13:06:29 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 13:06:30 kernel: sizeof forward pkt param = 192
Feb4 13:06:47 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 13:06:47 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 13:06:47 kernel: sizeof forward pkt param = 192
Feb4 13:06:59 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 13:06:59 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 13:06:59 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 13:06:59 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 13:06:59 rc_service: bwdpi_check 415:notify_rc start_firewall
Feb4 13:06:59 miniupnpd: shutting down MiniUPnPd
Feb4 13:06:59 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 13:07:00 miniupnpd: version 1.9 started
Feb4 13:07:00 miniupnpd: HTTP listening on port 41162
Feb4 13:07:00 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 17:44:42 roamast: wl1.1: add client to monitor list
Feb4 18:31:52 roamast: eth2: add client to monitor list
Feb4 18:33:12 roamast: wl1.1: add client to monitor list
Feb4 23:00:42 disk_monitor: Got SIGALRM...
Feb4 23:03:32 roamast: eth1: add client to monitor list
Feb4 23:59:02 roamast: wl1.1: add client to monitor list
Feb5 00:02:16 ntp: start NTP update
Feb5 05:40:24 pppd: Connection terminated.
Feb5 05:40:25 pppd: Modem hangup
Feb5 05:40:25 WAN Connection: Fail to connect with some issues.
Feb5 05:40:26 DualWAN: skip single wan wan_led_control - WANRED off
Feb5 05:40:26 nat: apply redirect rules
Feb5 05:40:35 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb5 05:40:35 pppd: Connect: ppp0 <--> eth0
Feb5 05:40:35 pppd: PAP authentication succeeded
Feb5 05:40:35 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb5 05:40:35 pppd: localIP address 222.75.136.67
Feb5 05:40:35 pppd: remote IP address 222.75.136.1
Feb5 05:40:35 pppd: primary   DNS address 118.118.118.11
Feb5 05:40:35 pppd: secondary DNS address 202.100.96.68
Feb5 05:40:35 rc_service: ip-up 29037:notify_rc start_firewall
Feb5 05:40:36 wan: finish adding multi routes
Feb5 05:40:36 rc_service: ip-up 29037:notify_rc stop_upnp
Feb5 05:40:36 rc_service: waitting "start_firewall" via ip-up ...
Feb5 05:40:36 ntp: start NTP update
Feb5 05:40:36 wan: finish adding multi routes
Feb5 05:40:36 miniupnpd: shutting down MiniUPnPd
Feb5 05:40:36 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 05:40:37 miniupnpd: version 1.9 started
Feb5 05:40:37 rc_service: ip-up 29037:notify_rc start_upnp
Feb5 05:40:37 rc_service: waitting "stop_upnp" via ip-up ...
Feb5 05:40:37 miniupnpd: HTTP listening on port 58994
Feb5 05:40:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 05:40:37 miniupnpd: shutting down MiniUPnPd
Feb5 05:40:38 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb5 05:40:38 ddns update: ez-ipupdate: starting...
Feb5 05:40:38 miniupnpd: version 1.9 started
Feb5 05:40:38 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb5 05:40:39 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 21:40:38 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb5 05:40:39 ddns update: retval= 0, ddns_return_code (,200)
Feb5 05:40:39 ddns update: asusddns_update: 0
Feb5 05:40:39 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb5 05:40:39 miniupnpd: HTTP listening on port 33508
Feb5 05:40:39 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb5 05:40:39 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb5 05:40:39 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb5 05:40:39 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 05:40:39 ddns: ddns update ok
Feb5 05:40:41 WAN Connection: WAN was restored.
Feb5 05:40:42 ntp: start NTP update
Feb5 05:50:32 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb5 05:50:32 kernel: UDB Core Version: 0.2.14 r3529123
Feb5 05:50:32 kernel: sizeof forward pkt param = 192
Feb5 05:52:04 rc_service: httpd 1741:notify_rc restart_firewall
Feb5 05:52:04 rc_service: httpd 1741:notify_rc restart_firewall;restart_wrs
Feb5 05:52:04 rc_service: waitting "restart_firewall" via httpd ...
Feb5 05:52:04 miniupnpd: shutting down MiniUPnPd
Feb5 05:52:04 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 05:52:05 miniupnpd: version 1.9 started
Feb5 05:52:05 miniupnpd: HTTP listening on port 51495
Feb5 05:52:05 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 05:52:05 miniupnpd: shutting down MiniUPnPd
Feb5 05:52:05 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 05:52:06 miniupnpd: version 1.9 started
Feb5 05:52:06 miniupnpd: HTTP listening on port 44619
Feb5 05:52:06 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 05:52:12 hour monitor: daemon is starting
Feb5 07:22:12 roamast: wl1.1: add client to monitor list
Feb5 08:07:22 roamast: wl1.1: add client to monitor list
Feb5 08:48:42 roamast: wl1.1: add client to monitor list
Feb5 12:24:57 roamast: wl1.1: add client to monitor list
Feb5 14:09:02 pppd: Connection terminated.
Feb5 14:09:02 WAN Connection: Fail to connect with some issues.
Feb5 14:09:02 pppd: Modem hangup
Feb5 14:09:02 DualWAN: skip single wan wan_led_control - WANRED off
Feb5 14:09:03 miniupnpd: addnatrule() : iptc_commit() error : Invalid argument
Feb5 14:09:03 miniupnpd: Failed to redirect 36667 -> 192.168.1.100:36667 protocol UDP
Feb5 14:09:03 nat: apply redirect rules
Feb5 14:09:12 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb5 14:09:12 pppd: Connect: ppp0 <--> eth0
Feb5 14:09:12 pppd: PAP authentication succeeded
Feb5 14:09:12 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb5 14:09:12 pppd: localIP address 36.103.106.38
Feb5 14:09:12 pppd: remote IP address 36.103.104.1
Feb5 14:09:12 pppd: primary   DNS address 118.118.118.11
Feb5 14:09:12 pppd: secondary DNS address 202.100.96.68
Feb5 14:09:12 rc_service: ip-up 9681:notify_rc start_firewall
Feb5 14:09:13 wan: finish adding multi routes
Feb5 14:09:13 rc_service: ip-up 9681:notify_rc stop_upnp
Feb5 14:09:13 rc_service: waitting "start_firewall" via ip-up ...
Feb5 14:09:13 ntp: start NTP update
Feb5 14:09:12 WAN Connection: WAN was restored.
Feb5 14:09:12 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0) error!
Feb5 14:09:13 miniupnpd: shutting down MiniUPnPd
Feb5 14:09:13 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 14:09:13 miniupnpd: version 1.9 started
Feb5 14:09:14 rc_service: ip-up 9681:notify_rc start_upnp
Feb5 14:09:14 rc_service: waitting "stop_upnp" via ip-up ...
Feb5 14:09:16 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb5 14:09:16 ddns update: ez-ipupdate: starting...
Feb5 14:09:16 miniupnpd: version 1.9 started
Feb5 14:09:16 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb5 14:09:17 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Mon, 05 Feb 2018 06:09:16 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb5 14:09:17 ddns update: retval= 0, ddns_return_code (,200)
Feb5 14:09:17 ddns update: asusddns_update: 0
Feb5 14:09:18 ddns: ddns update ok
Feb5 14:09:21 miniupnpd: HTTP listening on port 34860
Feb5 14:09:21 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 14:09:22 rc_service: ip-up 9681:notify_rc start_firewall
Feb5 14:09:22 miniupnpd: shutting down MiniUPnPd
Feb5 14:09:22 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 14:09:22 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb5 14:09:22 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb5 14:09:22 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb5 14:09:22 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb5 14:09:23 miniupnpd: version 1.9 started
Feb5 14:09:25 miniupnpd: HTTP listening on port 52346
Feb5 14:09:25 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 17:59:41 roamast: wl1.1: add client to monitor list
Feb5 18:39:16 roamast: eth2: add client to monitor list
Feb5 18:57:01 roamast: eth1: add client to monitor list
Feb5 20:58:41 roamast: wl1.1: add client to monitor list
Feb5 21:00:01 roamast: wl1.1: add client to monitor list
Feb6 02:09:09 ntp: start NTP update
Feb6 07:40:16 roamast: wl1.1: add client to monitor list
Feb6 10:48:17 rc_service: rc 6671:notify_rc restart_wrs
Feb6 12:07:36 roamast: wl1.1: add client to monitor list
Feb6 12:35:36 roamast: wl1.1: add client to monitor list
Feb6 13:35:01 roamast: wl1.1: add client to monitor list
Feb6 14:09:09 ntp: start NTP update
Feb6 17:27:20 roamast: wl1.1: add client to monitor list
Feb6 18:00:15 roamast: wl1.1: add client to monitor list
Feb6 19:06:50 roamast: eth1: add client to monitor list
Feb6 19:39:59 miniupnpd: upnp_event_process_notify: connect(192.168.1.159:2869): No route to host
Feb6 20:51:24 miniupnpd: upnp_event_send: send(): Connection reset by peer
Feb7 02:09:06 ntp: start NTP update
Feb7 05:35:15 roamast: eth1: add client to monitor list
Feb7 06:13:18 WAN Connection: Fail to connect with some issues.
Feb7 06:13:18 DualWAN: skip single wan wan_led_control - WANRED off
Feb7 06:13:19 nat: apply redirect rules
Feb7 06:13:20 pppd: Connection terminated.
Feb7 06:13:20 pppd: Modem hangup
Feb7 06:13:30 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb7 06:13:30 pppd: Connect: ppp0 <--> eth0
Feb7 06:13:31 pppd: PAP authentication succeeded
Feb7 06:13:31 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb7 06:13:31 pppd: localIP address 111.113.210.229
Feb7 06:13:31 pppd: remote IP address 111.113.208.1
Feb7 06:13:31 pppd: primary   DNS address 118.118.118.11
Feb7 06:13:31 pppd: secondary DNS address 202.100.96.68
Feb7 06:13:31 rc_service: ip-up 3097:notify_rc start_firewall
Feb7 06:13:31 wan: finish adding multi routes
Feb7 06:13:31 rc_service: ip-up 3097:notify_rc stop_upnp
Feb7 06:13:31 rc_service: waitting "start_firewall" via ip-up ...
Feb7 06:13:31 ntp: start NTP update
Feb7 06:13:32 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 06:13:33 WAN Connection: WAN was restored.
Feb7 06:13:33 miniupnpd: version 1.9 started
Feb7 06:13:33 rc_service: ip-up 3097:notify_rc start_upnp
Feb7 06:13:33 rc_service: waitting "stop_upnp" via ip-up ...
Feb7 06:13:34 miniupnpd: HTTP listening on port 56850
Feb7 06:13:34 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 06:13:34 miniupnpd: shutting down MiniUPnPd
Feb7 06:13:34 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 06:13:34 miniupnpd: version 1.9 started
Feb7 06:13:35 ddns update: ez-ipupdate: starting...
Feb7 06:13:35 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb7 06:13:35 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Tue, 06 Feb 2018 22:13:35 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb7 06:13:35 ddns update: retval= 0, ddns_return_code (,200)
Feb7 06:13:35 ddns update: asusddns_update: 0
Feb7 06:13:36 ddns: ddns update ok
Feb7 06:13:36 miniupnpd: HTTP listening on port 42188
Feb7 06:13:36 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 06:13:51 rc_service: ip-up 3097:notify_rc start_firewall
Feb7 06:13:51 miniupnpd: shutting down MiniUPnPd
Feb7 06:13:51 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 06:13:52 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb7 06:13:52 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb7 06:13:52 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb7 06:13:52 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb7 06:13:52 miniupnpd: version 1.9 started
Feb7 06:13:52 miniupnpd: HTTP listening on port 37856
Feb7 06:13:52 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 07:44:15 roamast: wl1.1: add client to monitor list
Feb7 08:49:55 roamast: wl1.1: add client to monitor list
Feb7 09:04:15 roamast: wl1.1: add client to monitor list
Feb7 12:10:50 roamast: wl1.1: add client to monitor list
Feb7 13:29:55 roamast: wl1.1: add client to monitor list
Feb7 13:44:05 roamast: wl1.1: add client to monitor list
Feb7 17:09:55 roamast: wl1.1: add client to monitor list
Feb7 18:58:10 roamast: eth2: add client to monitor list
Feb7 18:59:30 roamast: wl1.1: add client to monitor list
Feb 14 08:00:16 syslogd started: BusyBox v1.17.4
Feb 14 08:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:16 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:16 kernel: Machine: Northstar Prototype
Feb 14 08:00:16 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 08:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:16 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:16 kernel: Virtual kernel memory layout:
Feb 14 08:00:16 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:16 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:16 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:16 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:16 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:16 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 08:00:16 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:16 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:16 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:16 kernel: * Invalid signature of oopsbuf: E1-45-A1-28-49-C0-E1-B8 (len 2967688019)
Feb 14 08:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:16 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:16 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:128MB
Feb 14 08:00:16 kernel: Block size:128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 nat: apply redirect rules
Feb 14 08:00:17 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:17 kernel: pflash: found no supported devices
Feb 14 08:00:17 kernel: bcmsflash: found no supported devices
Feb 14 08:00:17 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:17 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:17 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:17 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:17 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:17 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:17 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:20 dnsmasq: warning: no upstream servers configured
Feb 14 08:00:20 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:20 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:21 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:21 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:22 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:23 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:23 AAE: AAE Service is started
Feb 14 08:00:23 jffs2: valid logs(1)
Feb 14 08:00:23 disk monitor: be idle
Feb 14 08:00:23 hour monitor: daemon is starting
Feb 14 08:00:23 Mastiff: init
Feb 14 08:00:23 miniupnpd: version 1.9 started
Feb 14 08:00:23 miniupnpd: HTTP listening on port 49363
Feb 14 08:00:23 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:24 wan: ==
Feb 14 08:00:24 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:27 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:27 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:28 kernel: SCSI subsystem initialized
Feb 14 08:00:36 rc_service: zcip 586:notify_rc start_firewall
Feb 14 08:00:36 zcip client: configured 169.254.72.55
Feb 14 08:00:36 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:36 nat: apply nat rules (/tmp/nat_rules__eth0)
Feb 14 08:00:37 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:37 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:37 miniupnpd: version 1.9 started
Feb 14 08:00:37 miniupnpd: HTTP listening on port 39976
Feb 14 08:00:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:39 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:39 pppd: Connect: ppp0 <--> eth0
Feb 14 08:00:39 pppd: PAP authentication succeeded
Feb 14 08:00:39 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:40 pppd: localIP address 14.134.10.226
Feb 14 08:00:40 pppd: remote IP address 14.134.8.1
Feb 14 08:00:40 pppd: primary   DNS address 118.118.118.11
Feb 14 08:00:40 pppd: secondary DNS address 202.100.96.68
Feb 14 08:00:40 rc_service: ip-up 642:notify_rc start_firewall
Feb 14 08:00:41 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:41 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:41 wan: finish adding multi routes
Feb 14 08:00:41 rc_service: ip-up 642:notify_rc stop_upnp
Feb 14 08:00:41 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:41 WAN Connection: WAN was restored.
Feb 14 08:00:41 ntp: start NTP update
Feb 14 08:00:42 miniupnpd: version 1.9 started
Feb 14 08:00:42 miniupnpd: HTTP listening on port 55984
Feb 14 08:00:42 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:42 rc_service: ip-up 642:notify_rc start_upnp
Feb 14 08:00:42 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:42 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:43 miniupnpd: version 1.9 started
Feb 14 08:00:43 miniupnpd: HTTP listening on port 37594
Feb 14 08:00:43 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:44 roamast: eth2: add client to monitor list
Feb 14 08:00:45 ntp: start NTP update
Feb7 19:03:27 rc_service: ntp 667:notify_rc restart_upnp
Feb7 19:03:27 miniupnpd: shutting down MiniUPnPd
Feb7 19:03:27 rc_service: ntp 667:notify_rc restart_diskmon
Feb7 19:03:27 disk_monitor: Finish
Feb7 19:03:27 miniupnpd: version 1.9 started
Feb7 19:03:27 miniupnpd: HTTP listening on port 43288
Feb7 19:03:27 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:03:28 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 19:03:28 ddns update: ez-ipupdate: starting...
Feb7 19:03:28 disk monitor: be idle
Feb7 19:03:32 watchdog: start ddns.
Feb7 19:03:32 rc_service: watchdog 385:notify_rc restart_ddns
Feb7 19:03:32 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 19:03:33 ddns update: ez-ipupdate: starting...
Feb7 19:03:41 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb7 19:03:41 kernel: UDB Core Version: 0.2.14 r3529123
Feb7 19:03:41 kernel: sizeof forward pkt param = 192
Feb7 19:03:43 crond: time disparity of 516183 minutes detected
Feb7 19:03:46 rc_service: ip-up 642:notify_rc start_firewall
Feb7 19:03:47 miniupnpd: shutting down MiniUPnPd
Feb7 19:03:47 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 19:03:47 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb7 19:03:47 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb7 19:03:47 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb7 19:03:47 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb7 19:03:48 miniupnpd: version 1.9 started
Feb7 19:03:48 miniupnpd: HTTP listening on port 50567
Feb7 19:03:48 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:04:02 watchdog: start ddns.
Feb7 19:04:02 rc_service: watchdog 385:notify_rc start_ddns
Feb7 19:04:02 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 19:04:02 ddns update: ez-ipupdate: starting...
Feb7 19:04:03 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb7 19:04:03 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 11:04:02 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb7 19:04:03 ddns update: retval= 0, ddns_return_code (,200)
Feb7 19:04:03 ddns update: asusddns_update: 0
Feb7 19:04:03 ddns: ddns update ok
Feb7 19:05:01 rc_service: service 1229:notify_rc restart_letsencrypt
Feb7 19:05:05 hour monitor: ntp sync fail, will retry after 120 sec
Feb7 19:05:11 roamast: eth2: add client to monitor list
Feb7 19:05:11 roamast: wl1.1: add client to monitor list
Feb7 19:05:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/73r9I0PHZk7unVNKi-CBuBHHHf8E5tL4rNKev6qElfg/3375327968: bad response
Feb7 19:05:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/9oVAs6TDWuGS8KwA9PrzZiBShMxDvWJYcWjEGbreGDo: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/73r9I0PHZk7unVNKi-CBuBHHHf8E5tL4rNKev6qElfg/3375327968", "token": "9oVAs6TDWuGS8KwA9PrzZiBShMxDvWJYcWjEGbreGDo", "keyAuthorization": "9oVAs6TDWuGS8K
Feb7 19:09:24 pppd: Connection terminated.
Feb7 19:09:24 pppd: Modem hangup
Feb7 19:09:25 WAN Connection: Fail to connect with some issues.
Feb7 19:09:25 DualWAN: skip single wan wan_led_control - WANRED off
Feb7 19:09:26 nat: apply redirect rules
Feb7 19:09:34 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb7 19:09:34 pppd: Connect: ppp0 <--> eth0
Feb7 19:09:34 pppd: PAP authentication succeeded
Feb7 19:09:34 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb7 19:09:34 pppd: localIP address 14.134.8.18
Feb7 19:09:34 pppd: remote IP address 14.134.8.1
Feb7 19:09:34 pppd: primary   DNS address 118.118.118.11
Feb7 19:09:34 pppd: secondary DNS address 202.100.96.68
Feb7 19:09:34 rc_service: ip-up 1405:notify_rc start_firewall
Feb7 19:09:35 miniupnpd: shutting down MiniUPnPd
Feb7 19:09:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 19:09:35 wan: finish adding multi routes
Feb7 19:09:35 ntp: start NTP update
Feb7 19:09:35 rc_service: ip-up 1405:notify_rc stop_upnp
Feb7 19:09:35 rc_service: waitting "start_firewall" via ip-up ...
Feb7 19:09:35 miniupnpd: version 1.9 started
Feb7 19:09:35 miniupnpd: HTTP listening on port 39756
Feb7 19:09:35 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:09:36 rc_service: ip-up 1405:notify_rc start_upnp
Feb7 19:09:36 rc_service: waitting "stop_upnp" via ip-up ...
Feb7 19:09:36 miniupnpd: shutting down MiniUPnPd
Feb7 19:09:37 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 19:09:37 ddns update: ez-ipupdate: starting...
Feb7 19:09:37 miniupnpd: version 1.9 started
Feb7 19:09:37 miniupnpd: HTTP listening on port 44498
Feb7 19:09:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:09:39 WAN Connection: WAN was restored.
Feb7 19:09:42 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb7 19:09:43 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 11:09:41 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb7 19:09:43 ddns update: retval= 0, ddns_return_code (,200)
Feb7 19:09:43 ddns update: asusddns_update: 0
Feb7 19:09:43 ddns: ddns update ok
Feb7 19:09:53 rc_service: ip-up 1405:notify_rc start_firewall
Feb7 19:09:54 miniupnpd: shutting down MiniUPnPd
Feb7 19:09:54 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 19:09:54 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb7 19:09:54 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb7 19:09:54 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb7 19:09:54 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb7 19:09:55 miniupnpd: version 1.9 started
Feb7 19:09:55 miniupnpd: HTTP listening on port 54874
Feb7 19:09:55 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:10:01 rc_service: service 1565:notify_rc restart_letsencrypt
Feb7 19:10:11 roamast: wl1.1: add client to monitor list
Feb7 19:10:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/LmS4jCntmGe_8Rx7KIhv_54ni8utoiVvEy7IVF7nkIM/3375374659: bad response
Feb7 19:10:40 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/t6-yxN2xu5Iiwl5To_vJt24A5h99k-79ARFCWA76X4s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/LmS4jCntmGe_8Rx7KIhv_54ni8utoiVvEy7IVF7nkIM/3375374659", "token": "t6-yxN2xu5Iiwl5To_vJt24A5h99k-79ARFCWA76X4s", "keyAuthorization": "t6-yxN2xu5Iiwl
Feb7 19:11:26 roamast: eth2: add client to monitor list
Feb7 19:15:01 rc_service: service 1763:notify_rc restart_letsencrypt
Feb7 19:15:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/KnfbDSizir0-QXYBFLxYLGXEvPoEttI8N0jr27XOwOM/3375424395: bad response
Feb7 19:15:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/gjT-_YhVglJUxs4ZGnQBowhqrpN_4xcrEmlGsef0PrY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/KnfbDSizir0-QXYBFLxYLGXEvPoEttI8N0jr27XOwOM/3375424395", "token": "gjT-_YhVglJUxs4ZGnQBowhqrpN_4xcrEmlGsef0PrY", "keyAuthorization": "gjT-_YhVglJUxs
Feb7 19:20:01 rc_service: service 1957:notify_rc restart_letsencrypt
Feb7 19:20:42 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/edLLFpMybWoFZ8m4n_3zXW6-qsiKrdI4zKv00CfJ0hg/3375470525: bad response
Feb7 19:20:42 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/K6xyCxqa4w8IZX5Qym5mrjLIY1Zvppnh8-hgQFDI96c: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/edLLFpMybWoFZ8m4n_3zXW6-qsiKrdI4zKv00CfJ0hg/3375470525", "token": "K6xyCxqa4w8IZX5Qym5mrjLIY1Zvppnh8-hgQFDI96c", "keyAuthorization": "K6xyCxqa4w8IZX
Feb7 19:25:01 rc_service: service 2131:notify_rc restart_letsencrypt
Feb7 19:25:40 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/BqtNSYWjy36HMyMlGE1o5rtp8gbgSo54HnCDVtWftIw/3375515545: bad response
Feb7 19:25:40 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/0LRbCp3GmLPCcyLscMrS1X0K7ZtoV4jR3KoH6EEZtb4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/BqtNSYWjy36HMyMlGE1o5rtp8gbgSo54HnCDVtWftIw/3375515545", "token": "0LRbCp3GmLPCcyLscMrS1X0K7ZtoV4jR3KoH6EEZtb4", "keyAuthorization": "0LRbCp3GmLPCcy
Feb7 19:30:01 rc_service: service 2335:notify_rc restart_letsencrypt
Feb7 19:30:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:30:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:35:01 rc_service: service 2522:notify_rc restart_letsencrypt
Feb7 19:35:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:35:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:40:01 rc_service: service 2730:notify_rc restart_letsencrypt
Feb7 19:40:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:40:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:45:01 rc_service: service 2906:notify_rc restart_letsencrypt
Feb7 19:45:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:45:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:50:01 rc_service: service 3099:notify_rc restart_letsencrypt
Feb7 19:50:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:50:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:55:01 rc_service: service 3299:notify_rc restart_letsencrypt
Feb7 19:55:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:55:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:00:01 rc_service: service 3522:notify_rc restart_letsencrypt
Feb7 20:00:26 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:00:26 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:05:01 rc_service: service 3723:notify_rc restart_letsencrypt
Feb7 20:05:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/vLiU6Kn-oz4eg0kjcCNXwThdEOyFM6W8zemGnJ8rQwE/3375900419: bad response
Feb7 20:05:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/0wsSI3mYk6EfI6OD3dVxwYFfriHSdQouy9PDVnDgbjY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/vLiU6Kn-oz4eg0kjcCNXwThdEOyFM6W8zemGnJ8rQwE/3375900419", "token": "0wsSI3mYk6EfI6OD3dVxwYFfriHSdQouy9PDVnDgbjY", "keyAuthorization": "0wsSI3mYk6EfI6
Feb7 20:10:01 rc_service: service 3933:notify_rc restart_letsencrypt
Feb7 20:10:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:10:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:15:01 rc_service: service 4114:notify_rc restart_letsencrypt
Feb7 20:15:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/PAFEOOpQCI0Hy6T-r8kMoyTzAK93h6WUIrh7x9XEfIo/3375992845: bad response
Feb7 20:15:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/m2-Mkvpcq-R_4VwR1MiDB_FRUY6oVugV2gWPfCHioVM: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/PAFEOOpQCI0Hy6T-r8kMoyTzAK93h6WUIrh7x9XEfIo/3375992845", "token": "m2-Mkvpcq-R_4VwR1MiDB_FRUY6oVugV2gWPfCHioVM", "keyAuthorization": "m2-Mkvpcq-R_4V
Feb7 20:20:01 rc_service: service 4319:notify_rc restart_letsencrypt
Feb7 20:20:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/iN5WFvIm_ka-NtU2DDXz3MwQfWeDPwq56dILWCUhwJY/3376041045: bad response
Feb7 20:20:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/4dkooKUhFTKSjOyBUpltxdYbfuHdBZcBR-gJgQJLvoY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/iN5WFvIm_ka-NtU2DDXz3MwQfWeDPwq56dILWCUhwJY/3376041045", "token": "4dkooKUhFTKSjOyBUpltxdYbfuHdBZcBR-gJgQJLvoY", "keyAuthorization": "4dkooKUhFTKSjO
Feb7 20:25:01 rc_service: service 4531:notify_rc restart_letsencrypt
Feb7 20:25:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/z7hAy5p6ADGuYnrXJby8f6xT8-HlKfLT9oq8QxdRhFw/3376088779: bad response
Feb7 20:25:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/REZ04fmJnLCoGhOliu-61dX49WdMBmjYrbhgPDjOIHs: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/z7hAy5p6ADGuYnrXJby8f6xT8-HlKfLT9oq8QxdRhFw/3376088779", "token": "REZ04fmJnLCoGhOliu-61dX49WdMBmjYrbhgPDjOIHs", "keyAuthorization": "REZ04fmJnLCoGh
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:30:01 rc_service: service 4725:notify_rc restart_letsencrypt
Feb7 20:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/qwTqKJ5ksgB2bU9iA1yeTcx970VQ_MXsFXtsfC0AsJA/3376133444: bad response
Feb7 20:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/8qjJ0U8XoJmQkCQaDvPiCYX01N-36LR6oyO9iIsiuvg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/qwTqKJ5ksgB2bU9iA1yeTcx970VQ_MXsFXtsfC0AsJA/3376133444", "token": "8qjJ0U8XoJmQkCQaDvPiCYX01N-36LR6oyO9iIsiuvg", "keyAuthorization": "8qjJ0U8XoJmQkC
Feb7 20:35:01 rc_service: service 4910:notify_rc restart_letsencrypt
Feb7 20:35:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:35:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:40:01 rc_service: service 5091:notify_rc restart_letsencrypt
Feb7 20:40:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:40:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:45:01 rc_service: service 5282:notify_rc restart_letsencrypt
Feb7 20:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:50:01 rc_service: service 5460:notify_rc restart_letsencrypt
Feb7 20:50:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:50:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:55:01 rc_service: service 5650:notify_rc restart_letsencrypt
Feb7 20:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:00:01 rc_service: service 5836:notify_rc restart_letsencrypt
Feb7 21:00:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:00:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:05:01 rc_service: service 6039:notify_rc restart_letsencrypt
Feb7 21:05:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:05:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:10:01 rc_service: service 6222:notify_rc restart_letsencrypt
Feb7 21:10:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/SEJkba2KTqx0lEPethz8PwJXuvn0JRP-pji_6cs7imE/3376500311: bad response
Feb7 21:10:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/vumoNpqWuaKUMwbJ49PCyTLDe-39_yrD0wMn2QC6YNc: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/SEJkba2KTqx0lEPethz8PwJXuvn0JRP-pji_6cs7imE/3376500311", "token": "vumoNpqWuaKUMwbJ49PCyTLDe-39_yrD0wMn2QC6YNc", "keyAuthorization": "vumoNpqWuaKUMw
Feb7 21:15:01 rc_service: service 6404:notify_rc restart_letsencrypt
Feb7 21:15:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:15:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:20:01 rc_service: service 6582:notify_rc restart_letsencrypt
Feb7 21:20:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/H46dOXkaBwX_Epyoqik2AgHgb70uUAsI-uhVfFfsu-k/3376567739: bad response
Feb7 21:20:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/GXiHbfSCB-C1t5qhVTeY7jabDeevDhYtmmBFbIUTDD4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/H46dOXkaBwX_Epyoqik2AgHgb70uUAsI-uhVfFfsu-k/3376567739", "token": "GXiHbfSCB-C1t5qhVTeY7jabDeevDhYtmmBFbIUTDD4", "keyAuthorization": "GXiHbfSCB-C1t5
Feb7 21:25:01 rc_service: service 6750:notify_rc restart_letsencrypt
Feb7 21:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/LB_v6C8NG7X9Foccpinhb6V1598K5fI5KlAlHBnAhY0/3376602714: bad response
Feb7 21:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/jchSUI3-t7IxNRu1Oj-Ul8xTfRgnODh6QEKEeDADeWY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/LB_v6C8NG7X9Foccpinhb6V1598K5fI5KlAlHBnAhY0/3376602714", "token": "jchSUI3-t7IxNRu1Oj-Ul8xTfRgnODh6QEKEeDADeWY", "keyAuthorization": "jchSUI3-t7IxNR
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:30:01 rc_service: service 6952:notify_rc restart_letsencrypt
Feb7 21:30:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/fKYDO7yQG7z7w7kFN_1GPS3nz3xzzh8KN5dpGa1-vYs/3376638209: bad response
Feb7 21:30:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/ZfGlx8-NOXWy6F8fQFYlCAKrJ6uqm5abBlAwNVn1nTQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/fKYDO7yQG7z7w7kFN_1GPS3nz3xzzh8KN5dpGa1-vYs/3376638209", "token": "ZfGlx8-NOXWy6F8fQFYlCAKrJ6uqm5abBlAwNVn1nTQ", "keyAuthorization": "ZfGlx8-NOXWy6F
Feb7 21:35:01 rc_service: service 7156:notify_rc restart_letsencrypt
Feb7 21:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/WBW1TXIcGGV4ctISYSoOofogY48oXCsmGy3ELNMOt5M/3376672847: bad response
Feb7 21:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/WgSniVgEVPFtk0m1Zhs9EQfS3tN-cI1mqzYStoVs3s0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/WBW1TXIcGGV4ctISYSoOofogY48oXCsmGy3ELNMOt5M/3376672847", "token": "WgSniVgEVPFtk0m1Zhs9EQfS3tN-cI1mqzYStoVs3s0", "keyAuthorization": "WgSniVgEVPFtk0
Feb7 21:40:01 rc_service: service 7344:notify_rc restart_letsencrypt
Feb7 21:40:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:40:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:45:01 rc_service: service 7525:notify_rc restart_letsencrypt
Feb7 21:45:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:45:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:50:01 rc_service: service 7699:notify_rc restart_letsencrypt
Feb7 21:50:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:50:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:55:01 rc_service: service 7879:notify_rc restart_letsencrypt
Feb7 21:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 22:00:01 rc_service: service 8049:notify_rc restart_letsencrypt
Feb7 22:00:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 22:00:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 22:05:01 rc_service: service 8221:notify_rc restart_letsencrypt
Feb7 22:05:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 22:05:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 22:10:01 rc_service: service 8388:notify_rc restart_letsencrypt
Feb7 22:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 22:10:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 22:15:01 rc_service: service 8556:notify_rc restart_letsencrypt
Feb7 22:15:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/0YJcZQU8EJfv1QvDqWn2TZk3Q_iweenFcCdSn4jORDU/3376947249: bad response
Feb7 22:15:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/kzbD_kArREN1G-uC0MwadJuDMIwDsFOEx-qiop0Uo6k: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/0YJcZQU8EJfv1QvDqWn2TZk3Q_iweenFcCdSn4jORDU/3376947249", "token": "kzbD_kArREN1G-uC0MwadJuDMIwDsFOEx-qiop0Uo6k", "keyAuthorization": "kzbD_kArREN1G-
Feb7 22:18:51 roamast: wl1.1: add client to monitor list
Feb7 22:20:01 rc_service: service 8746:notify_rc restart_letsencrypt
Feb7 22:20:44 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/_Y-13Ji7sLolSLutBpgs5SkzRo5UPhe2s93cotak5B8/3376979122: bad response
Feb7 22:20:44 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/X_vm3oTtjj_ApcjVg5B3oBv0ZapVeAFMtSsc-ilOaMQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/_Y-13Ji7sLolSLutBpgs5SkzRo5UPhe2s93cotak5B8/3376979122", "token": "X_vm3oTtjj_ApcjVg5B3oBv0ZapVeAFMtSsc-ilOaMQ", "keyAuthorization": "X_vm3oTtjj_Apc
Feb7 22:25:01 rc_service: service 8929:notify_rc restart_letsencrypt
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:27:06 roamast: wl1.1: add client to monitor list
Feb7 22:58:01 roamast: wl1.1: add client to monitor list
Feb7 23:03:28 disk_monitor: Got SIGALRM...
Feb7 23:22:06 WAN Connection: Fail to connect with some issues.
Feb7 23:22:06 DualWAN: skip single wan wan_led_control - WANRED off
Feb7 23:22:07 nat: apply redirect rules
Feb7 23:22:08 pppd: Connection terminated.
Feb7 23:22:08 pppd: Modem hangup
Feb7 23:22:18 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb7 23:22:18 pppd: Connect: ppp0 <--> eth0
Feb7 23:22:18 pppd: PAP authentication succeeded
Feb7 23:22:18 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb7 23:22:18 pppd: localIP address 36.103.150.104
Feb7 23:22:18 pppd: remote IP address 36.103.148.1
Feb7 23:22:18 pppd: primary   DNS address 118.118.118.11
Feb7 23:22:18 pppd: secondary DNS address 202.100.96.68
Feb7 23:22:18 rc_service: ip-up 10431:notify_rc start_firewall
Feb7 23:22:19 wan: finish adding multi routes
Feb7 23:22:19 rc_service: ip-up 10431:notify_rc stop_upnp
Feb7 23:22:19 rc_service: waitting "start_firewall" via ip-up ...
Feb7 23:22:19 ntp: start NTP update
Feb7 23:22:20 miniupnpd: shutting down MiniUPnPd
Feb7 23:22:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 23:22:21 miniupnpd: version 1.9 started
Feb7 23:22:21 rc_service: ip-up 10431:notify_rc start_upnp
Feb7 23:22:21 rc_service: waitting "stop_upnp" via ip-up ...
Feb7 23:22:22 WAN Connection: WAN was restored.
Feb7 23:22:23 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 23:22:23 ddns update: ez-ipupdate: starting...
Feb7 23:22:24 miniupnpd: version 1.9 started
Feb7 23:22:24 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb7 23:22:24 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 15:22:22 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb7 23:22:24 ddns update: retval= 0, ddns_return_code (,200)
Feb7 23:22:24 ddns update: asusddns_update: 0
Feb7 23:22:24 miniupnpd: HTTP listening on port 56655
Feb7 23:22:24 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 23:22:25 ddns: ddns update ok
Feb7 23:22:40 rc_service: ip-up 10431:notify_rc start_firewall
Feb7 23:22:40 miniupnpd: shutting down MiniUPnPd
Feb7 23:22:40 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 23:22:40 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb7 23:22:41 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb7 23:22:41 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb7 23:22:41 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb7 23:22:41 miniupnpd: version 1.9 started
Feb7 23:22:41 miniupnpd: HTTP listening on port 46090
Feb7 23:22:41 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:30:54 pppd: Connection terminated.
Feb8 01:30:54 pppd: Modem hangup
Feb8 01:30:55 WAN Connection: Fail to connect with some issues.
Feb8 01:30:55 DualWAN: skip single wan wan_led_control - WANRED off
Feb8 01:30:55 nat: apply redirect rules
Feb8 01:31:04 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb8 01:31:04 pppd: Connect: ppp0 <--> eth0
Feb8 01:31:05 pppd: PAP authentication succeeded
Feb8 01:31:05 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb8 01:31:05 pppd: localIP address 222.75.136.117
Feb8 01:31:05 pppd: remote IP address 222.75.136.1
Feb8 01:31:05 pppd: primary   DNS address 118.118.118.11
Feb8 01:31:05 pppd: secondary DNS address 202.100.96.68
Feb8 01:31:05 rc_service: ip-up 13992:notify_rc start_firewall
Feb8 01:31:06 wan: finish adding multi routes
Feb8 01:31:06 rc_service: ip-up 13992:notify_rc stop_upnp
Feb8 01:31:06 rc_service: waitting "start_firewall" via ip-up ...
Feb8 01:31:06 ntp: start NTP update
Feb8 01:31:06 wan: finish adding multi routes
Feb8 01:31:07 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 01:31:07 miniupnpd: version 1.9 started
Feb8 01:31:08 rc_service: ip-up 13992:notify_rc start_upnp
Feb8 01:31:08 rc_service: waitting "stop_upnp" via ip-up ...
Feb8 01:31:08 miniupnpd: HTTP listening on port 33796
Feb8 01:31:08 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 01:31:08 miniupnpd: shutting down MiniUPnPd
Feb8 01:31:09 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 01:31:09 ddns update: ez-ipupdate: starting...
Feb8 01:31:09 miniupnpd: version 1.9 started
Feb8 01:31:09 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 01:31:11 WAN Connection: WAN was restored.
Feb8 01:31:11 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 17:31:11 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 01:31:11 ddns update: retval= 0, ddns_return_code (,200)
Feb8 01:31:11 ddns update: asusddns_update: 0
Feb8 01:31:12 ntp: start NTP update
Feb8 01:31:12 ddns: ddns update ok
Feb8 01:31:12 miniupnpd: HTTP listening on port 51743
Feb8 01:31:12 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 01:31:25 rc_service: ip-up 13992:notify_rc start_firewall
Feb8 01:31:26 miniupnpd: shutting down MiniUPnPd
Feb8 01:31:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 01:31:26 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb8 01:31:26 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb8 01:31:26 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb8 01:31:26 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb8 01:31:27 miniupnpd: version 1.9 started
Feb8 01:31:27 miniupnpd: HTTP listening on port 47802
Feb8 01:31:27 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:15:06 roamast: eth2: add client to monitor list
Feb8 05:25:17 WAN Connection: Fail to connect with some issues.
Feb8 05:25:17 pppd: Connection terminated.
Feb8 05:25:17 DualWAN: skip single wan wan_led_control - WANRED off
Feb8 05:25:17 pppd: Modem hangup
Feb8 05:25:18 nat: apply redirect rules
Feb8 05:25:28 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb8 05:25:28 pppd: Connect: ppp0 <--> eth0
Feb8 05:25:28 pppd: PAP authentication succeeded
Feb8 05:25:28 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb8 05:25:28 pppd: localIP address 222.75.138.149
Feb8 05:25:28 pppd: remote IP address 222.75.136.1
Feb8 05:25:28 pppd: primary   DNS address 118.118.118.11
Feb8 05:25:28 pppd: secondary DNS address 202.100.96.68
Feb8 05:25:28 rc_service: ip-up 19961:notify_rc start_firewall
Feb8 05:25:29 wan: finish adding multi routes
Feb8 05:25:29 rc_service: ip-up 19961:notify_rc stop_upnp
Feb8 05:25:29 rc_service: waitting "start_firewall" via ip-up ...
Feb8 05:25:29 ntp: start NTP update
Feb8 05:25:30 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 05:25:30 miniupnpd: version 1.9 started
Feb8 05:25:31 rc_service: ip-up 19961:notify_rc start_upnp
Feb8 05:25:31 rc_service: waitting "stop_upnp" via ip-up ...
Feb8 05:25:33 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 05:25:33 WAN Connection: WAN was restored.
Feb8 05:25:33 ddns update: ez-ipupdate: starting...
Feb8 05:25:33 miniupnpd: version 1.9 started
Feb8 05:25:33 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 05:25:33 miniupnpd: HTTP listening on port 44435
Feb8 05:25:33 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 05:25:34 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 21:25:33 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 05:25:34 ddns update: retval= 0, ddns_return_code (,200)
Feb8 05:25:34 ddns update: asusddns_update: 0
Feb8 05:25:35 ddns: ddns update ok
Feb8 05:25:49 rc_service: ip-up 19961:notify_rc start_firewall
Feb8 05:25:50 miniupnpd: shutting down MiniUPnPd
Feb8 05:25:50 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 05:25:50 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb8 05:25:50 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb8 05:25:50 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb8 05:25:50 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb8 05:25:50 miniupnpd: version 1.9 started
Feb8 05:25:51 miniupnpd: HTTP listening on port 49710
Feb8 05:25:51 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:49:16 roamast: eth2: add client to monitor list
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 12:05:56 roamast: wl1.1: add client to monitor list
Feb 14 08:00:16 syslogd started: BusyBox v1.17.4
Feb 14 08:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:16 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:16 kernel: Machine: Northstar Prototype
Feb 14 08:00:16 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 08:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:16 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:16 kernel: Virtual kernel memory layout:
Feb 14 08:00:16 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:16 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:16 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:16 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:16 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:16 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 08:00:16 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:16 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:16 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:16 kernel: * Invalid signature of oopsbuf: ED-45-A1-28-4B-C0-F1-B8 (len 2967688019)
Feb 14 08:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:16 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:16 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:128MB
Feb 14 08:00:16 kernel: Block size:128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 nat: apply redirect rules
Feb 14 08:00:17 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:17 kernel: pflash: found no supported devices
Feb 14 08:00:17 kernel: bcmsflash: found no supported devices
Feb 14 08:00:17 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:17 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:17 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:17 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:17 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:17 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:17 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:18 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:20 dnsmasq: warning: no upstream servers configured
Feb 14 08:00:20 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:20 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:21 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:21 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:22 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:23 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:23 AAE: AAE Service is started
Feb 14 08:00:23 disk monitor: be idle
Feb 14 08:00:23 jffs2: valid logs(1)
Feb 14 08:00:23 hour monitor: daemon is starting
Feb 14 08:00:23 miniupnpd: version 1.9 started
Feb 14 08:00:23 miniupnpd: HTTP listening on port 44203
Feb 14 08:00:23 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:23 Mastiff: init
Feb 14 08:00:24 wan: ==
Feb 14 08:00:24 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:24 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:24 pppd: Connect: ppp0 <--> eth0
Feb 14 08:00:29 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:29 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:29 kernel: SCSI subsystem initialized
Feb 14 08:00:31 pppd: PAP authentication succeeded
Feb 14 08:00:31 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:32 pppd: localIP address 14.135.47.158
Feb 14 08:00:32 pppd: remote IP address 14.135.44.1
Feb 14 08:00:32 pppd: primary   DNS address 118.118.118.11
Feb 14 08:00:32 pppd: secondary DNS address 202.100.96.68
Feb 14 08:00:32 rc_service: ip-up 599:notify_rc start_firewall
Feb 14 08:00:33 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:33 wan: finish adding multi routes
Feb 14 08:00:33 rc_service: ip-up 599:notify_rc stop_upnp
Feb 14 08:00:33 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:34 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:34 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:34 miniupnpd: version 1.9 started
Feb 14 08:00:34 miniupnpd: HTTP listening on port 59552
Feb 14 08:00:34 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:35 rc_service: ip-up 599:notify_rc start_upnp
Feb 14 08:00:35 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:35 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:36 miniupnpd: version 1.9 started
Feb 14 08:00:36 miniupnpd: HTTP listening on port 34339
Feb 14 08:00:36 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:36 rc_service: zcip 674:notify_rc start_firewall
Feb 14 08:00:36 zcip client: configured 169.254.72.55
Feb 14 08:00:37 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:37 WAN Connection: WAN was restored.
Feb 14 08:00:38 miniupnpd: version 1.9 started
Feb 14 08:00:38 miniupnpd: HTTP listening on port 42534
Feb 14 08:00:38 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:39 ntp: start NTP update
Feb8 12:11:45 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 12:11:45 rc_service: ntp 634:notify_rc restart_upnp
Feb8 12:11:45 miniupnpd: shutting down MiniUPnPd
Feb8 12:11:46 rc_service: ntp 634:notify_rc restart_diskmon
Feb8 12:11:46 disk_monitor: Finish
Feb8 12:11:46 miniupnpd: version 1.9 started
Feb8 12:11:46 miniupnpd: HTTP listening on port 36592
Feb8 12:11:46 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 12:11:46 ddns update: ez-ipupdate: starting...
Feb8 12:11:47 disk monitor: be idle
Feb8 12:11:49 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 12:11:50 roamast: wl1.1: add client to monitor list
Feb8 12:11:50 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 04:11:49 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 12:11:50 ddns update: retval= 0, ddns_return_code (,200)
Feb8 12:11:50 ddns update: asusddns_update: 0
Feb8 12:11:50 ddns: ddns update ok
Feb8 12:11:56 watchdog: start ddns.
Feb8 12:11:56 rc_service: watchdog 385:notify_rc restart_ddns
Feb8 12:11:56 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 12:11:57 ddns update: ez-ipupdate: starting...
Feb8 12:11:57 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 12:11:57 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 04:11:56 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 12:11:57 ddns update: retval= 0, ddns_return_code (,200)
Feb8 12:11:57 ddns update: asusddns_update: 0
Feb8 12:11:58 ddns: ddns update ok
Feb8 12:11:59 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb8 12:11:59 kernel: UDB Core Version: 0.2.14 r3529123
Feb8 12:12:00 kernel: sizeof forward pkt param = 192
Feb8 12:12:05 rc_service: ip-up 599:notify_rc start_firewall
Feb8 12:12:05 miniupnpd: shutting down MiniUPnPd
Feb8 12:12:05 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 12:12:05 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb8 12:12:05 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb8 12:12:06 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb8 12:12:06 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb8 12:12:06 miniupnpd: version 1.9 started
Feb8 12:12:06 miniupnpd: HTTP listening on port 48445
Feb8 12:12:06 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 12:12:07 crond: time disparity of 517211 minutes detected
Feb8 12:13:28 hour monitor: ntp sync fail, will retry after 120 sec
Feb8 12:15:01 rc_service: service 1274:notify_rc restart_letsencrypt
Feb8 12:15:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/OO44Vb-2J7fKMtjXV5BujFR3IkWDyGPGCwqQwHYEmJI/3383577670: bad response
Feb8 12:15:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/X89Yhgh7l4WrRfj8D8Rc8R7NXNjCAX38P5FfuvZkc7M: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/OO44Vb-2J7fKMtjXV5BujFR3IkWDyGPGCwqQwHYEmJI/3383577670", "token": "X89Yhgh7l4WrRfj8D8Rc8R7NXNjCAX38P5FfuvZkc7M", "keyAuthorization": "X89Yhgh7l4WrRf
Feb8 12:16:35 roamast: wl1.1: add client to monitor list
Feb8 12:20:01 rc_service: service 1493:notify_rc restart_letsencrypt
Feb8 12:20:46 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/kyNTsCQepj-Jj6Zx-XA2mjqBVGyf49PyNY4pZ9d57DE/3383612929: bad response
Feb8 12:20:46 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/cHrgk8lrt3LDqQGyb50G-MXHgTYQbB1HROrKm742OnU: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/kyNTsCQepj-Jj6Zx-XA2mjqBVGyf49PyNY4pZ9d57DE/3383612929", "token": "cHrgk8lrt3LDqQGyb50G-MXHgTYQbB1HROrKm742OnU", "keyAuthorization": "cHrgk8lrt3LDqQ
Feb8 12:25:01 rc_service: service 1676:notify_rc restart_letsencrypt
Feb8 12:25:43 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/XUC7hyGZmBVdAq_7IgTRCEm07dooqsD3OsX5ArdTsnk/3383649057: bad response
Feb8 12:25:43 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/SGiLa8WGGRqgVCPSeAO9pf7z8NGPpfoKv12WdM_xRnM: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/XUC7hyGZmBVdAq_7IgTRCEm07dooqsD3OsX5ArdTsnk/3383649057", "token": "SGiLa8WGGRqgVCPSeAO9pf7z8NGPpfoKv12WdM_xRnM", "keyAuthorization": "SGiLa8WGGRqgVC
Feb8 12:30:01 rc_service: service 1888:notify_rc restart_letsencrypt
Feb8 12:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/J7f73FC_ZdwK8z23WQQ54FJKQ9Qe_9923HCZis1xOGM/3383684402: bad response
Feb8 12:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/gJyzUhDEjwchdVbmUi5r7nKGXQqBXg8dvXIJ5ohqSaY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/J7f73FC_ZdwK8z23WQQ54FJKQ9Qe_9923HCZis1xOGM/3383684402", "token": "gJyzUhDEjwchdVbmUi5r7nKGXQqBXg8dvXIJ5ohqSaY", "keyAuthorization": "gJyzUhDEjwchdV
Feb8 12:35:01 rc_service: service 2070:notify_rc restart_letsencrypt
Feb8 12:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/8OE9ZRIQSk9gHCeV4XHfB1WvcgtnOtwY6YIsL9XkODo/3383720390: bad response
Feb8 12:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/w2wu9M4qcrLm816G1NpE6uDnew4U89eiK5ttp_zxbfg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/8OE9ZRIQSk9gHCeV4XHfB1WvcgtnOtwY6YIsL9XkODo/3383720390", "token": "w2wu9M4qcrLm816G1NpE6uDnew4U89eiK5ttp_zxbfg", "keyAuthorization": "w2wu9M4qcrLm81
Feb8 12:40:01 rc_service: service 2250:notify_rc restart_letsencrypt
Feb8 12:40:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 12:40:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 12:45:01 rc_service: service 2416:notify_rc restart_letsencrypt
Feb8 12:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 12:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 12:50:01 rc_service: service 2586:notify_rc restart_letsencrypt
Feb8 12:50:23 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 12:50:23 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 12:55:01 rc_service: service 2760:notify_rc restart_letsencrypt
Feb8 12:55:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 12:55:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:00:01 rc_service: service 2949:notify_rc restart_letsencrypt
Feb8 13:00:28 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:00:28 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:00:47 disk_monitor: Got SIGALRM...
Feb8 13:05:01 rc_service: service 3136:notify_rc restart_letsencrypt
Feb8 13:05:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:05:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:10:01 rc_service: service 3318:notify_rc restart_letsencrypt
Feb8 13:10:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:15:01 rc_service: service 3499:notify_rc restart_letsencrypt
Feb8 13:15:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:15:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:20:01 rc_service: service 3665:notify_rc restart_letsencrypt
Feb8 13:20:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/OzkwOpnbd4QLa15eEGwvL8qQh-mwGs9Zo5Y9AgYNbyI/3384071976: bad response
Feb8 13:20:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/KuJUuEXJC-DinxDYqSpraC_l_TRmViHQIUKylkwr58s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/OzkwOpnbd4QLa15eEGwvL8qQh-mwGs9Zo5Y9AgYNbyI/3384071976", "token": "KuJUuEXJC-DinxDYqSpraC_l_TRmViHQIUKylkwr58s", "keyAuthorization": "KuJUuEXJC-Dinx
Feb8 13:25:01 rc_service: service 3874:notify_rc restart_letsencrypt
Feb8 13:25:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/PB78BDPisYAGo0TSq69auD89fx7LcKQqXC59FTpxy3s/3384109591: bad response
Feb8 13:25:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/T5_Bcz7MxvyFGRQYQmbvvcH0qOjSarNEfcotgTejHN0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/PB78BDPisYAGo0TSq69auD89fx7LcKQqXC59FTpxy3s/3384109591", "token": "T5_Bcz7MxvyFGRQYQmbvvcH0qOjSarNEfcotgTejHN0", "keyAuthorization": "T5_Bcz7MxvyFGR
Feb8 13:30:01 rc_service: service 4061:notify_rc restart_letsencrypt
Feb8 13:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/JHfiBfiDC9tbCirV_MP8HpVanKpxFgrFKKSbyjkHmYk/3384150409: bad response
Feb8 13:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/9w-OWYMk0xTvH3RjWwrDFKaK-KsHm_fJjP5q96axkVQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/JHfiBfiDC9tbCirV_MP8HpVanKpxFgrFKKSbyjkHmYk/3384150409", "token": "9w-OWYMk0xTvH3RjWwrDFKaK-KsHm_fJjP5q96axkVQ", "keyAuthorization": "9w-OWYMk0xTvH3
Feb8 13:35:01 rc_service: service 4229:notify_rc restart_letsencrypt
Feb8 13:35:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/cvyLtS_4zj_GDbIOv4h8g17bSBkA6dIMYMj_wD30k-4/3384185149: bad response
Feb8 13:35:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/2TKeOTZdPjyv4fO0GYvX89bY_6CptjbdiSExJ6jzxro: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/cvyLtS_4zj_GDbIOv4h8g17bSBkA6dIMYMj_wD30k-4/3384185149", "token": "2TKeOTZdPjyv4fO0GYvX89bY_6CptjbdiSExJ6jzxro", "keyAuthorization": "2TKeOTZdPjyv4f
Feb8 13:40:01 rc_service: service 4398:notify_rc restart_letsencrypt
Feb8 13:40:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/h_misnPPv6AeKkyLgX2HcrW3-c2mp87P-cejIm1MM8k/3384218650: bad response
Feb8 13:40:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/QyGrRhMZQmjY1jfXyn8R6JYUin7ahawItEaleabUVVk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/h_misnPPv6AeKkyLgX2HcrW3-c2mp87P-cejIm1MM8k/3384218650", "token": "QyGrRhMZQmjY1jfXyn8R6JYUin7ahawItEaleabUVVk", "keyAuthorization": "QyGrRhMZQmjY1j
Feb8 13:45:01 rc_service: service 4565:notify_rc restart_letsencrypt
Feb8 13:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:50:01 rc_service: service 4771:notify_rc restart_letsencrypt
Feb8 13:50:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:50:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:55:01 rc_service: service 4938:notify_rc restart_letsencrypt
Feb8 13:55:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:55:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:00:01 rc_service: service 5148:notify_rc restart_letsencrypt
Feb8 14:00:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:00:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:05:01 rc_service: service 5344:notify_rc restart_letsencrypt
Feb8 14:05:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:05:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:10:01 rc_service: service 5521:notify_rc restart_letsencrypt
Feb8 14:10:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:15:01 rc_service: service 5712:notify_rc restart_letsencrypt
Feb8 14:15:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:15:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:20:01 rc_service: service 5888:notify_rc restart_letsencrypt
Feb8 14:20:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ycSeAgKWC7ZF9XOc3_kfr_Yr8HK2moalNYes_o8oLUI/3384500451: bad response
Feb8 14:20:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/dp5-M1Vob6pZXkCoqC0nwYF82_DnNDxqsX8psUC66HY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ycSeAgKWC7ZF9XOc3_kfr_Yr8HK2moalNYes_o8oLUI/3384500451", "token": "dp5-M1Vob6pZXkCoqC0nwYF82_DnNDxqsX8psUC66HY", "keyAuthorization": "dp5-M1Vob6pZXk
Feb8 14:25:01 rc_service: service 6066:notify_rc restart_letsencrypt
Feb8 14:25:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/xrINmHwr5FIgkvSD4e8pkwbUfWSrw6dpPAwjD7jL3x0/3384533049: bad response
Feb8 14:25:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/DnkZp4UdkPlZd1eS3TNYExOORZjQRngudND8bayf3RY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/xrINmHwr5FIgkvSD4e8pkwbUfWSrw6dpPAwjD7jL3x0/3384533049", "token": "DnkZp4UdkPlZd1eS3TNYExOORZjQRngudND8bayf3RY", "keyAuthorization": "DnkZp4UdkPlZd1
Feb8 14:30:01 rc_service: service 6250:notify_rc restart_letsencrypt
Feb8 14:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:35:01 rc_service: service 6417:notify_rc restart_letsencrypt
Feb8 14:35:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/XNEL5NgGMDraxVq1EpfVu7zOPFMpoDSd9bhnwyCAKJw/3384600291: bad response
Feb8 14:35:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/4BfTLjBk_xie21Aoe1kSzApp4MGAZ4YLFqyDJbc23RI: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/XNEL5NgGMDraxVq1EpfVu7zOPFMpoDSd9bhnwyCAKJw/3384600291", "token": "4BfTLjBk_xie21Aoe1kSzApp4MGAZ4YLFqyDJbc23RI", "keyAuthorization": "4BfTLjBk_xie21
Feb8 14:40:01 rc_service: service 6585:notify_rc restart_letsencrypt
Feb8 14:40:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/_HLfSx5GeeNMqnk0rml7bEMJPcAf7MiFxI_Vrfad_hs/3384632001: bad response
Feb8 14:40:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/pCJwq0_v48ymEIC3ZCZc0pCwUtqapuXa4z0NJmlFWXE: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/_HLfSx5GeeNMqnk0rml7bEMJPcAf7MiFxI_Vrfad_hs/3384632001", "token": "pCJwq0_v48ymEIC3ZCZc0pCwUtqapuXa4z0NJmlFWXE", "keyAuthorization": "pCJwq0_v48ymEI
Feb8 14:45:01 rc_service: service 6770:notify_rc restart_letsencrypt
Feb8 14:45:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/3E68s5jU1A0wKGjNqF-0FQH4aGQ4gqHtPBTb7TRYiWs/3384664577: bad response
Feb8 14:45:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/AyvPk_zyMYrHQtz9Mex6C1afrWbatp8uKTBkcDMQ3v0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/3E68s5jU1A0wKGjNqF-0FQH4aGQ4gqHtPBTb7TRYiWs/3384664577", "token": "AyvPk_zyMYrHQtz9Mex6C1afrWbatp8uKTBkcDMQ3v0", "keyAuthorization": "AyvPk_zyMYrHQt
Feb8 14:50:01 rc_service: service 6940:notify_rc restart_letsencrypt
Feb8 14:50:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:50:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:55:01 rc_service: service 7113:notify_rc restart_letsencrypt
Feb8 14:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:00:01 rc_service: service 7307:notify_rc restart_letsencrypt
Feb8 15:00:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:00:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:05:01 rc_service: service 7501:notify_rc restart_letsencrypt
Feb8 15:05:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:05:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:10:01 rc_service: service 7693:notify_rc restart_letsencrypt
Feb8 15:10:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:10:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:15:01 rc_service: service 7894:notify_rc restart_letsencrypt
Feb8 15:15:23 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:15:23 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:20:01 rc_service: service 8062:notify_rc restart_letsencrypt
Feb8 15:20:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ga3tbEnenmZ4ryVrr4qWvSiaTb4tNReRNcWXzf6af6E/3384911090: bad response
Feb8 15:20:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/mVsadjvKcEgRqhlcuUB85ur054tlULvLn-t8CGFUK8s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ga3tbEnenmZ4ryVrr4qWvSiaTb4tNReRNcWXzf6af6E/3384911090", "token": "mVsadjvKcEgRqhlcuUB85ur054tlULvLn-t8CGFUK8s", "keyAuthorization": "mVsadjvKcEgRqh
Feb8 15:25:01 rc_service: service 8230:notify_rc restart_letsencrypt
Feb8 15:25:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:25:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:30:01 rc_service: service 8434:notify_rc restart_letsencrypt
Feb8 15:30:44 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ipTnKhGoI_2Ew_pcj7qv6Djzi5R_tpp8B5tO-2yPV0E/3384978743: bad response
Feb8 15:30:44 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/7hd0Uhff2crd5i9IZZXeDvNQ0tHsyq9NTRyc-2RzwJA: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ipTnKhGoI_2Ew_pcj7qv6Djzi5R_tpp8B5tO-2yPV0E/3384978743", "token": "7hd0Uhff2crd5i9IZZXeDvNQ0tHsyq9NTRyc-2RzwJA", "keyAuthorization": "7hd0Uhff2crd5i
Feb8 15:35:01 rc_service: service 8602:notify_rc restart_letsencrypt
Feb8 15:35:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:35:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:40:01 rc_service: service 8769:notify_rc restart_letsencrypt
Feb8 15:40:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/mzAxq5cvTkrrWAiUKDMYZvRGMTB7xIEJpV9NoDfa3mQ/3385040555: bad response
Feb8 15:40:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/Oq5W81hnIeUdl_5lzlOqoTsZhyuSLuoy1WerEqxMjM4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/mzAxq5cvTkrrWAiUKDMYZvRGMTB7xIEJpV9NoDfa3mQ/3385040555", "token": "Oq5W81hnIeUdl_5lzlOqoTsZhyuSLuoy1WerEqxMjM4", "keyAuthorization": "Oq5W81hnIeUdl_
Feb8 15:45:01 rc_service: service 8956:notify_rc restart_letsencrypt
Feb8 15:45:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/mSj5vcLtElIuyp9sqmff-ZR9F2R6slsNmFMZ7Td4o3M/3385071899: bad response
Feb8 15:45:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/1ExjRHZGHbHmySgVUsp2HtK20umoVlAcZU3dNs1HKDA: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/mSj5vcLtElIuyp9sqmff-ZR9F2R6slsNmFMZ7Td4o3M/3385071899", "token": "1ExjRHZGHbHmySgVUsp2HtK20umoVlAcZU3dNs1HKDA", "keyAuthorization": "1ExjRHZGHbHmyS
Feb8 15:50:01 rc_service: service 9124:notify_rc restart_letsencrypt
Feb8 15:50:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ywYd8GaxaepXGs3WP90_4BszkwN-3eInFG3PjkuVOCE/3385105213: bad response
Feb8 15:50:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/FxBBuronfC9b9f7B1TvOopkTidqNpggze6Z8eQ-Wsbg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ywYd8GaxaepXGs3WP90_4BszkwN-3eInFG3PjkuVOCE/3385105213", "token": "FxBBuronfC9b9f7B1TvOopkTidqNpggze6Z8eQ-Wsbg", "keyAuthorization": "FxBBuronfC9b9f
Feb8 15:55:01 rc_service: service 9292:notify_rc restart_letsencrypt
Feb8 15:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:00:01 rc_service: service 9460:notify_rc restart_letsencrypt
Feb8 16:00:24 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:00:24 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:05:01 rc_service: service 9642:notify_rc restart_letsencrypt
Feb8 16:05:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:05:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:10:01 rc_service: service 9809:notify_rc restart_letsencrypt
Feb8 16:10:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:10:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:15:01 rc_service: service 9980:notify_rc restart_letsencrypt
Feb8 16:15:26 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:15:26 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:20:01 rc_service: service 10146:notify_rc restart_letsencrypt
Feb8 16:20:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/c-b-x0Y8EosGCYKyhg3ny4eaT24Tm7TFHsARTpf4Q4k/3385317740: bad response
Feb8 16:20:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/lnizwvKdUurola9u97nPm4NVRr3AozwaI47kEXZG_n0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/c-b-x0Y8EosGCYKyhg3ny4eaT24Tm7TFHsARTpf4Q4k/3385317740", "token": "lnizwvKdUurola9u97nPm4NVRr3AozwaI47kEXZG_n0", "keyAuthorization": "lnizwvKdUurola
Feb8 16:23:10 roamast: wl1.1: add client to monitor list
Feb8 16:25:01 rc_service: service 10322:notify_rc restart_letsencrypt
Feb8 16:25:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:25:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:30:01 rc_service: service 10520:notify_rc restart_letsencrypt
Feb8 16:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:35:01 rc_service: service 10705:notify_rc restart_letsencrypt
Feb8 16:35:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/nLXpjgoH6LTay-u2-OWajRhdTQOe_-vOxAkWrQ6_O7k/3385414914: bad response
Feb8 16:35:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/Kpuf5rnq5MZw37Hb7RSGl6ZlPoL57f6yetm81imlZHc: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/nLXpjgoH6LTay-u2-OWajRhdTQOe_-vOxAkWrQ6_O7k/3385414914", "token": "Kpuf5rnq5MZw37Hb7RSGl6ZlPoL57f6yetm81imlZHc", "keyAuthorization": "Kpuf5rnq5MZw37
Feb8 16:40:01 rc_service: service 10892:notify_rc restart_letsencrypt
Feb8 16:40:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/2FTfSFGQCfl_THk8_vknbnw_ClylApfg0khwUxzFWtQ/3385446715: bad response
Feb8 16:40:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/qvQHW6rEXwE54nPnOMnrG0IT16temxlAzp6r1vjbbxk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/2FTfSFGQCfl_THk8_vknbnw_ClylApfg0khwUxzFWtQ/3385446715", "token": "qvQHW6rEXwE54nPnOMnrG0IT16temxlAzp6r1vjbbxk", "keyAuthorization": "qvQHW6rEXwE54n
Feb8 16:45:01 rc_service: service 11084:notify_rc restart_letsencrypt
Feb8 16:45:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/vAjkPuH3NTrbMHHD8UKvhOEFmExvvLGigshJRQvcj6I/3385479483: bad response
Feb8 16:45:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/zn6rZ7UDgaZ2DQNUgPbpT5WI1vKczlGkDoxK_Ho-Sj0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/vAjkPuH3NTrbMHHD8UKvhOEFmExvvLGigshJRQvcj6I/3385479483", "token": "zn6rZ7UDgaZ2DQNUgPbpT5WI1vKczlGkDoxK_Ho-Sj0", "keyAuthorization": "zn6rZ7UDgaZ2DQ
Feb8 16:46:20 roamast: wl1.1: add client to monitor list
Feb8 16:50:01 rc_service: service 11271:notify_rc restart_letsencrypt
Feb8 16:50:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/jt89gw563ar5VMDoK7QZV5FkyDLxTvHzpTAxqE5kxyE/3385511430: bad response
Feb8 16:50:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/18W6rb5rnkbVhDQ4WtrxulMLWInl9V7SRdWoD75-Xa4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/jt89gw563ar5VMDoK7QZV5FkyDLxTvHzpTAxqE5kxyE/3385511430", "token": "18W6rb5rnkbVhDQ4WtrxulMLWInl9V7SRdWoD75-Xa4", "keyAuthorization": "18W6rb5rnkbVhD
Feb8 16:55:01 rc_service: service 11438:notify_rc restart_letsencrypt
Feb8 16:55:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:55:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:00:01 rc_service: service 11647:notify_rc restart_letsencrypt
Feb8 17:00:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:00:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:05:01 rc_service: service 11850:notify_rc restart_letsencrypt
Feb8 17:05:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:05:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:10:01 rc_service: service 12035:notify_rc restart_letsencrypt
Feb8 17:10:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:10:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:15:01 rc_service: service 12216:notify_rc restart_letsencrypt
Feb8 17:15:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:15:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:20:01 rc_service: service 12395:notify_rc restart_letsencrypt
Feb8 17:20:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:20:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:25:01 rc_service: service 12580:notify_rc restart_letsencrypt
Feb8 17:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/QZX03y264_Ig6Bnt0bWbnrqFYx5i8NEUZ1uCce_kImc/3385741748: bad response
Feb8 17:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/LSnoMIyrax7QRHR427bWVqLYK2QMv9INpTHXE6Dv8bI: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/QZX03y264_Ig6Bnt0bWbnrqFYx5i8NEUZ1uCce_kImc/3385741748", "token": "LSnoMIyrax7QRHR427bWVqLYK2QMv9INpTHXE6Dv8bI", "keyAuthorization": "LSnoMIyrax7QRH
Feb8 17:30:01 rc_service: service 12756:notify_rc restart_letsencrypt
Feb8 17:30:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:30:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:35:01 rc_service: service 12944:notify_rc restart_letsencrypt
Feb8 17:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ZKW5PFaDa4fL2jKfGTDIN18uZqIT_XjxXSrJ0SBnPfY/3385803748: bad response
Feb8 17:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/1lGwkM-EL8awiD31o0K6ZIwcqQo7UZR3nTZsaRn5hio: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ZKW5PFaDa4fL2jKfGTDIN18uZqIT_XjxXSrJ0SBnPfY/3385803748", "token": "1lGwkM-EL8awiD31o0K6ZIwcqQo7UZR3nTZsaRn5hio", "keyAuthorization": "1lGwkM-EL8awiD
Feb8 17:40:01 rc_service: service 13134:notify_rc restart_letsencrypt
Feb8 17:40:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:40:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:45:01 rc_service: service 13301:notify_rc restart_letsencrypt
Feb8 17:45:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/H4xujkY-MjzzBHvqSGghqn4OiAVlDB6xAZOPlK0t8JM/3385869175: bad response
Feb8 17:45:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/mUTYzD6wrSkfx1nrgtcltghq1CK3l5y7z-DWCPZZVg8: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/H4xujkY-MjzzBHvqSGghqn4OiAVlDB6xAZOPlK0t8JM/3385869175", "token": "mUTYzD6wrSkfx1nrgtcltghq1CK3l5y7z-DWCPZZVg8", "keyAuthorization": "mUTYzD6wrSkfx1
Feb8 17:50:01 rc_service: service 13489:notify_rc restart_letsencrypt
Feb8 17:50:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/KRKA4AtJTvr0tT1JVnmc1KhxnyIM29Or7ERUkppocSY/3385903226: bad response
Feb8 17:50:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/pxG3bNWzVLFNDlDqRF-naws5tyhh6rezIN318KLk-7A: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/KRKA4AtJTvr0tT1JVnmc1KhxnyIM29Or7ERUkppocSY/3385903226", "token": "pxG3bNWzVLFNDlDqRF-naws5tyhh6rezIN318KLk-7A", "keyAuthorization": "pxG3bNWzVLFNDl
Feb8 17:55:01 rc_service: service 13657:notify_rc restart_letsencrypt
Feb8 17:55:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/7-6zo4WpDhpxYJq1wpiA3YS57GOWb20cMY-q_kZcLfo/3385937381: bad response
Feb8 17:55:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/U8L4ZbJJFTxNE90a1gzZVIfwv9JGDKJfHbRc_zLjfeY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/7-6zo4WpDhpxYJq1wpiA3YS57GOWb20cMY-q_kZcLfo/3385937381", "token": "U8L4ZbJJFTxNE90a1gzZVIfwv9JGDKJfHbRc_zLjfeY", "keyAuthorization": "U8L4ZbJJFTxNE9
Feb8 18:00:01 rc_service: service 13826:notify_rc restart_letsencrypt
Feb8 18:00:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:00:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:05:01 rc_service: service 14009:notify_rc restart_letsencrypt
Feb8 18:05:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:05:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:10:01 rc_service: service 14183:notify_rc restart_letsencrypt
Feb8 18:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:10:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:15:01 rc_service: service 14356:notify_rc restart_letsencrypt
Feb8 18:15:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:15:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:20:01 rc_service: service 14578:notify_rc restart_letsencrypt
Feb8 18:20:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:20:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:25:01 rc_service: service 14747:notify_rc restart_letsencrypt
Feb8 18:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/F1WWtPm7f9bP4aEBvJ0sqCUiwVyNjXxbkhk7CqTXSXU/3386138192: bad response
Feb8 18:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/4QfdVWHn3FwsC5hC6j8O1PP5Ee5E63I6Gm7XVMgGGtU: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/F1WWtPm7f9bP4aEBvJ0sqCUiwVyNjXxbkhk7CqTXSXU/3386138192", "token": "4QfdVWHn3FwsC5hC6j8O1PP5Ee5E63I6Gm7XVMgGGtU", "keyAuthorization": "4QfdVWHn3FwsC5
Feb8 18:30:01 rc_service: service 14926:notify_rc restart_letsencrypt
Feb8 18:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:35:01 rc_service: service 15102:notify_rc restart_letsencrypt
Feb8 18:35:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:35:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:40:01 rc_service: service 15289:notify_rc restart_letsencrypt
Feb8 18:40:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/5aljgoqi-hfcIuYhtqRAXfuq5jK7VNA5RkVDE96S2pY/3386232266: bad response
Feb8 18:40:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/-vgKyVzyDjXkMpfap-NOUOlqLa5fIJRv6AGzJsh5Tfs: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5aljgoqi-hfcIuYhtqRAXfuq5jK7VNA5RkVDE96S2pY/3386232266", "token": "-vgKyVzyDjXkMpfap-NOUOlqLa5fIJRv6AGzJsh5Tfs", "keyAuthorization": "-vgKyVzyDjXkMp
Feb8 18:45:01 rc_service: service 15476:notify_rc restart_letsencrypt
Feb8 18:45:41 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/urBMb2MvrxuXipL-Cl0E1rYU6V9l-BdelBLgGYMfWIU/3386264278: bad response
Feb8 18:45:41 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/mD0mBmTtdCxUxJlKJKEwBOkqkl11dIlGf9KQCdWxFnk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/urBMb2MvrxuXipL-Cl0E1rYU6V9l-BdelBLgGYMfWIU/3386264278", "token": "mD0mBmTtdCxUxJlKJKEwBOkqkl11dIlGf9KQCdWxFnk", "keyAuthorization": "mD0mBmTtdCxUxJ
Feb8 18:50:01 rc_service: service 15651:notify_rc restart_letsencrypt
Feb8 18:50:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ycLXABEIXOSp0Ynjzo44l63ob-z5YK5tj741V5rP2Aw/3386295384: bad response
Feb8 18:50:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/GHjF-BVldeXIlHMXoGD1Zf9ulfxs95cNjkntxp9-cnk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ycLXABEIXOSp0Ynjzo44l63ob-z5YK5tj741V5rP2Aw/3386295384", "token": "GHjF-BVldeXIlHMXoGD1Zf9ulfxs95cNjkntxp9-cnk", "keyAuthorization": "GHjF-BVldeXIlH
Feb8 18:55:01 rc_service: service 15846:notify_rc restart_letsencrypt
Feb8 18:55:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/J99bdDjrfZVsZzVTgqqpvRjgHXPnhxGY5fqhw7zz5-E/3386325652: bad response
Feb8 18:55:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/GBOQj_Mv4rZgDg8R_7fHjv-T71LweDDnSc7TElHmODY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/J99bdDjrfZVsZzVTgqqpvRjgHXPnhxGY5fqhw7zz5-E/3386325652", "token": "GBOQj_Mv4rZgDg8R_7fHjv-T71LweDDnSc7TElHmODY", "keyAuthorization": "GBOQj_Mv4rZgDg
Feb8 19:00:01 rc_service: service 16020:notify_rc restart_letsencrypt
Feb8 19:00:27 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 19:00:27 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 19:03:40 roamast: eth1: add client to monitor list
Feb8 19:05:01 rc_service: service 16215:notify_rc restart_letsencrypt
Feb8 19:05:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 19:05:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 19:08:18 rc_service: httpd 381:notify_rc restart_wan_if 0
Feb8 19:08:18 pppd: Connection terminated.
Feb8 19:08:21 wan: ==
Feb8 19:08:21 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb8 19:08:21 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb8 19:08:21 pppd: Connect: ppp0 <--> eth0
Feb8 19:08:21 pppd: PAP authentication succeeded
Feb8 19:08:21 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb8 19:08:22 pppd: localIP address 222.75.230.51
Feb8 19:08:22 pppd: remote IP address 222.75.228.1
Feb8 19:08:22 pppd: primary   DNS address 118.118.118.11
Feb8 19:08:22 pppd: secondary DNS address 202.100.96.68
Feb8 19:08:22 rc_service: ip-up 16415:notify_rc start_firewall
Feb8 19:08:22 miniupnpd: shutting down MiniUPnPd
Feb8 19:08:22 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 19:08:22 wan: finish adding multi routes
Feb8 19:08:22 rc_service: ip-up 16415:notify_rc stop_upnp
Feb8 19:08:22 rc_service: waitting "start_firewall" via ip-up ...
Feb8 19:08:22 ntp: start NTP update
Feb8 19:08:23 miniupnpd: version 1.9 started
Feb8 19:08:23 miniupnpd: HTTP listening on port 41115
Feb8 19:08:23 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 19:08:23 rc_service: ip-up 16415:notify_rc start_upnp
Feb8 19:08:23 rc_service: waitting "stop_upnp" via ip-up ...
Feb8 19:08:23 miniupnpd: shutting down MiniUPnPd
Feb8 19:08:24 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 19:08:24 miniupnpd: version 1.9 started
Feb8 19:08:25 ddns update: ez-ipupdate: starting...
Feb8 19:08:25 miniupnpd: HTTP listening on port 52833
Feb8 19:08:25 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 19:08:25 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 19:08:25 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 11:08:24 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 19:08:25 ddns update: retval= 0, ddns_return_code (,200)
Feb8 19:08:25 ddns update: asusddns_update: 0
Feb8 19:08:26 ddns: ddns update ok
Feb8 19:08:32 rc_service: zcip 16474:notify_rc start_firewall
Feb8 19:08:32 zcip client: configured 169.254.72.55
Feb8 19:08:33 miniupnpd: shutting down MiniUPnPd
Feb8 19:08:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 19:08:33 miniupnpd: version 1.9 started
Feb8 19:08:34 miniupnpd: HTTP listening on port 45410
Feb8 19:08:34 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 19:08:41 rc_service: ip-up 16415:notify_rc start_firewall
Feb8 19:08:41 miniupnpd: shutting down MiniUPnPd
Feb8 19:08:41 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 19:08:42 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb8 19:08:42 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb8 19:08:42 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb8 19:08:42 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb8 19:08:42 miniupnpd: version 1.9 started
Feb8 19:08:42 miniupnpd: HTTP listening on port 39265
Feb8 19:08:42 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 19:10:02 rc_service: service 16637:notify_rc restart_letsencrypt
Feb8 19:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 19:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb 14 00:00:25 syslogd started: BusyBox v1.17.4
Feb 14 00:00:25 kernel: klogd started: BusyBox v1.17.4 (2018-01-25 20:31:57 CST)
Feb 14 00:00:25 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Jan 25 20:41:22 CST 2018
Feb 14 00:00:25 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 00:00:25 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 00:00:25 kernel: Machine: Northstar Prototype
Feb 14 00:00:25 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 00:00:25 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 00:00:25 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 00:00:25 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 00:00:25 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 00:00:25 kernel: Virtual kernel memory layout:
Feb 14 00:00:25 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 00:00:25 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 00:00:25 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 00:00:25 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 00:00:25 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 00:00:25 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 00:00:25 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 00:00:25 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 00:00:25 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 00:00:25 kernel: * Invalid signature of oopsbuf: C5-41-00-28-40-40-40-00 (len 4210688)
Feb 14 00:00:25 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 00:00:25 kernel: Mount-cache hash table entries: 512
Feb 14 00:00:25 kernel: CPU1: Booted secondary processor
Feb 14 00:00:25 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 00:00:25 kernel: Total size:128MB
Feb 14 00:00:25 kernel: Block size:128KB
Feb 14 00:00:25 kernel: Page Size:   2048B
Feb 14 00:00:25 kernel: OOB Size:    64B
Feb 14 00:00:25 kernel: Sector size: 512B
Feb 14 00:00:25 kernel: Spare size:16B
Feb 14 00:00:25 kernel: ECC level:   8 (8-bit)
Feb 14 00:00:25 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 00:00:25 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 00:00:25 kernel: bio: create slab <bio-0> at 0
Feb 14 00:00:25 kernel: PCI: no core
Feb 14 00:00:25 kernel: PCI: no core
Feb 14 00:00:25 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 1
Feb 14 00:00:26 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 1
Feb 14 00:00:26 nat: apply redirect rules
Feb 14 00:00:26 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 00:00:26 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 00:00:26 kernel: pflash: found no supported devices
Feb 14 00:00:26 kernel: bcmsflash: found no supported devices
Feb 14 00:00:26 kernel: Boot partition size = 524288(0x80000)
Feb 14 00:00:26 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 00:00:26 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 00:00:26 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 00:00:26 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 00:00:26 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 00:00:26 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 00:00:26 kernel: 0x0000003bfe80-0x000004000000 : "rootfs"
Feb 14 00:00:26 kernel: === PPTP init ===
Feb 14 00:00:26 kernel: Registering the dns_resolver key type
Feb 14 00:00:26 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 00:00:26 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 00:00:26 kernel: Available 7 bytes at (off,len):
Feb 14 00:00:26 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 00:00:26 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 00:00:26 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 00:00:26 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 00:00:26 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 00:00:26 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 00:00:26 kernel: Disabling lock debugging due to kernel taint
Feb 14 00:00:26 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 00:00:26 kernel: rtk port_phyEnableAll ok
Feb 14 00:00:26 kernel: register rtl8365mb done (link down at first)
Feb 14 00:00:26 kernel: et_module_init: passivemode set to 0x0
Feb 14 00:00:26 kernel: et_module_init: txworkq set to 0x0
Feb 14 00:00:26 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 00:00:26 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 00:00:26 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 00:00:26 kernel: dpsta_init: msglevel set to 0x1
Feb 14 00:00:26 kernel: dpsta_init: fail to get ifnames!
Feb 14 00:00:26 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:26 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 00:00:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:80 started
Feb 14 00:00:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:26 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:26 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:26 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 00:00:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:84 started
Feb 14 00:00:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:26 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:26 dnsmasq: warning: no upstream servers configured
Feb 14 00:00:26 kernel: reset usb phy..
Feb 14 00:00:26 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 00:00:26 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 00:00:26 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 00:00:27 RT-AC88U: start httpd
Feb 14 00:00:27 kernel: Empty flash at 0x005c0bb8 ends at 0x005c1000
Feb 14 00:00:27 kernel: jffs2_scan_eraseblock(): Node at 0x005d97f8 {0x1985, 0xe002, 0x00000044) has invalid CRC 0xffffffff (calculated 0x98f7fb1d)
Feb 14 00:00:27 kernel: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x005d97fc: 0x0044 instead
Feb 14 00:00:27 kernel: rtk port_phyEnableAll (on) ok
Feb 14 00:00:27 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 00:00:27 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 00:00:27 syslog: Generating SSL certificate...
Feb 14 00:00:29 NAT Tunnel: AAE Service is stopped
Feb 14 00:00:29 AAE: AAE Service is started
Feb 14 00:00:29 jffs2: valid logs(1)
Feb 14 00:00:29 hour monitor: daemon is starting
Feb 14 00:00:29 disk monitor: be idle
Feb 14 00:00:29 hour monitor: daemon terminates
Feb 14 00:00:30 miniupnpd: version 1.9 started
Feb 14 00:00:30 miniupnpd: HTTP listening on port 47027
Feb 14 00:00:30 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:30 Mastiff: init
Feb 14 00:00:30 kernel: dhd_detach(): thread:dhd_watchdog_thread:84 terminated OK
Feb 14 00:00:30 kernel: dhd_detach(): thread:dhd_watchdog_thread:80 terminated OK
Feb 14 00:00:31 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:00:33 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:33 kernel: dhd_attach(): thread:dhd_watchdog_thread:206 started
Feb 14 00:00:34 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:34 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:34 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:34 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:34 kernel: dhd_attach(): thread:dhd_watchdog_thread:20a started
Feb 14 00:00:35 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:35 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:35 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:38 wan: ==
Feb 14 00:00:38 wan: udhcpc done
Feb 14 00:00:38 rc_service: udhcpc 601:notify_rc start_firewall
Feb 14 00:00:38 wan: finish adding multi routes
Feb 14 00:00:38 rc_service: udhcpc 601:notify_rc stop_upnp
Feb 14 00:00:38 rc_service: waitting "start_firewall" via udhcpc ...
Feb 14 00:00:40 WAN Connection: WAN was restored.
Feb 14 00:00:43 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 00:00:43 syslog: module leds-usb not found in modules.dep
Feb 14 00:00:43 kernel: SCSI subsystem initialized
Feb 14 00:00:44 miniupnpd: shutting down MiniUPnPd
Feb 14 00:00:44 nat: apply redirect rules
Feb 14 00:00:51 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 00:00:51 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 00:00:51 miniupnpd: version 1.9 started
Feb 14 00:00:51 miniupnpd: HTTP listening on port 37435
Feb 14 00:00:51 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:51 rc_service: udhcpc 601:notify_rc start_upnp
Feb 14 00:00:51 rc_service: waitting "stop_upnp" via udhcpc ...
Feb 14 00:00:51 miniupnpd: shutting down MiniUPnPd
Feb 14 00:00:53 miniupnpd: version 1.9 started
Feb 14 00:00:53 miniupnpd: HTTP listening on port 49460
Feb 14 00:00:53 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:58 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:03:04 roamast: eth1: add client to monitor list
Feb 14 00:00:15 syslogd started: BusyBox v1.17.4
Feb 14 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2018-01-25 20:31:57 CST)
Feb 14 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Jan 25 20:41:22 CST 2018
Feb 14 00:00:15 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 00:00:15 kernel: Machine: Northstar Prototype
Feb 14 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 00:00:15 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 00:00:15 kernel: Virtual kernel memory layout:
Feb 14 00:00:15 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 00:00:15 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 00:00:15 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 00:00:15 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 00:00:15 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 00:00:15 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 00:00:15 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 00:00:15 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 00:00:15 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 00:00:15 kernel: * Invalid signature of oopsbuf: E1-45-A0-28-48-C0-D0-30 (len 283332946)
Feb 14 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 00:00:15 kernel: Mount-cache hash table entries: 512
Feb 14 00:00:16 kernel: CPU1: Booted secondary processor
Feb 14 00:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 00:00:16 kernel: Total size:128MB
Feb 14 00:00:16 kernel: Block size:128KB
Feb 14 00:00:16 kernel: Page Size:   2048B
Feb 14 00:00:16 kernel: OOB Size:    64B
Feb 14 00:00:16 kernel: Sector size: 512B
Feb 14 00:00:16 kernel: Spare size:16B
Feb 14 00:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 00:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 00:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 00:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 00:00:16 kernel: PCI: no core
Feb 14 00:00:16 kernel: PCI: no core
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 1
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 1
Feb 14 00:00:16 nat: apply redirect rules
Feb 14 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 00:00:16 kernel: pflash: found no supported devices
Feb 14 00:00:16 kernel: bcmsflash: found no supported devices
Feb 14 00:00:16 kernel: Boot partition size = 524288(0x80000)
Feb 14 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 00:00:16 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 00:00:16 kernel: 0x0000003bfe80-0x000004000000 : "rootfs"
Feb 14 00:00:16 kernel: === PPTP init ===
Feb 14 00:00:17 kernel: Registering the dns_resolver key type
Feb 14 00:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 00:00:17 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 00:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 00:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 00:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 00:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 00:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 00:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 00:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 00:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 00:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 00:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 00:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 00:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 00:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 00:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 00:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 00:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 00:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 00:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 00:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 00:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 00:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:17 kernel: reset usb phy..
Feb 14 00:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 00:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 00:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 00:00:17 kernel: Empty flash at 0x005c0bb8 ends at 0x005c1000
Feb 14 00:00:17 kernel: jffs2_scan_eraseblock(): Node at 0x005d97f8 {0x1985, 0xe002, 0x00000044) has invalid CRC 0xe0011985 (calculated 0x98f7fb1d)
Feb 14 00:00:17 kernel: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x005d97fc: 0x0044 instead
Feb 14 00:00:17 kernel: JFFS2 notice: (233) check_node_data: wrong data CRC in data node at 0x00106f7c: read 0xe8a14997, calculated 0x597f6c69.
Feb 14 00:00:19 dnsmasq: warning: no upstream servers configured
Feb 14 00:00:19 kernel: rtk port_phyEnableAll (on) ok
Feb 14 00:00:19 RT-AC88U: start httpd
Feb 14 00:00:20 syslog: Generating SSL certificate...
Feb 14 00:00:20 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 00:00:20 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 00:00:21 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:00:22 NAT Tunnel: AAE Service is stopped
Feb 14 00:00:22 AAE: AAE Service is started
Feb 14 00:00:22 disk monitor: be idle
Feb 14 00:00:22 hour monitor: daemon is starting
Feb 14 00:00:22 jffs2: valid logs(1)
Feb 14 00:00:22 hour monitor: daemon terminates
Feb 14 00:00:22 miniupnpd: version 1.9 started
Feb 14 00:00:22 miniupnpd: HTTP listening on port 33538
Feb 14 00:00:22 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:22 Mastiff: init
Feb 14 00:00:22 wan: ==
Feb 14 00:00:22 wan: udhcpc done
Feb 14 00:00:23 rc_service: udhcpc 442:notify_rc start_firewall
Feb 14 00:00:23 wan: finish adding multi routes
Feb 14 00:00:23 rc_service: udhcpc 442:notify_rc stop_upnp
Feb 14 00:00:23 rc_service: waitting "start_firewall" via udhcpc ...
Feb 14 00:00:27 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 00:00:27 syslog: module leds-usb not found in modules.dep
Feb 14 00:00:27 kernel: SCSI subsystem initialized
Feb 14 00:00:28 WAN Connection: WAN was restored.
Feb 14 00:00:29 miniupnpd: shutting down MiniUPnPd
Feb 14 00:00:29 nat: apply redirect rules
Feb 14 00:00:35 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 00:00:35 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 00:00:36 miniupnpd: version 1.9 started
Feb 14 00:00:36 miniupnpd: HTTP listening on port 41741
Feb 14 00:00:36 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:36 rc_service: udhcpc 442:notify_rc start_upnp
Feb 14 00:00:36 rc_service: waitting "stop_upnp" via udhcpc ...
Feb 14 00:00:36 miniupnpd: shutting down MiniUPnPd
Feb 14 00:00:37 miniupnpd: version 1.9 started
Feb 14 00:00:37 miniupnpd: HTTP listening on port 60835
Feb 14 00:00:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:42 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:04:55 rc_service: httpd 363:notify_rc start_autodet
Feb 14 00:05:15 rc_service: httpd 363:notify_rc start_autodet
Feb 14 00:06:13 rc_service: httpd 363:notify_rc restart_wan_if 0
Feb 14 00:06:13 wan: udhcpc done
Feb 14 00:06:14 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:06:16 wan: ==
Feb 14 00:06:16 wan: udhcpc done
Feb 14 00:06:16 pppd: pppd 2.4.7 started by admin, uid 0
Feb 14 00:06:16 rc_service: udhcpc 697:notify_rc start_firewall
Feb 14 00:06:16 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:06:16 miniupnpd: shutting down MiniUPnPd
Feb 14 00:06:16 nat: apply redirect rules
Feb 14 00:06:17 WAN Connection: Fail to connect with some issues.
Feb 14 00:06:17 miniupnpd: version 1.9 started
Feb 14 00:06:17 miniupnpd: HTTP listening on port 37056
Feb 14 00:06:17 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:06:21 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 00:06:21 pppd: Connect: ppp0 <--> eth0
Feb 14 00:06:21 pppd: PAP authentication succeeded
Feb 14 00:06:21 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 00:06:22 pppd: localIP address 106.45.236.126
Feb 14 00:06:22 pppd: remote IP address 106.45.236.1
Feb 14 00:06:22 pppd: primary   DNS address 118.118.118.11
Feb 14 00:06:22 pppd: secondary DNS address 202.100.96.68
Feb 14 00:06:22 rc_service: ip-up 734:notify_rc start_firewall
Feb 14 00:06:22 miniupnpd: shutting down MiniUPnPd
Feb 14 00:06:23 wan: finish adding multi routes
Feb 14 08:06:23 rc_service: ip-up 734:notify_rc stop_upnp
Feb 14 08:06:23 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 00:06:23 nat: apply redirect rules
Feb 14 00:06:23 miniupnpd: version 1.9 started
Feb 14 00:06:23 miniupnpd: HTTP listening on port 48713
Feb 14 00:06:23 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:06:24 rc_service: ip-up 734:notify_rc start_upnp
Feb 14 08:06:24 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 00:06:24 miniupnpd: shutting down MiniUPnPd
Feb 14 00:06:24 WAN Connection: WAN was restored.
Feb 14 00:06:25 miniupnpd: version 1.9 started
Feb 14 00:06:25 miniupnpd: HTTP listening on port 49114
Feb 14 00:06:25 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:06:27 rc_service: httpd 363:notify_rc start_webs_update
Feb 14 00:06:29 ntp: start NTP update
Feb4 10:40:57 rc_service: ntp 459:notify_rc restart_upnp
Feb4 02:40:57 miniupnpd: shutting down MiniUPnPd
Feb4 02:40:58 miniupnpd: version 1.9 started
Feb4 02:40:58 miniupnpd: HTTP listening on port 58194
Feb4 02:40:58 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:40:59 rc_service: ntp 459:notify_rc restart_diskmon
Feb4 02:40:59 disk_monitor: Finish
Feb4 02:40:59 disk monitor: be idle
Feb4 02:41:30 crond: time disparity of 511355 minutes detected
Feb 14 08:00:15 syslogd started: BusyBox v1.17.4
Feb 14 08:00:15 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:15 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:15 kernel: Machine: Northstar Prototype
Feb 14 08:00:15 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 08:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:15 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:15 kernel: Virtual kernel memory layout:
Feb 14 08:00:15 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:15 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:15 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:15 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:15 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:15 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 08:00:15 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:15 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:15 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:15 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:15 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:128MB
Feb 14 08:00:16 kernel: Block size:128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:16 kernel: pflash: found no supported devices
Feb 14 08:00:16 kernel: bcmsflash: found no supported devices
Feb 14 08:00:16 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:16 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:16 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:16 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:16 nat: apply redirect rules
Feb 14 08:00:16 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:17 kernel: Empty flash at 0x001073e4 ends at 0x00107800
Feb 14 08:00:17 kernel: from 80000000, local len(2232)
Feb 14 08:00:17 kernel: _ Reboot message ... _______________________________________________________
Feb 14 08:00:17 kernel: <0>Restarting system.
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable ��ead fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, sizeto read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, sie to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5,
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cache entUnable to read page, block 1adf1 Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adr: Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS e 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cFS error: Unable to read page, bHFS error: Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUAment cache entry
Feb 14 08:00:17 kernel: <3>SQe, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SSQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read<3>SQUASHFS error: Unable to read fragment cache entry
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to r5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: ____________________________________________________________________________
Feb 14 08:00:19 dnsmasq: warning: no upstream servers configured
Feb 14 08:00:19 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:19 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:20 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:20 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:21 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:22 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:22 AAE: AAE Service is started
Feb 14 08:00:22 jffs2: valid logs(1)
Feb 14 08:00:22 hour monitor: daemon is starting
Feb 14 08:00:22 hour monitor: daemon terminates
Feb 14 08:00:22 disk monitor: be idle
Feb 14 08:00:22 miniupnpd: version 1.9 started
Feb 14 08:00:22 miniupnpd: HTTP listening on port 60025
Feb 14 08:00:22 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:22 Mastiff: init
Feb 14 08:00:23 wan: ==
Feb 14 08:00:23 wan: udhcpc done
Feb 14 08:00:23 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:23 rc_service: udhcpc 442:notify_rc start_firewall
Feb 14 08:00:23 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 08:00:23 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:23 pppd: Connect: ppp0 <--> eth0
Feb 14 08:00:26 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:26 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:26 kernel: SCSI subsystem initialized
Feb 14 08:00:27 pppd: PAP authentication succeeded
Feb 14 08:00:27 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:27 pppd: localIP address 106.45.236.181
Feb 14 08:00:27 pppd: remote IP address 106.45.236.1
Feb 14 08:00:27 pppd: primary   DNS address 118.118.118.11
Feb 14 08:00:27 pppd: secondary DNS address 202.100.96.68
Feb 14 08:00:27 rc_service: ip-up 542:notify_rc start_firewall
Feb 14 08:00:27 rc_service: waitting "start_firewall" via...
Feb 14 08:00:28 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:28 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:30 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:30 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:30 miniupnpd: version 1.9 started
Feb 14 08:00:30 miniupnpd: HTTP listening on port 38787
Feb 14 08:00:30 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:31 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:31 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:31 wan: finish adding multi routes
Feb 14 08:00:31 rc_service: ip-up 542:notify_rc stop_upnp
Feb 14 08:00:31 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:31 miniupnpd: version 1.9 started
Feb 14 08:00:31 miniupnpd: HTTP listening on port 55150
Feb 14 08:00:31 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:32 WAN Connection: WAN was restored.
Feb 14 08:00:32 rc_service: ip-up 542:notify_rc start_upnp
Feb 14 08:00:32 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:32 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:33 miniupnpd: version 1.9 started
Feb 14 08:00:33 miniupnpd: HTTP listening on port 57258
Feb 14 08:00:33 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:34 ntp: start NTP update
Feb4 10:46:41 rc_service: ntp 636:notify_rc restart_upnp
Feb4 10:46:41 miniupnpd: shutting down MiniUPnPd
Feb4 10:46:41 rc_service: ntp 636:notify_rc restart_diskmon
Feb4 10:46:41 disk_monitor: Finish
Feb4 10:46:41 miniupnpd: version 1.9 started
Feb4 10:46:41 miniupnpd: HTTP listening on port 34032
Feb4 10:46:41 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:46:42 disk monitor: be idle
Feb4 10:47:08 crond: time disparity of 511366 minutes detected
Feb4 10:47:10 roamast: eth2: add client to monitor list
Feb4 10:48:17 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb4 10:48:17 Mastiff: select error
Feb4 10:48:17 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb4 10:48:17 Mastiff: select error
Feb4 10:48:17 rc_service: httpd 363:notify_rc restart_ddns
Feb4 10:48:17 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 10:48:17 ddns update: ez-ipupdate: starting...
Feb4 10:48:17 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 10:48:18 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:48:17 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 10:48:18 ddns update: retval= 0, ddns_return_code (,200)
Feb4 10:48:18 ddns update: asusddns_update: 0
Feb4 10:48:18 ddns: ddns update ok
Feb4 10:48:36 watchdog: start ddns.
Feb4 10:48:36 rc_service: watchdog 367:notify_rc restart_ddns
Feb4 10:48:36 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 10:48:36 rc_service: httpd 363:notify_rc restart_firewall
Feb4 10:48:37 ddns update: ez-ipupdate: starting...
Feb4 10:48:37 miniupnpd: shutting down MiniUPnPd
Feb4 10:48:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:48:37 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 10:48:37 miniupnpd: version 1.9 started
Feb4 10:48:37 miniupnpd: HTTP listening on port 60127
Feb4 10:48:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:48:38 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:48:36 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 10:48:38 ddns update: retval= 0, ddns_return_code (,200)
Feb4 10:48:38 ddns update: asusddns_update: 0
Feb4 10:48:39 ddns: ddns update ok
Feb4 10:49:33 rc_service: cfg_server 1006:notify_rc restart_wireless
Feb4 10:49:36 kernel: dhd_detach(): thread:dhd_watchdog_thread:7e terminated OK
Feb4 10:49:36 kernel: dhd_detach(): thread:dhd_watchdog_thread:7a terminated OK
Feb4 10:49:40 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:49:40 kernel: dhd_attach(): thread:dhd_watchdog_thread:449 started
Feb4 10:49:41 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:49:41 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:49:41 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb4 10:49:41 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:49:41 kernel: dhd_attach(): thread:dhd_watchdog_thread:451 started
Feb4 10:49:42 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:49:42 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:49:42 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:50:03 rc_service: cfg_server 1225:notify_rc restart_wireless
Feb4 10:50:05 lldpd: unable to send packet on real device for eth1: Network is down
Feb4 10:50:05 lldpd: unable to send packet on real device for eth2: No such device or address
Feb4 10:50:05 kernel: dhd_detach(): thread:dhd_watchdog_thread:451 terminated OK
Feb4 10:50:05 kernel: dhd_detach(): thread:dhd_watchdog_thread:449 terminated OK
Feb4 10:50:09 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:50:09 kernel: dhd_attach(): thread:dhd_watchdog_thread:522 started
Feb4 10:50:09 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:50:09 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:50:09 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb4 10:50:09 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:50:10 kernel: dhd_attach(): thread:dhd_watchdog_thread:527 started
Feb4 10:50:10 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:50:10 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:50:10 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:50:35 WAN Connection: Fail to connect with some issues.
Feb4 10:50:36 DualWAN: skip single wan wan_led_control - WANRED off
Feb4 10:50:36 nat: apply redirect rules
Feb4 10:50:36 pppd: Connection terminated.
Feb4 10:50:36 pppd: Modem hangup
Feb4 10:50:46 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb4 10:50:46 pppd: Connect: ppp0 <--> eth0
Feb4 10:50:46 pppd: PAP authentication succeeded
Feb4 10:50:46 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb4 10:50:47 pppd: localIP address 106.45.237.16
Feb4 10:50:47 pppd: remote IP address 106.45.236.1
Feb4 10:50:47 pppd: primary   DNS address 118.118.118.11
Feb4 10:50:47 pppd: secondary DNS address 202.100.96.68
Feb4 10:50:47 rc_service: ip-up 1437:notify_rc start_firewall
Feb4 10:50:47 miniupnpd: shutting down MiniUPnPd
Feb4 10:50:47 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:50:47 wan: finish adding multi routes
Feb4 10:50:47 ntp: start NTP update
Feb4 10:50:47 rc_service: ip-up 1437:notify_rc stop_upnp
Feb4 10:50:47 rc_service: waitting "start_firewall" via ip-up ...
Feb4 10:50:48 miniupnpd: version 1.9 started
Feb4 10:50:48 miniupnpd: HTTP listening on port 40870
Feb4 10:50:48 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:50:48 rc_service: ip-up 1437:notify_rc start_upnp
Feb4 10:50:48 rc_service: waitting "stop_upnp" via ip-up ...
Feb4 10:50:48 miniupnpd: shutting down MiniUPnPd
Feb4 10:50:49 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 10:50:50 miniupnpd: version 1.9 started
Feb4 10:50:50 miniupnpd: HTTP listening on port 57985
Feb4 10:50:50 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:50:50 ddns update: ez-ipupdate: starting...
Feb4 10:50:50 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 10:50:51 WAN Connection: WAN was restored.
Feb4 10:50:52 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:50:50 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 10:50:52 ddns update: retval= 0, ddns_return_code (,200)
Feb4 10:50:52 ddns update: asusddns_update: 0
Feb4 10:50:52 ddns: ddns update ok
Feb4 10:51:11 rc_service: httpd 363:notify_rc restart_net_and_phy
Feb4 10:51:13 iTunes: daemon is stoped
Feb4 10:51:13 FTP Server: daemon is stoped
Feb4 10:51:14 Samba Server: smb daemon is stoped
Feb4 10:51:14 kernel: gro disabled
Feb4 10:51:14 miniupnpd: shutting down MiniUPnPd
Feb4 10:51:16 pppd: Connection terminated.
Feb4 10:51:16 wan: udhcpc done
Feb4 10:51:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:51:21 kernel: dhd_detach(): thread:dhd_watchdog_thread:527 terminated OK
Feb4 10:51:22 kernel: dhd_detach(): thread:dhd_watchdog_thread:522 terminated OK
Feb4 10:51:24 kernel: rtk port_phyEnableAll (off) ok
Feb4 10:51:25 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:51:25 kernel: dhd_attach(): thread:dhd_watchdog_thread:65c started
Feb4 10:51:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:51:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:51:26 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb4 10:51:26 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:51:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:660 started
Feb4 10:51:27 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:51:27 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:51:27 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:51:29 nat: apply redirect rules
Feb4 10:51:29 dnsmasq: warning: no upstream servers configured
Feb4 10:51:29 wan: ==
Feb4 10:51:29 wan: udhcpc done
Feb4 10:51:29 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb4 10:51:29 rc_service: udhcpc 1710:notify_rc start_firewall
Feb4 10:51:29 rc_service: waitting "restart_net_and_phy" via...
Feb4 10:51:29 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb4 10:51:29 pppd: Connect: ppp0 <--> eth0
Feb4 10:51:29 pppd: PAP authentication succeeded
Feb4 10:51:29 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb4 10:51:29 pppd: localIP address 106.45.237.16
Feb4 10:51:29 pppd: remote IP address 106.45.236.1
Feb4 10:51:29 pppd: primary   DNS address 118.118.118.11
Feb4 10:51:29 pppd: secondary DNS address 202.100.96.68
Feb4 10:51:29 rc_service: ip-up 1715:notify_rc start_firewall
Feb4 10:51:29 rc_service: waitting "restart_net_and_phy" via...
Feb4 10:51:32 kernel: rtk port_phyEnableAll (on) ok
Feb4 10:51:32 miniupnpd: version 1.9 started
Feb4 10:51:32 miniupnpd: HTTP listening on port 43249
Feb4 10:51:32 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:51:32 RT-AC88U: start httpd
Feb4 10:51:33 syslog: Generating SSL certificate...
Feb4 10:51:33 wan: finish adding multi routes
Feb4 10:51:33 WAN Connection: WAN was exceptionally disconnected.
Feb4 10:51:34 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb4 10:51:35 miniupnpd: shutting down MiniUPnPd
Feb4 10:51:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:51:35 WAN Connection: WAN was restored.
Feb4 10:51:36 miniupnpd: version 1.9 started
Feb4 10:51:36 miniupnpd: HTTP listening on port 42260
Feb4 10:51:36 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:51:37 miniupnpd: shutting down MiniUPnPd
Feb4 10:51:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:51:37 wan: finish adding multi routes
Feb4 10:51:37 rc_service: ip-up 1715:notify_rc stop_upnp
Feb4 10:51:37 rc_service: waitting "start_firewall" via ip-up ...
Feb4 10:51:38 miniupnpd: version 1.9 started
Feb4 10:51:38 miniupnpd: HTTP listening on port 48268
Feb4 10:51:38 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:51:38 rc_service: ip-up 1715:notify_rc start_upnp
Feb4 10:51:38 rc_service: waitting "stop_upnp" via ip-up ...
Feb4 10:51:38 miniupnpd: shutting down MiniUPnPd
Feb4 10:51:39 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 10:51:39 ddns update: ez-ipupdate: starting...
Feb4 10:51:39 miniupnpd: version 1.9 started
Feb4 10:51:39 miniupnpd: HTTP listening on port 58065
Feb4 10:51:39 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:51:43 ntp: start NTP update
Feb4 10:51:45 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 10:51:45 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:51:44 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 10:51:45 ddns update: retval= 0, ddns_return_code (,200)
Feb4 10:51:45 ddns update: asusddns_update: 0
Feb4 10:51:45 ddns: ddns update ok
Feb4 10:55:43 rc_service: cfg_server 1985:notify_rc restart_wireless;restart_qos;restart_firewall;
Feb4 10:55:45 kernel: dhd_detach(): thread:dhd_watchdog_thread:660 terminated OK
Feb4 10:55:45 kernel: dhd_detach(): thread:dhd_watchdog_thread:65c terminated OK
Feb4 10:55:49 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:55:49 kernel: dhd_attach(): thread:dhd_watchdog_thread:811 started
Feb4 10:55:50 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:55:50 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:55:50 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb4 10:55:50 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb4 10:55:50 kernel: dhd_attach(): thread:dhd_watchdog_thread:815 started
Feb4 10:55:51 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb4 10:55:51 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb4 10:55:51 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:55:52 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb4 10:55:58 miniupnpd: shutting down MiniUPnPd
Feb4 10:55:58 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 10:55:58 miniupnpd: version 1.9 started
Feb4 10:55:58 miniupnpd: HTTP listening on port 46637
Feb4 10:55:58 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 10:58:57 roamast: wl1.1: add client to monitor list
Feb4 11:00:42 disk_monitor: Got SIGALRM...
Feb4 11:01:07 roamast: eth1: add client to monitor list
Feb4 11:17:02 roamast: eth2: add client to monitor list
Feb4 11:17:26 Mastiff: Got AAE_SIG_EULA_FLAG_SIGNED
Feb4 11:17:26 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb4 11:17:26 Mastiff: select error
Feb4 11:17:41 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 11:17:41 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 11:17:42 kernel: sizeof forward pkt param = 192
Feb4 11:17:42 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb4 11:17:42 miniupnpd: shutting down MiniUPnPd
Feb4 11:17:43 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 11:17:44 miniupnpd: version 1.9 started
Feb4 11:17:44 miniupnpd: HTTP listening on port 50142
Feb4 11:17:44 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 11:17:46 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb4 11:17:46 kernel: HTB: quantum of class 20030 is big. Consider r2q change.
Feb4 11:17:48 kernel:*** ERROR: tdts_core_rule_parsing_trf_load() fail!
Feb4 11:17:49 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 11:17:49 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 11:17:49 kernel: sizeof forward pkt param = 192
Feb4 11:17:55 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb4 11:17:56 miniupnpd: shutting down MiniUPnPd
Feb4 11:17:56 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 11:17:56 miniupnpd: version 1.9 started
Feb4 11:17:57 kernel: tdts_udb: Unknown parameter `161'
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_ct_event_handler (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_devid_un_bootp (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_policy_match (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_usr_msg_handler (err 0)
Feb4 11:17:58 miniupnpd: HTTP listening on port 32962
Feb4 11:17:58 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_wan_detection (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol dev_wan (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol mode (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_unregister_qos_ops (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_get_action (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_devid_un_http_ua (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_do_fastpath_action (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_qos_data (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_register_qos_ops (err 0)
Feb4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_reg_func_find_ct (err 0)
Feb4 11:17:58 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 11:17:59 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 11:17:59 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 11:17:59 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 11:17:59 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb4 11:18:11 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 11:18:11 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 11:18:11 kernel: sizeof forward pkt param = 192
Feb4 11:18:24 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 11:18:25 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 11:18:25 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 11:18:25 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 11:18:25 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb4 11:18:25 rc_service: bwdpi_check 415:notify_rc start_firewall
Feb4 11:18:25 miniupnpd: shutting down MiniUPnPd
Feb4 11:18:25 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 11:18:26 miniupnpd: version 1.9 started
Feb4 11:18:26 miniupnpd: HTTP listening on port 36449
Feb4 11:18:26 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 11:34:22 roamast: wl1.1: add client to monitor list
Feb4 11:57:07 roamast: wl1.1: add client to monitor list
Feb4 12:02:11 rc_service: httpd 1741:notify_rc restart_wan_if 0
Feb4 12:02:11 pppd: Connection terminated.
Feb4 12:02:12 wan: udhcpc done
Feb4 12:02:14 wan: ==
Feb4 12:02:14 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb4 12:02:14 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb4 12:02:15 pppd: Connect: ppp0 <--> eth0
Feb4 12:02:15 pppd: PAP authentication succeeded
Feb4 12:02:15 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb4 12:02:15 pppd: localIP address 14.135.64.229
Feb4 12:02:15 pppd: remote IP address 14.135.64.1
Feb4 12:02:15 pppd: primary   DNS address 118.118.118.11
Feb4 12:02:15 pppd: secondary DNS address 202.100.96.68
Feb4 12:02:15 rc_service: ip-up 4646:notify_rc start_firewall
Feb4 12:02:16 miniupnpd: delete_filter_rule() : iptc_commit(): Resource temporarily unavailable
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9906 -> 192.168.1.100:9906 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9907 -> 192.168.1.100:9907 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9908 -> 192.168.1.100:9908 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8730 -> 192.168.1.100:8730 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 51417 -> 192.168.1.100:51417 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 51417 -> 192.168.1.100:51417 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8001 -> 192.168.1.100:8001 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 21000 -> 192.168.1.100:21000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9800 -> 192.168.1.100:9800 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9802 -> 192.168.1.100:9802 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 38000 -> 192.168.1.100:38000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 44300 -> 192.168.1.100:44300 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 3306 -> 192.168.1.100:3306 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 1868 -> 192.168.1.100:1868 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 22220 -> 192.168.1.100:22220 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8000 -> 192.168.1.100:8000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8809 -> 192.168.1.100:8809 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8200 -> 192.168.1.100:8200 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8200 -> 192.168.1.100:8200 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 5001 -> 192.168.1.100:5001 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 5001 -> 192.168.1.100:5001 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 3689 -> 192.168.1.100:3689 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 3689 -> 192.168.1.100:3689 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8008 -> 192.168.1.100:8008 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8008 -> 192.168.1.100:8008 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8009 -> 192.168.1.100:8009 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8009 -> 192.168.1.100:8009 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8010 -> 192.168.1.100:8010 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8010 -> 192.168.1.100:8010 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8011 -> 192.168.1.100:8011 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8011 -> 192.168.1.100:8011 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8012 -> 192.168.1.100:8012 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8012 -> 192.168.1.100:8012 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8807 -> 192.168.1.100:8807 protocol UDP
Feb4 12:02:16 wan: finish adding multi routes
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 5548 -> 192.168.1.100:5548 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 1884 -> 192.168.1.100:1884 protocol TCP
Feb4 12:02:16 rc_service: ip-up 4646:notify_rc stop_upnp
Feb4 12:02:16 rc_service: waitting "start_firewall" via ip-up ...
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 12000 -> 192.168.1.100:12000 protocol TCP
Feb4 12:02:16 ntp: start NTP update
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 14000 -> 192.168.1.100:14000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 60000 -> 192.168.1.100:60000 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 36667 -> 192.168.1.100:36667 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 1828 -> 192.168.1.100:1828 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 1828 -> 192.168.1.100:1828 protocol UDP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9900 -> 192.168.1.100:9900 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9901 -> 192.168.1.100:9901 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9902 -> 192.168.1.100:9902 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9903 -> 192.168.1.100:9903 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9904 -> 192.168.1.100:9904 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9905 -> 192.168.1.100:9905 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9906 -> 192.168.1.100:9906 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9907 -> 192.168.1.100:9907 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 9908 -> 192.168.1.100:9908 protocol TCP
Feb4 12:02:16 miniupnpd: add_filter_rule() : chain FUPNP not found
Feb4 12:02:16 miniupnpd: Failed to redirect 8730 -> 192.168.1.100:8730 protocol TCP
Feb4 12:02:16 miniupnpd: shutting down MiniUPnPd
Feb4 12:02:16 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 12:02:17 miniupnpd: version 1.9 started
Feb4 12:02:17 miniupnpd: HTTP listening on port 40056
Feb4 12:02:17 rc_service: ip-up 4646:notify_rc start_upnp
Feb4 12:02:17 rc_service: waitting "stop_upnp" via ip-up ...
Feb4 12:02:17 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 12:02:17 miniupnpd: shutting down MiniUPnPd
Feb4 12:02:18 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb4 12:02:19 ddns update: ez-ipupdate: starting...
Feb4 12:02:19 miniupnpd: version 1.9 started
Feb4 12:02:19 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb4 12:02:19 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 04:02:18 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb4 12:02:19 ddns update: retval= 0, ddns_return_code (,200)
Feb4 12:02:19 ddns update: asusddns_update: 0
Feb4 12:02:19 miniupnpd: HTTP listening on port 56620
Feb4 12:02:19 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 12:02:19 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 12:02:19 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 12:02:19 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 12:02:19 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 12:02:19 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb4 12:02:20 ddns: ddns update ok
Feb4 12:02:26 rc_service: zcip 4743:notify_rc start_firewall
Feb4 12:02:26 zcip client: configured 169.254.72.55
Feb4 12:02:27 miniupnpd: shutting down MiniUPnPd
Feb4 12:02:27 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 12:02:27 miniupnpd: version 1.9 started
Feb4 12:02:27 miniupnpd: HTTP listening on port 49274
Feb4 12:02:27 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 12:51:32 roamast: wl1.1: add client to monitor list
Feb4 13:04:37 roamast: eth2: add client to monitor list
Feb4 13:06:26 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb4 13:06:26 miniupnpd: shutting down MiniUPnPd
Feb4 13:06:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 13:06:27 miniupnpd: version 1.9 started
Feb4 13:06:29 miniupnpd: HTTP listening on port 43318
Feb4 13:06:29 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 13:06:29 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 13:06:29 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 13:06:29 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 13:06:29 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 13:06:29 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 13:06:29 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 13:06:30 kernel: sizeof forward pkt param = 192
Feb4 13:06:47 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb4 13:06:47 kernel: UDB Core Version: 0.2.14 r3529123
Feb4 13:06:47 kernel: sizeof forward pkt param = 192
Feb4 13:06:59 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb4 13:06:59 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb4 13:06:59 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb4 13:06:59 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb4 13:06:59 rc_service: bwdpi_check 415:notify_rc start_firewall
Feb4 13:06:59 miniupnpd: shutting down MiniUPnPd
Feb4 13:06:59 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb4 13:07:00 miniupnpd: version 1.9 started
Feb4 13:07:00 miniupnpd: HTTP listening on port 41162
Feb4 13:07:00 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb4 17:44:42 roamast: wl1.1: add client to monitor list
Feb4 18:31:52 roamast: eth2: add client to monitor list
Feb4 18:33:12 roamast: wl1.1: add client to monitor list
Feb4 23:00:42 disk_monitor: Got SIGALRM...
Feb4 23:03:32 roamast: eth1: add client to monitor list
Feb4 23:59:02 roamast: wl1.1: add client to monitor list
Feb5 00:02:16 ntp: start NTP update
Feb5 05:40:24 pppd: Connection terminated.
Feb5 05:40:25 pppd: Modem hangup
Feb5 05:40:25 WAN Connection: Fail to connect with some issues.
Feb5 05:40:26 DualWAN: skip single wan wan_led_control - WANRED off
Feb5 05:40:26 nat: apply redirect rules
Feb5 05:40:35 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb5 05:40:35 pppd: Connect: ppp0 <--> eth0
Feb5 05:40:35 pppd: PAP authentication succeeded
Feb5 05:40:35 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb5 05:40:35 pppd: localIP address 222.75.136.67
Feb5 05:40:35 pppd: remote IP address 222.75.136.1
Feb5 05:40:35 pppd: primary   DNS address 118.118.118.11
Feb5 05:40:35 pppd: secondary DNS address 202.100.96.68
Feb5 05:40:35 rc_service: ip-up 29037:notify_rc start_firewall
Feb5 05:40:36 wan: finish adding multi routes
Feb5 05:40:36 rc_service: ip-up 29037:notify_rc stop_upnp
Feb5 05:40:36 rc_service: waitting "start_firewall" via ip-up ...
Feb5 05:40:36 ntp: start NTP update
Feb5 05:40:36 wan: finish adding multi routes
Feb5 05:40:36 miniupnpd: shutting down MiniUPnPd
Feb5 05:40:36 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 05:40:37 miniupnpd: version 1.9 started
Feb5 05:40:37 rc_service: ip-up 29037:notify_rc start_upnp
Feb5 05:40:37 rc_service: waitting "stop_upnp" via ip-up ...
Feb5 05:40:37 miniupnpd: HTTP listening on port 58994
Feb5 05:40:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 05:40:37 miniupnpd: shutting down MiniUPnPd
Feb5 05:40:38 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb5 05:40:38 ddns update: ez-ipupdate: starting...
Feb5 05:40:38 miniupnpd: version 1.9 started
Feb5 05:40:38 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb5 05:40:39 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 21:40:38 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb5 05:40:39 ddns update: retval= 0, ddns_return_code (,200)
Feb5 05:40:39 ddns update: asusddns_update: 0
Feb5 05:40:39 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb5 05:40:39 miniupnpd: HTTP listening on port 33508
Feb5 05:40:39 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb5 05:40:39 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb5 05:40:39 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb5 05:40:39 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 05:40:39 ddns: ddns update ok
Feb5 05:40:41 WAN Connection: WAN was restored.
Feb5 05:40:42 ntp: start NTP update
Feb5 05:50:32 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb5 05:50:32 kernel: UDB Core Version: 0.2.14 r3529123
Feb5 05:50:32 kernel: sizeof forward pkt param = 192
Feb5 05:52:04 rc_service: httpd 1741:notify_rc restart_firewall
Feb5 05:52:04 rc_service: httpd 1741:notify_rc restart_firewall;restart_wrs
Feb5 05:52:04 rc_service: waitting "restart_firewall" via httpd ...
Feb5 05:52:04 miniupnpd: shutting down MiniUPnPd
Feb5 05:52:04 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 05:52:05 miniupnpd: version 1.9 started
Feb5 05:52:05 miniupnpd: HTTP listening on port 51495
Feb5 05:52:05 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 05:52:05 miniupnpd: shutting down MiniUPnPd
Feb5 05:52:05 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 05:52:06 miniupnpd: version 1.9 started
Feb5 05:52:06 miniupnpd: HTTP listening on port 44619
Feb5 05:52:06 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 05:52:12 hour monitor: daemon is starting
Feb5 07:22:12 roamast: wl1.1: add client to monitor list
Feb5 08:07:22 roamast: wl1.1: add client to monitor list
Feb5 08:48:42 roamast: wl1.1: add client to monitor list
Feb5 12:24:57 roamast: wl1.1: add client to monitor list
Feb5 14:09:02 pppd: Connection terminated.
Feb5 14:09:02 WAN Connection: Fail to connect with some issues.
Feb5 14:09:02 pppd: Modem hangup
Feb5 14:09:02 DualWAN: skip single wan wan_led_control - WANRED off
Feb5 14:09:03 miniupnpd: addnatrule() : iptc_commit() error : Invalid argument
Feb5 14:09:03 miniupnpd: Failed to redirect 36667 -> 192.168.1.100:36667 protocol UDP
Feb5 14:09:03 nat: apply redirect rules
Feb5 14:09:12 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb5 14:09:12 pppd: Connect: ppp0 <--> eth0
Feb5 14:09:12 pppd: PAP authentication succeeded
Feb5 14:09:12 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb5 14:09:12 pppd: localIP address 36.103.106.38
Feb5 14:09:12 pppd: remote IP address 36.103.104.1
Feb5 14:09:12 pppd: primary   DNS address 118.118.118.11
Feb5 14:09:12 pppd: secondary DNS address 202.100.96.68
Feb5 14:09:12 rc_service: ip-up 9681:notify_rc start_firewall
Feb5 14:09:13 wan: finish adding multi routes
Feb5 14:09:13 rc_service: ip-up 9681:notify_rc stop_upnp
Feb5 14:09:13 rc_service: waitting "start_firewall" via ip-up ...
Feb5 14:09:13 ntp: start NTP update
Feb5 14:09:12 WAN Connection: WAN was restored.
Feb5 14:09:12 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0) error!
Feb5 14:09:13 miniupnpd: shutting down MiniUPnPd
Feb5 14:09:13 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 14:09:13 miniupnpd: version 1.9 started
Feb5 14:09:14 rc_service: ip-up 9681:notify_rc start_upnp
Feb5 14:09:14 rc_service: waitting "stop_upnp" via ip-up ...
Feb5 14:09:16 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb5 14:09:16 ddns update: ez-ipupdate: starting...
Feb5 14:09:16 miniupnpd: version 1.9 started
Feb5 14:09:16 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb5 14:09:17 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Mon, 05 Feb 2018 06:09:16 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb5 14:09:17 ddns update: retval= 0, ddns_return_code (,200)
Feb5 14:09:17 ddns update: asusddns_update: 0
Feb5 14:09:18 ddns: ddns update ok
Feb5 14:09:21 miniupnpd: HTTP listening on port 34860
Feb5 14:09:21 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 14:09:22 rc_service: ip-up 9681:notify_rc start_firewall
Feb5 14:09:22 miniupnpd: shutting down MiniUPnPd
Feb5 14:09:22 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb5 14:09:22 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb5 14:09:22 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb5 14:09:22 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb5 14:09:22 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb5 14:09:23 miniupnpd: version 1.9 started
Feb5 14:09:25 miniupnpd: HTTP listening on port 52346
Feb5 14:09:25 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb5 17:59:41 roamast: wl1.1: add client to monitor list
Feb5 18:39:16 roamast: eth2: add client to monitor list
Feb5 18:57:01 roamast: eth1: add client to monitor list
Feb5 20:58:41 roamast: wl1.1: add client to monitor list
Feb5 21:00:01 roamast: wl1.1: add client to monitor list
Feb6 02:09:09 ntp: start NTP update
Feb6 07:40:16 roamast: wl1.1: add client to monitor list
Feb6 10:48:17 rc_service: rc 6671:notify_rc restart_wrs
Feb6 12:07:36 roamast: wl1.1: add client to monitor list
Feb6 12:35:36 roamast: wl1.1: add client to monitor list
Feb6 13:35:01 roamast: wl1.1: add client to monitor list
Feb6 14:09:09 ntp: start NTP update
Feb6 17:27:20 roamast: wl1.1: add client to monitor list
Feb6 18:00:15 roamast: wl1.1: add client to monitor list
Feb6 19:06:50 roamast: eth1: add client to monitor list
Feb6 19:39:59 miniupnpd: upnp_event_process_notify: connect(192.168.1.159:2869): No route to host
Feb6 20:51:24 miniupnpd: upnp_event_send: send(): Connection reset by peer
Feb7 02:09:06 ntp: start NTP update
Feb7 05:35:15 roamast: eth1: add client to monitor list
Feb7 06:13:18 WAN Connection: Fail to connect with some issues.
Feb7 06:13:18 DualWAN: skip single wan wan_led_control - WANRED off
Feb7 06:13:19 nat: apply redirect rules
Feb7 06:13:20 pppd: Connection terminated.
Feb7 06:13:20 pppd: Modem hangup
Feb7 06:13:30 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb7 06:13:30 pppd: Connect: ppp0 <--> eth0
Feb7 06:13:31 pppd: PAP authentication succeeded
Feb7 06:13:31 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb7 06:13:31 pppd: localIP address 111.113.210.229
Feb7 06:13:31 pppd: remote IP address 111.113.208.1
Feb7 06:13:31 pppd: primary   DNS address 118.118.118.11
Feb7 06:13:31 pppd: secondary DNS address 202.100.96.68
Feb7 06:13:31 rc_service: ip-up 3097:notify_rc start_firewall
Feb7 06:13:31 wan: finish adding multi routes
Feb7 06:13:31 rc_service: ip-up 3097:notify_rc stop_upnp
Feb7 06:13:31 rc_service: waitting "start_firewall" via ip-up ...
Feb7 06:13:31 ntp: start NTP update
Feb7 06:13:32 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 06:13:33 WAN Connection: WAN was restored.
Feb7 06:13:33 miniupnpd: version 1.9 started
Feb7 06:13:33 rc_service: ip-up 3097:notify_rc start_upnp
Feb7 06:13:33 rc_service: waitting "stop_upnp" via ip-up ...
Feb7 06:13:34 miniupnpd: HTTP listening on port 56850
Feb7 06:13:34 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 06:13:34 miniupnpd: shutting down MiniUPnPd
Feb7 06:13:34 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 06:13:34 miniupnpd: version 1.9 started
Feb7 06:13:35 ddns update: ez-ipupdate: starting...
Feb7 06:13:35 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb7 06:13:35 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Tue, 06 Feb 2018 22:13:35 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb7 06:13:35 ddns update: retval= 0, ddns_return_code (,200)
Feb7 06:13:35 ddns update: asusddns_update: 0
Feb7 06:13:36 ddns: ddns update ok
Feb7 06:13:36 miniupnpd: HTTP listening on port 42188
Feb7 06:13:36 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 06:13:51 rc_service: ip-up 3097:notify_rc start_firewall
Feb7 06:13:51 miniupnpd: shutting down MiniUPnPd
Feb7 06:13:51 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 06:13:52 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb7 06:13:52 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb7 06:13:52 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb7 06:13:52 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb7 06:13:52 miniupnpd: version 1.9 started
Feb7 06:13:52 miniupnpd: HTTP listening on port 37856
Feb7 06:13:52 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 07:44:15 roamast: wl1.1: add client to monitor list
Feb7 08:49:55 roamast: wl1.1: add client to monitor list
Feb7 09:04:15 roamast: wl1.1: add client to monitor list
Feb7 12:10:50 roamast: wl1.1: add client to monitor list
Feb7 13:29:55 roamast: wl1.1: add client to monitor list
Feb7 13:44:05 roamast: wl1.1: add client to monitor list
Feb7 17:09:55 roamast: wl1.1: add client to monitor list
Feb7 18:58:10 roamast: eth2: add client to monitor list
Feb7 18:59:30 roamast: wl1.1: add client to monitor list
Feb 14 08:00:16 syslogd started: BusyBox v1.17.4
Feb 14 08:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:16 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:16 kernel: Machine: Northstar Prototype
Feb 14 08:00:16 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 08:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:16 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:16 kernel: Virtual kernel memory layout:
Feb 14 08:00:16 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:16 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:16 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:16 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:16 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:16 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 08:00:16 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:16 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:16 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:16 kernel: * Invalid signature of oopsbuf: E1-45-A1-28-49-C0-E1-B8 (len 2967688019)
Feb 14 08:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:16 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:16 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:128MB
Feb 14 08:00:16 kernel: Block size:128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 nat: apply redirect rules
Feb 14 08:00:17 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:17 kernel: pflash: found no supported devices
Feb 14 08:00:17 kernel: bcmsflash: found no supported devices
Feb 14 08:00:17 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:17 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:17 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:17 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:17 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:17 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:17 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:20 dnsmasq: warning: no upstream servers configured
Feb 14 08:00:20 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:20 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:21 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:21 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:22 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:23 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:23 AAE: AAE Service is started
Feb 14 08:00:23 jffs2: valid logs(1)
Feb 14 08:00:23 disk monitor: be idle
Feb 14 08:00:23 hour monitor: daemon is starting
Feb 14 08:00:23 Mastiff: init
Feb 14 08:00:23 miniupnpd: version 1.9 started
Feb 14 08:00:23 miniupnpd: HTTP listening on port 49363
Feb 14 08:00:23 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:24 wan: ==
Feb 14 08:00:24 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:27 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:27 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:28 kernel: SCSI subsystem initialized
Feb 14 08:00:36 rc_service: zcip 586:notify_rc start_firewall
Feb 14 08:00:36 zcip client: configured 169.254.72.55
Feb 14 08:00:36 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:36 nat: apply nat rules (/tmp/nat_rules__eth0)
Feb 14 08:00:37 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:37 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:37 miniupnpd: version 1.9 started
Feb 14 08:00:37 miniupnpd: HTTP listening on port 39976
Feb 14 08:00:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:39 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:39 pppd: Connect: ppp0 <--> eth0
Feb 14 08:00:39 pppd: PAP authentication succeeded
Feb 14 08:00:39 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:40 pppd: localIP address 14.134.10.226
Feb 14 08:00:40 pppd: remote IP address 14.134.8.1
Feb 14 08:00:40 pppd: primary   DNS address 118.118.118.11
Feb 14 08:00:40 pppd: secondary DNS address 202.100.96.68
Feb 14 08:00:40 rc_service: ip-up 642:notify_rc start_firewall
Feb 14 08:00:41 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:41 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:41 wan: finish adding multi routes
Feb 14 08:00:41 rc_service: ip-up 642:notify_rc stop_upnp
Feb 14 08:00:41 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:41 WAN Connection: WAN was restored.
Feb 14 08:00:41 ntp: start NTP update
Feb 14 08:00:42 miniupnpd: version 1.9 started
Feb 14 08:00:42 miniupnpd: HTTP listening on port 55984
Feb 14 08:00:42 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:42 rc_service: ip-up 642:notify_rc start_upnp
Feb 14 08:00:42 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:42 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:43 miniupnpd: version 1.9 started
Feb 14 08:00:43 miniupnpd: HTTP listening on port 37594
Feb 14 08:00:43 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:44 roamast: eth2: add client to monitor list
Feb 14 08:00:45 ntp: start NTP update
Feb7 19:03:27 rc_service: ntp 667:notify_rc restart_upnp
Feb7 19:03:27 miniupnpd: shutting down MiniUPnPd
Feb7 19:03:27 rc_service: ntp 667:notify_rc restart_diskmon
Feb7 19:03:27 disk_monitor: Finish
Feb7 19:03:27 miniupnpd: version 1.9 started
Feb7 19:03:27 miniupnpd: HTTP listening on port 43288
Feb7 19:03:27 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:03:28 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 19:03:28 ddns update: ez-ipupdate: starting...
Feb7 19:03:28 disk monitor: be idle
Feb7 19:03:32 watchdog: start ddns.
Feb7 19:03:32 rc_service: watchdog 385:notify_rc restart_ddns
Feb7 19:03:32 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 19:03:33 ddns update: ez-ipupdate: starting...
Feb7 19:03:41 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb7 19:03:41 kernel: UDB Core Version: 0.2.14 r3529123
Feb7 19:03:41 kernel: sizeof forward pkt param = 192
Feb7 19:03:43 crond: time disparity of 516183 minutes detected
Feb7 19:03:46 rc_service: ip-up 642:notify_rc start_firewall
Feb7 19:03:47 miniupnpd: shutting down MiniUPnPd
Feb7 19:03:47 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 19:03:47 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb7 19:03:47 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb7 19:03:47 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb7 19:03:47 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb7 19:03:48 miniupnpd: version 1.9 started
Feb7 19:03:48 miniupnpd: HTTP listening on port 50567
Feb7 19:03:48 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:04:02 watchdog: start ddns.
Feb7 19:04:02 rc_service: watchdog 385:notify_rc start_ddns
Feb7 19:04:02 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 19:04:02 ddns update: ez-ipupdate: starting...
Feb7 19:04:03 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb7 19:04:03 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 11:04:02 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb7 19:04:03 ddns update: retval= 0, ddns_return_code (,200)
Feb7 19:04:03 ddns update: asusddns_update: 0
Feb7 19:04:03 ddns: ddns update ok
Feb7 19:05:01 rc_service: service 1229:notify_rc restart_letsencrypt
Feb7 19:05:05 hour monitor: ntp sync fail, will retry after 120 sec
Feb7 19:05:11 roamast: eth2: add client to monitor list
Feb7 19:05:11 roamast: wl1.1: add client to monitor list
Feb7 19:05:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/73r9I0PHZk7unVNKi-CBuBHHHf8E5tL4rNKev6qElfg/3375327968: bad response
Feb7 19:05:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/9oVAs6TDWuGS8KwA9PrzZiBShMxDvWJYcWjEGbreGDo: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/73r9I0PHZk7unVNKi-CBuBHHHf8E5tL4rNKev6qElfg/3375327968", "token": "9oVAs6TDWuGS8KwA9PrzZiBShMxDvWJYcWjEGbreGDo", "keyAuthorization": "9oVAs6TDWuGS8K
Feb7 19:09:24 pppd: Connection terminated.
Feb7 19:09:24 pppd: Modem hangup
Feb7 19:09:25 WAN Connection: Fail to connect with some issues.
Feb7 19:09:25 DualWAN: skip single wan wan_led_control - WANRED off
Feb7 19:09:26 nat: apply redirect rules
Feb7 19:09:34 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb7 19:09:34 pppd: Connect: ppp0 <--> eth0
Feb7 19:09:34 pppd: PAP authentication succeeded
Feb7 19:09:34 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb7 19:09:34 pppd: localIP address 14.134.8.18
Feb7 19:09:34 pppd: remote IP address 14.134.8.1
Feb7 19:09:34 pppd: primary   DNS address 118.118.118.11
Feb7 19:09:34 pppd: secondary DNS address 202.100.96.68
Feb7 19:09:34 rc_service: ip-up 1405:notify_rc start_firewall
Feb7 19:09:35 miniupnpd: shutting down MiniUPnPd
Feb7 19:09:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 19:09:35 wan: finish adding multi routes
Feb7 19:09:35 ntp: start NTP update
Feb7 19:09:35 rc_service: ip-up 1405:notify_rc stop_upnp
Feb7 19:09:35 rc_service: waitting "start_firewall" via ip-up ...
Feb7 19:09:35 miniupnpd: version 1.9 started
Feb7 19:09:35 miniupnpd: HTTP listening on port 39756
Feb7 19:09:35 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:09:36 rc_service: ip-up 1405:notify_rc start_upnp
Feb7 19:09:36 rc_service: waitting "stop_upnp" via ip-up ...
Feb7 19:09:36 miniupnpd: shutting down MiniUPnPd
Feb7 19:09:37 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 19:09:37 ddns update: ez-ipupdate: starting...
Feb7 19:09:37 miniupnpd: version 1.9 started
Feb7 19:09:37 miniupnpd: HTTP listening on port 44498
Feb7 19:09:37 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:09:39 WAN Connection: WAN was restored.
Feb7 19:09:42 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb7 19:09:43 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 11:09:41 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb7 19:09:43 ddns update: retval= 0, ddns_return_code (,200)
Feb7 19:09:43 ddns update: asusddns_update: 0
Feb7 19:09:43 ddns: ddns update ok
Feb7 19:09:53 rc_service: ip-up 1405:notify_rc start_firewall
Feb7 19:09:54 miniupnpd: shutting down MiniUPnPd
Feb7 19:09:54 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 19:09:54 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb7 19:09:54 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb7 19:09:54 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb7 19:09:54 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb7 19:09:55 miniupnpd: version 1.9 started
Feb7 19:09:55 miniupnpd: HTTP listening on port 54874
Feb7 19:09:55 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 19:10:01 rc_service: service 1565:notify_rc restart_letsencrypt
Feb7 19:10:11 roamast: wl1.1: add client to monitor list
Feb7 19:10:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/LmS4jCntmGe_8Rx7KIhv_54ni8utoiVvEy7IVF7nkIM/3375374659: bad response
Feb7 19:10:40 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/t6-yxN2xu5Iiwl5To_vJt24A5h99k-79ARFCWA76X4s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/LmS4jCntmGe_8Rx7KIhv_54ni8utoiVvEy7IVF7nkIM/3375374659", "token": "t6-yxN2xu5Iiwl5To_vJt24A5h99k-79ARFCWA76X4s", "keyAuthorization": "t6-yxN2xu5Iiwl
Feb7 19:11:26 roamast: eth2: add client to monitor list
Feb7 19:15:01 rc_service: service 1763:notify_rc restart_letsencrypt
Feb7 19:15:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/KnfbDSizir0-QXYBFLxYLGXEvPoEttI8N0jr27XOwOM/3375424395: bad response
Feb7 19:15:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/gjT-_YhVglJUxs4ZGnQBowhqrpN_4xcrEmlGsef0PrY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/KnfbDSizir0-QXYBFLxYLGXEvPoEttI8N0jr27XOwOM/3375424395", "token": "gjT-_YhVglJUxs4ZGnQBowhqrpN_4xcrEmlGsef0PrY", "keyAuthorization": "gjT-_YhVglJUxs
Feb7 19:20:01 rc_service: service 1957:notify_rc restart_letsencrypt
Feb7 19:20:42 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/edLLFpMybWoFZ8m4n_3zXW6-qsiKrdI4zKv00CfJ0hg/3375470525: bad response
Feb7 19:20:42 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/K6xyCxqa4w8IZX5Qym5mrjLIY1Zvppnh8-hgQFDI96c: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/edLLFpMybWoFZ8m4n_3zXW6-qsiKrdI4zKv00CfJ0hg/3375470525", "token": "K6xyCxqa4w8IZX5Qym5mrjLIY1Zvppnh8-hgQFDI96c", "keyAuthorization": "K6xyCxqa4w8IZX
Feb7 19:25:01 rc_service: service 2131:notify_rc restart_letsencrypt
Feb7 19:25:40 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/BqtNSYWjy36HMyMlGE1o5rtp8gbgSo54HnCDVtWftIw/3375515545: bad response
Feb7 19:25:40 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/0LRbCp3GmLPCcyLscMrS1X0K7ZtoV4jR3KoH6EEZtb4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/BqtNSYWjy36HMyMlGE1o5rtp8gbgSo54HnCDVtWftIw/3375515545", "token": "0LRbCp3GmLPCcyLscMrS1X0K7ZtoV4jR3KoH6EEZtb4", "keyAuthorization": "0LRbCp3GmLPCcy
Feb7 19:30:01 rc_service: service 2335:notify_rc restart_letsencrypt
Feb7 19:30:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:30:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:35:01 rc_service: service 2522:notify_rc restart_letsencrypt
Feb7 19:35:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:35:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:40:01 rc_service: service 2730:notify_rc restart_letsencrypt
Feb7 19:40:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:40:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:45:01 rc_service: service 2906:notify_rc restart_letsencrypt
Feb7 19:45:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:45:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:50:01 rc_service: service 3099:notify_rc restart_letsencrypt
Feb7 19:50:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:50:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 19:55:01 rc_service: service 3299:notify_rc restart_letsencrypt
Feb7 19:55:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 19:55:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:00:01 rc_service: service 3522:notify_rc restart_letsencrypt
Feb7 20:00:26 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:00:26 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:05:01 rc_service: service 3723:notify_rc restart_letsencrypt
Feb7 20:05:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/vLiU6Kn-oz4eg0kjcCNXwThdEOyFM6W8zemGnJ8rQwE/3375900419: bad response
Feb7 20:05:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/0wsSI3mYk6EfI6OD3dVxwYFfriHSdQouy9PDVnDgbjY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/vLiU6Kn-oz4eg0kjcCNXwThdEOyFM6W8zemGnJ8rQwE/3375900419", "token": "0wsSI3mYk6EfI6OD3dVxwYFfriHSdQouy9PDVnDgbjY", "keyAuthorization": "0wsSI3mYk6EfI6
Feb7 20:10:01 rc_service: service 3933:notify_rc restart_letsencrypt
Feb7 20:10:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:10:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:15:01 rc_service: service 4114:notify_rc restart_letsencrypt
Feb7 20:15:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/PAFEOOpQCI0Hy6T-r8kMoyTzAK93h6WUIrh7x9XEfIo/3375992845: bad response
Feb7 20:15:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/m2-Mkvpcq-R_4VwR1MiDB_FRUY6oVugV2gWPfCHioVM: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/PAFEOOpQCI0Hy6T-r8kMoyTzAK93h6WUIrh7x9XEfIo/3375992845", "token": "m2-Mkvpcq-R_4VwR1MiDB_FRUY6oVugV2gWPfCHioVM", "keyAuthorization": "m2-Mkvpcq-R_4V
Feb7 20:20:01 rc_service: service 4319:notify_rc restart_letsencrypt
Feb7 20:20:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/iN5WFvIm_ka-NtU2DDXz3MwQfWeDPwq56dILWCUhwJY/3376041045: bad response
Feb7 20:20:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/4dkooKUhFTKSjOyBUpltxdYbfuHdBZcBR-gJgQJLvoY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/iN5WFvIm_ka-NtU2DDXz3MwQfWeDPwq56dILWCUhwJY/3376041045", "token": "4dkooKUhFTKSjOyBUpltxdYbfuHdBZcBR-gJgQJLvoY", "keyAuthorization": "4dkooKUhFTKSjO
Feb7 20:25:01 rc_service: service 4531:notify_rc restart_letsencrypt
Feb7 20:25:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/z7hAy5p6ADGuYnrXJby8f6xT8-HlKfLT9oq8QxdRhFw/3376088779: bad response
Feb7 20:25:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/REZ04fmJnLCoGhOliu-61dX49WdMBmjYrbhgPDjOIHs: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/z7hAy5p6ADGuYnrXJby8f6xT8-HlKfLT9oq8QxdRhFw/3376088779", "token": "REZ04fmJnLCoGhOliu-61dX49WdMBmjYrbhgPDjOIHs", "keyAuthorization": "REZ04fmJnLCoGh
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 20:30:01 rc_service: service 4725:notify_rc restart_letsencrypt
Feb7 20:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/qwTqKJ5ksgB2bU9iA1yeTcx970VQ_MXsFXtsfC0AsJA/3376133444: bad response
Feb7 20:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/8qjJ0U8XoJmQkCQaDvPiCYX01N-36LR6oyO9iIsiuvg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/qwTqKJ5ksgB2bU9iA1yeTcx970VQ_MXsFXtsfC0AsJA/3376133444", "token": "8qjJ0U8XoJmQkCQaDvPiCYX01N-36LR6oyO9iIsiuvg", "keyAuthorization": "8qjJ0U8XoJmQkC
Feb7 20:35:01 rc_service: service 4910:notify_rc restart_letsencrypt
Feb7 20:35:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:35:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:40:01 rc_service: service 5091:notify_rc restart_letsencrypt
Feb7 20:40:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:40:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:45:01 rc_service: service 5282:notify_rc restart_letsencrypt
Feb7 20:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:50:01 rc_service: service 5460:notify_rc restart_letsencrypt
Feb7 20:50:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:50:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 20:55:01 rc_service: service 5650:notify_rc restart_letsencrypt
Feb7 20:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 20:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:00:01 rc_service: service 5836:notify_rc restart_letsencrypt
Feb7 21:00:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:00:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:05:01 rc_service: service 6039:notify_rc restart_letsencrypt
Feb7 21:05:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:05:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:10:01 rc_service: service 6222:notify_rc restart_letsencrypt
Feb7 21:10:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/SEJkba2KTqx0lEPethz8PwJXuvn0JRP-pji_6cs7imE/3376500311: bad response
Feb7 21:10:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/vumoNpqWuaKUMwbJ49PCyTLDe-39_yrD0wMn2QC6YNc: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/SEJkba2KTqx0lEPethz8PwJXuvn0JRP-pji_6cs7imE/3376500311", "token": "vumoNpqWuaKUMwbJ49PCyTLDe-39_yrD0wMn2QC6YNc", "keyAuthorization": "vumoNpqWuaKUMw
Feb7 21:15:01 rc_service: service 6404:notify_rc restart_letsencrypt
Feb7 21:15:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:15:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:20:01 rc_service: service 6582:notify_rc restart_letsencrypt
Feb7 21:20:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/H46dOXkaBwX_Epyoqik2AgHgb70uUAsI-uhVfFfsu-k/3376567739: bad response
Feb7 21:20:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/GXiHbfSCB-C1t5qhVTeY7jabDeevDhYtmmBFbIUTDD4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/H46dOXkaBwX_Epyoqik2AgHgb70uUAsI-uhVfFfsu-k/3376567739", "token": "GXiHbfSCB-C1t5qhVTeY7jabDeevDhYtmmBFbIUTDD4", "keyAuthorization": "GXiHbfSCB-C1t5
Feb7 21:25:01 rc_service: service 6750:notify_rc restart_letsencrypt
Feb7 21:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/LB_v6C8NG7X9Foccpinhb6V1598K5fI5KlAlHBnAhY0/3376602714: bad response
Feb7 21:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/jchSUI3-t7IxNRu1Oj-Ul8xTfRgnODh6QEKEeDADeWY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/LB_v6C8NG7X9Foccpinhb6V1598K5fI5KlAlHBnAhY0/3376602714", "token": "jchSUI3-t7IxNRu1Oj-Ul8xTfRgnODh6QEKEeDADeWY", "keyAuthorization": "jchSUI3-t7IxNR
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 21:30:01 rc_service: service 6952:notify_rc restart_letsencrypt
Feb7 21:30:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/fKYDO7yQG7z7w7kFN_1GPS3nz3xzzh8KN5dpGa1-vYs/3376638209: bad response
Feb7 21:30:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/ZfGlx8-NOXWy6F8fQFYlCAKrJ6uqm5abBlAwNVn1nTQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/fKYDO7yQG7z7w7kFN_1GPS3nz3xzzh8KN5dpGa1-vYs/3376638209", "token": "ZfGlx8-NOXWy6F8fQFYlCAKrJ6uqm5abBlAwNVn1nTQ", "keyAuthorization": "ZfGlx8-NOXWy6F
Feb7 21:35:01 rc_service: service 7156:notify_rc restart_letsencrypt
Feb7 21:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/WBW1TXIcGGV4ctISYSoOofogY48oXCsmGy3ELNMOt5M/3376672847: bad response
Feb7 21:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/WgSniVgEVPFtk0m1Zhs9EQfS3tN-cI1mqzYStoVs3s0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/WBW1TXIcGGV4ctISYSoOofogY48oXCsmGy3ELNMOt5M/3376672847", "token": "WgSniVgEVPFtk0m1Zhs9EQfS3tN-cI1mqzYStoVs3s0", "keyAuthorization": "WgSniVgEVPFtk0
Feb7 21:40:01 rc_service: service 7344:notify_rc restart_letsencrypt
Feb7 21:40:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:40:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:45:01 rc_service: service 7525:notify_rc restart_letsencrypt
Feb7 21:45:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:45:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:50:01 rc_service: service 7699:notify_rc restart_letsencrypt
Feb7 21:50:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:50:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 21:55:01 rc_service: service 7879:notify_rc restart_letsencrypt
Feb7 21:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 21:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 22:00:01 rc_service: service 8049:notify_rc restart_letsencrypt
Feb7 22:00:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 22:00:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 22:05:01 rc_service: service 8221:notify_rc restart_letsencrypt
Feb7 22:05:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 22:05:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 22:10:01 rc_service: service 8388:notify_rc restart_letsencrypt
Feb7 22:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb7 22:10:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb7 22:15:01 rc_service: service 8556:notify_rc restart_letsencrypt
Feb7 22:15:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/0YJcZQU8EJfv1QvDqWn2TZk3Q_iweenFcCdSn4jORDU/3376947249: bad response
Feb7 22:15:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/kzbD_kArREN1G-uC0MwadJuDMIwDsFOEx-qiop0Uo6k: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/0YJcZQU8EJfv1QvDqWn2TZk3Q_iweenFcCdSn4jORDU/3376947249", "token": "kzbD_kArREN1G-uC0MwadJuDMIwDsFOEx-qiop0Uo6k", "keyAuthorization": "kzbD_kArREN1G-
Feb7 22:18:51 roamast: wl1.1: add client to monitor list
Feb7 22:20:01 rc_service: service 8746:notify_rc restart_letsencrypt
Feb7 22:20:44 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/_Y-13Ji7sLolSLutBpgs5SkzRo5UPhe2s93cotak5B8/3376979122: bad response
Feb7 22:20:44 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/X_vm3oTtjj_ApcjVg5B3oBv0ZapVeAFMtSsc-ilOaMQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/_Y-13Ji7sLolSLutBpgs5SkzRo5UPhe2s93cotak5B8/3376979122", "token": "X_vm3oTtjj_ApcjVg5B3oBv0ZapVeAFMtSsc-ilOaMQ", "keyAuthorization": "X_vm3oTtjj_Apc
Feb7 22:25:01 rc_service: service 8929:notify_rc restart_letsencrypt
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 22:27:06 roamast: wl1.1: add client to monitor list
Feb7 22:58:01 roamast: wl1.1: add client to monitor list
Feb7 23:03:28 disk_monitor: Got SIGALRM...
Feb7 23:22:06 WAN Connection: Fail to connect with some issues.
Feb7 23:22:06 DualWAN: skip single wan wan_led_control - WANRED off
Feb7 23:22:07 nat: apply redirect rules
Feb7 23:22:08 pppd: Connection terminated.
Feb7 23:22:08 pppd: Modem hangup
Feb7 23:22:18 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb7 23:22:18 pppd: Connect: ppp0 <--> eth0
Feb7 23:22:18 pppd: PAP authentication succeeded
Feb7 23:22:18 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb7 23:22:18 pppd: localIP address 36.103.150.104
Feb7 23:22:18 pppd: remote IP address 36.103.148.1
Feb7 23:22:18 pppd: primary   DNS address 118.118.118.11
Feb7 23:22:18 pppd: secondary DNS address 202.100.96.68
Feb7 23:22:18 rc_service: ip-up 10431:notify_rc start_firewall
Feb7 23:22:19 wan: finish adding multi routes
Feb7 23:22:19 rc_service: ip-up 10431:notify_rc stop_upnp
Feb7 23:22:19 rc_service: waitting "start_firewall" via ip-up ...
Feb7 23:22:19 ntp: start NTP update
Feb7 23:22:20 miniupnpd: shutting down MiniUPnPd
Feb7 23:22:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 23:22:21 miniupnpd: version 1.9 started
Feb7 23:22:21 rc_service: ip-up 10431:notify_rc start_upnp
Feb7 23:22:21 rc_service: waitting "stop_upnp" via ip-up ...
Feb7 23:22:22 WAN Connection: WAN was restored.
Feb7 23:22:23 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb7 23:22:23 ddns update: ez-ipupdate: starting...
Feb7 23:22:24 miniupnpd: version 1.9 started
Feb7 23:22:24 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb7 23:22:24 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 15:22:22 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb7 23:22:24 ddns update: retval= 0, ddns_return_code (,200)
Feb7 23:22:24 ddns update: asusddns_update: 0
Feb7 23:22:24 miniupnpd: HTTP listening on port 56655
Feb7 23:22:24 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 23:22:25 ddns: ddns update ok
Feb7 23:22:40 rc_service: ip-up 10431:notify_rc start_firewall
Feb7 23:22:40 miniupnpd: shutting down MiniUPnPd
Feb7 23:22:40 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb7 23:22:40 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb7 23:22:41 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb7 23:22:41 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb7 23:22:41 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb7 23:22:41 miniupnpd: version 1.9 started
Feb7 23:22:41 miniupnpd: HTTP listening on port 46090
Feb7 23:22:41 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 01:30:54 pppd: Connection terminated.
Feb8 01:30:54 pppd: Modem hangup
Feb8 01:30:55 WAN Connection: Fail to connect with some issues.
Feb8 01:30:55 DualWAN: skip single wan wan_led_control - WANRED off
Feb8 01:30:55 nat: apply redirect rules
Feb8 01:31:04 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb8 01:31:04 pppd: Connect: ppp0 <--> eth0
Feb8 01:31:05 pppd: PAP authentication succeeded
Feb8 01:31:05 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb8 01:31:05 pppd: localIP address 222.75.136.117
Feb8 01:31:05 pppd: remote IP address 222.75.136.1
Feb8 01:31:05 pppd: primary   DNS address 118.118.118.11
Feb8 01:31:05 pppd: secondary DNS address 202.100.96.68
Feb8 01:31:05 rc_service: ip-up 13992:notify_rc start_firewall
Feb8 01:31:06 wan: finish adding multi routes
Feb8 01:31:06 rc_service: ip-up 13992:notify_rc stop_upnp
Feb8 01:31:06 rc_service: waitting "start_firewall" via ip-up ...
Feb8 01:31:06 ntp: start NTP update
Feb8 01:31:06 wan: finish adding multi routes
Feb8 01:31:07 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 01:31:07 miniupnpd: version 1.9 started
Feb8 01:31:08 rc_service: ip-up 13992:notify_rc start_upnp
Feb8 01:31:08 rc_service: waitting "stop_upnp" via ip-up ...
Feb8 01:31:08 miniupnpd: HTTP listening on port 33796
Feb8 01:31:08 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 01:31:08 miniupnpd: shutting down MiniUPnPd
Feb8 01:31:09 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 01:31:09 ddns update: ez-ipupdate: starting...
Feb8 01:31:09 miniupnpd: version 1.9 started
Feb8 01:31:09 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 01:31:11 WAN Connection: WAN was restored.
Feb8 01:31:11 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 17:31:11 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 01:31:11 ddns update: retval= 0, ddns_return_code (,200)
Feb8 01:31:11 ddns update: asusddns_update: 0
Feb8 01:31:12 ntp: start NTP update
Feb8 01:31:12 ddns: ddns update ok
Feb8 01:31:12 miniupnpd: HTTP listening on port 51743
Feb8 01:31:12 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 01:31:25 rc_service: ip-up 13992:notify_rc start_firewall
Feb8 01:31:26 miniupnpd: shutting down MiniUPnPd
Feb8 01:31:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 01:31:26 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb8 01:31:26 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb8 01:31:26 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb8 01:31:26 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb8 01:31:27 miniupnpd: version 1.9 started
Feb8 01:31:27 miniupnpd: HTTP listening on port 47802
Feb8 01:31:27 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:15:06 roamast: eth2: add client to monitor list
Feb8 05:25:17 WAN Connection: Fail to connect with some issues.
Feb8 05:25:17 pppd: Connection terminated.
Feb8 05:25:17 DualWAN: skip single wan wan_led_control - WANRED off
Feb8 05:25:17 pppd: Modem hangup
Feb8 05:25:18 nat: apply redirect rules
Feb8 05:25:28 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb8 05:25:28 pppd: Connect: ppp0 <--> eth0
Feb8 05:25:28 pppd: PAP authentication succeeded
Feb8 05:25:28 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb8 05:25:28 pppd: localIP address 222.75.138.149
Feb8 05:25:28 pppd: remote IP address 222.75.136.1
Feb8 05:25:28 pppd: primary   DNS address 118.118.118.11
Feb8 05:25:28 pppd: secondary DNS address 202.100.96.68
Feb8 05:25:28 rc_service: ip-up 19961:notify_rc start_firewall
Feb8 05:25:29 wan: finish adding multi routes
Feb8 05:25:29 rc_service: ip-up 19961:notify_rc stop_upnp
Feb8 05:25:29 rc_service: waitting "start_firewall" via ip-up ...
Feb8 05:25:29 ntp: start NTP update
Feb8 05:25:30 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 05:25:30 miniupnpd: version 1.9 started
Feb8 05:25:31 rc_service: ip-up 19961:notify_rc start_upnp
Feb8 05:25:31 rc_service: waitting "stop_upnp" via ip-up ...
Feb8 05:25:33 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 05:25:33 WAN Connection: WAN was restored.
Feb8 05:25:33 ddns update: ez-ipupdate: starting...
Feb8 05:25:33 miniupnpd: version 1.9 started
Feb8 05:25:33 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 05:25:33 miniupnpd: HTTP listening on port 44435
Feb8 05:25:33 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 05:25:34 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 21:25:33 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 05:25:34 ddns update: retval= 0, ddns_return_code (,200)
Feb8 05:25:34 ddns update: asusddns_update: 0
Feb8 05:25:35 ddns: ddns update ok
Feb8 05:25:49 rc_service: ip-up 19961:notify_rc start_firewall
Feb8 05:25:50 miniupnpd: shutting down MiniUPnPd
Feb8 05:25:50 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 05:25:50 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb8 05:25:50 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb8 05:25:50 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb8 05:25:50 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb8 05:25:50 miniupnpd: version 1.9 started
Feb8 05:25:51 miniupnpd: HTTP listening on port 49710
Feb8 05:25:51 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 05:49:16 roamast: eth2: add client to monitor list
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb8 12:05:56 roamast: wl1.1: add client to monitor list
Feb 14 08:00:16 syslogd started: BusyBox v1.17.4
Feb 14 08:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:16 kernel: CPU: ARMv7 Processor revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:16 kernel: Machine: Northstar Prototype
Feb 14 08:00:16 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.Total pages: 130048
Feb 14 08:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:16 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:16 kernel: Virtual kernel memory layout:
Feb 14 08:00:16 kernel:   vector: 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:16 kernel:   fixmap: 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:16 kernel:   DMA   : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:16 kernel:   vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:16 kernel:   lowmem: 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:16 kernel:   modules : 0x7f000000 - 0x80000000   (16 MB)
Feb 14 08:00:16 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:16 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:16 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:16 kernel: * Invalid signature of oopsbuf: ED-45-A1-28-4B-C0-F1-B8 (len 2967688019)
Feb 14 08:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:16 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:16 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:128MB
Feb 14 08:00:16 kernel: Block size:128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 nat: apply redirect rules
Feb 14 08:00:17 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:17 kernel: pflash: found no supported devices
Feb 14 08:00:17 kernel: bcmsflash: found no supported devices
Feb 14 08:00:17 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:17 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:17 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:17 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:17 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:17 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:17 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:18 kernel: Register interface MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:20 dnsmasq: warning: no upstream servers configured
Feb 14 08:00:20 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:20 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:21 lldpd: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:21 lldpd: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:22 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:23 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:23 AAE: AAE Service is started
Feb 14 08:00:23 disk monitor: be idle
Feb 14 08:00:23 jffs2: valid logs(1)
Feb 14 08:00:23 hour monitor: daemon is starting
Feb 14 08:00:23 miniupnpd: version 1.9 started
Feb 14 08:00:23 miniupnpd: HTTP listening on port 44203
Feb 14 08:00:23 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:23 Mastiff: init
Feb 14 08:00:24 wan: ==
Feb 14 08:00:24 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:24 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:24 pppd: Connect: ppp0 <--> eth0
Feb 14 08:00:29 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:29 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:29 kernel: SCSI subsystem initialized
Feb 14 08:00:31 pppd: PAP authentication succeeded
Feb 14 08:00:31 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:32 pppd: localIP address 14.135.47.158
Feb 14 08:00:32 pppd: remote IP address 14.135.44.1
Feb 14 08:00:32 pppd: primary   DNS address 118.118.118.11
Feb 14 08:00:32 pppd: secondary DNS address 202.100.96.68
Feb 14 08:00:32 rc_service: ip-up 599:notify_rc start_firewall
Feb 14 08:00:33 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:33 wan: finish adding multi routes
Feb 14 08:00:33 rc_service: ip-up 599:notify_rc stop_upnp
Feb 14 08:00:33 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:34 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:34 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:34 miniupnpd: version 1.9 started
Feb 14 08:00:34 miniupnpd: HTTP listening on port 59552
Feb 14 08:00:34 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:35 rc_service: ip-up 599:notify_rc start_upnp
Feb 14 08:00:35 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:35 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:36 miniupnpd: version 1.9 started
Feb 14 08:00:36 miniupnpd: HTTP listening on port 34339
Feb 14 08:00:36 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:36 rc_service: zcip 674:notify_rc start_firewall
Feb 14 08:00:36 zcip client: configured 169.254.72.55
Feb 14 08:00:37 miniupnpd: shutting down MiniUPnPd
Feb 14 08:00:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:37 WAN Connection: WAN was restored.
Feb 14 08:00:38 miniupnpd: version 1.9 started
Feb 14 08:00:38 miniupnpd: HTTP listening on port 42534
Feb 14 08:00:38 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:39 ntp: start NTP update
Feb8 12:11:45 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 12:11:45 rc_service: ntp 634:notify_rc restart_upnp
Feb8 12:11:45 miniupnpd: shutting down MiniUPnPd
Feb8 12:11:46 rc_service: ntp 634:notify_rc restart_diskmon
Feb8 12:11:46 disk_monitor: Finish
Feb8 12:11:46 miniupnpd: version 1.9 started
Feb8 12:11:46 miniupnpd: HTTP listening on port 36592
Feb8 12:11:46 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 12:11:46 ddns update: ez-ipupdate: starting...
Feb8 12:11:47 disk monitor: be idle
Feb8 12:11:49 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 12:11:50 roamast: wl1.1: add client to monitor list
Feb8 12:11:50 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 04:11:49 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 12:11:50 ddns update: retval= 0, ddns_return_code (,200)
Feb8 12:11:50 ddns update: asusddns_update: 0
Feb8 12:11:50 ddns: ddns update ok
Feb8 12:11:56 watchdog: start ddns.
Feb8 12:11:56 rc_service: watchdog 385:notify_rc restart_ddns
Feb8 12:11:56 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 12:11:57 ddns update: ez-ipupdate: starting...
Feb8 12:11:57 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 12:11:57 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 04:11:56 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 12:11:57 ddns update: retval= 0, ddns_return_code (,200)
Feb8 12:11:57 ddns update: asusddns_update: 0
Feb8 12:11:58 ddns: ddns update ok
Feb8 12:11:59 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb8 12:11:59 kernel: UDB Core Version: 0.2.14 r3529123
Feb8 12:12:00 kernel: sizeof forward pkt param = 192
Feb8 12:12:05 rc_service: ip-up 599:notify_rc start_firewall
Feb8 12:12:05 miniupnpd: shutting down MiniUPnPd
Feb8 12:12:05 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 12:12:05 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb8 12:12:05 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb8 12:12:06 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb8 12:12:06 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb8 12:12:06 miniupnpd: version 1.9 started
Feb8 12:12:06 miniupnpd: HTTP listening on port 48445
Feb8 12:12:06 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 12:12:07 crond: time disparity of 517211 minutes detected
Feb8 12:13:28 hour monitor: ntp sync fail, will retry after 120 sec
Feb8 12:15:01 rc_service: service 1274:notify_rc restart_letsencrypt
Feb8 12:15:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/OO44Vb-2J7fKMtjXV5BujFR3IkWDyGPGCwqQwHYEmJI/3383577670: bad response
Feb8 12:15:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/X89Yhgh7l4WrRfj8D8Rc8R7NXNjCAX38P5FfuvZkc7M: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/OO44Vb-2J7fKMtjXV5BujFR3IkWDyGPGCwqQwHYEmJI/3383577670", "token": "X89Yhgh7l4WrRfj8D8Rc8R7NXNjCAX38P5FfuvZkc7M", "keyAuthorization": "X89Yhgh7l4WrRf
Feb8 12:16:35 roamast: wl1.1: add client to monitor list
Feb8 12:20:01 rc_service: service 1493:notify_rc restart_letsencrypt
Feb8 12:20:46 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/kyNTsCQepj-Jj6Zx-XA2mjqBVGyf49PyNY4pZ9d57DE/3383612929: bad response
Feb8 12:20:46 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/cHrgk8lrt3LDqQGyb50G-MXHgTYQbB1HROrKm742OnU: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/kyNTsCQepj-Jj6Zx-XA2mjqBVGyf49PyNY4pZ9d57DE/3383612929", "token": "cHrgk8lrt3LDqQGyb50G-MXHgTYQbB1HROrKm742OnU", "keyAuthorization": "cHrgk8lrt3LDqQ
Feb8 12:25:01 rc_service: service 1676:notify_rc restart_letsencrypt
Feb8 12:25:43 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/XUC7hyGZmBVdAq_7IgTRCEm07dooqsD3OsX5ArdTsnk/3383649057: bad response
Feb8 12:25:43 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/SGiLa8WGGRqgVCPSeAO9pf7z8NGPpfoKv12WdM_xRnM: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/XUC7hyGZmBVdAq_7IgTRCEm07dooqsD3OsX5ArdTsnk/3383649057", "token": "SGiLa8WGGRqgVCPSeAO9pf7z8NGPpfoKv12WdM_xRnM", "keyAuthorization": "SGiLa8WGGRqgVC
Feb8 12:30:01 rc_service: service 1888:notify_rc restart_letsencrypt
Feb8 12:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/J7f73FC_ZdwK8z23WQQ54FJKQ9Qe_9923HCZis1xOGM/3383684402: bad response
Feb8 12:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/gJyzUhDEjwchdVbmUi5r7nKGXQqBXg8dvXIJ5ohqSaY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/J7f73FC_ZdwK8z23WQQ54FJKQ9Qe_9923HCZis1xOGM/3383684402", "token": "gJyzUhDEjwchdVbmUi5r7nKGXQqBXg8dvXIJ5ohqSaY", "keyAuthorization": "gJyzUhDEjwchdV
Feb8 12:35:01 rc_service: service 2070:notify_rc restart_letsencrypt
Feb8 12:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/8OE9ZRIQSk9gHCeV4XHfB1WvcgtnOtwY6YIsL9XkODo/3383720390: bad response
Feb8 12:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/w2wu9M4qcrLm816G1NpE6uDnew4U89eiK5ttp_zxbfg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/8OE9ZRIQSk9gHCeV4XHfB1WvcgtnOtwY6YIsL9XkODo/3383720390", "token": "w2wu9M4qcrLm816G1NpE6uDnew4U89eiK5ttp_zxbfg", "keyAuthorization": "w2wu9M4qcrLm81
Feb8 12:40:01 rc_service: service 2250:notify_rc restart_letsencrypt
Feb8 12:40:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 12:40:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 12:45:01 rc_service: service 2416:notify_rc restart_letsencrypt
Feb8 12:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 12:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 12:50:01 rc_service: service 2586:notify_rc restart_letsencrypt
Feb8 12:50:23 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 12:50:23 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 12:55:01 rc_service: service 2760:notify_rc restart_letsencrypt
Feb8 12:55:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 12:55:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:00:01 rc_service: service 2949:notify_rc restart_letsencrypt
Feb8 13:00:28 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:00:28 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:00:47 disk_monitor: Got SIGALRM...
Feb8 13:05:01 rc_service: service 3136:notify_rc restart_letsencrypt
Feb8 13:05:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:05:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:10:01 rc_service: service 3318:notify_rc restart_letsencrypt
Feb8 13:10:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:15:01 rc_service: service 3499:notify_rc restart_letsencrypt
Feb8 13:15:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:15:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:20:01 rc_service: service 3665:notify_rc restart_letsencrypt
Feb8 13:20:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/OzkwOpnbd4QLa15eEGwvL8qQh-mwGs9Zo5Y9AgYNbyI/3384071976: bad response
Feb8 13:20:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/KuJUuEXJC-DinxDYqSpraC_l_TRmViHQIUKylkwr58s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/OzkwOpnbd4QLa15eEGwvL8qQh-mwGs9Zo5Y9AgYNbyI/3384071976", "token": "KuJUuEXJC-DinxDYqSpraC_l_TRmViHQIUKylkwr58s", "keyAuthorization": "KuJUuEXJC-Dinx
Feb8 13:25:01 rc_service: service 3874:notify_rc restart_letsencrypt
Feb8 13:25:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/PB78BDPisYAGo0TSq69auD89fx7LcKQqXC59FTpxy3s/3384109591: bad response
Feb8 13:25:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/T5_Bcz7MxvyFGRQYQmbvvcH0qOjSarNEfcotgTejHN0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/PB78BDPisYAGo0TSq69auD89fx7LcKQqXC59FTpxy3s/3384109591", "token": "T5_Bcz7MxvyFGRQYQmbvvcH0qOjSarNEfcotgTejHN0", "keyAuthorization": "T5_Bcz7MxvyFGR
Feb8 13:30:01 rc_service: service 4061:notify_rc restart_letsencrypt
Feb8 13:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/JHfiBfiDC9tbCirV_MP8HpVanKpxFgrFKKSbyjkHmYk/3384150409: bad response
Feb8 13:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/9w-OWYMk0xTvH3RjWwrDFKaK-KsHm_fJjP5q96axkVQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/JHfiBfiDC9tbCirV_MP8HpVanKpxFgrFKKSbyjkHmYk/3384150409", "token": "9w-OWYMk0xTvH3RjWwrDFKaK-KsHm_fJjP5q96axkVQ", "keyAuthorization": "9w-OWYMk0xTvH3
Feb8 13:35:01 rc_service: service 4229:notify_rc restart_letsencrypt
Feb8 13:35:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/cvyLtS_4zj_GDbIOv4h8g17bSBkA6dIMYMj_wD30k-4/3384185149: bad response
Feb8 13:35:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/2TKeOTZdPjyv4fO0GYvX89bY_6CptjbdiSExJ6jzxro: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/cvyLtS_4zj_GDbIOv4h8g17bSBkA6dIMYMj_wD30k-4/3384185149", "token": "2TKeOTZdPjyv4fO0GYvX89bY_6CptjbdiSExJ6jzxro", "keyAuthorization": "2TKeOTZdPjyv4f
Feb8 13:40:01 rc_service: service 4398:notify_rc restart_letsencrypt
Feb8 13:40:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/h_misnPPv6AeKkyLgX2HcrW3-c2mp87P-cejIm1MM8k/3384218650: bad response
Feb8 13:40:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/QyGrRhMZQmjY1jfXyn8R6JYUin7ahawItEaleabUVVk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/h_misnPPv6AeKkyLgX2HcrW3-c2mp87P-cejIm1MM8k/3384218650", "token": "QyGrRhMZQmjY1jfXyn8R6JYUin7ahawItEaleabUVVk", "keyAuthorization": "QyGrRhMZQmjY1j
Feb8 13:45:01 rc_service: service 4565:notify_rc restart_letsencrypt
Feb8 13:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:50:01 rc_service: service 4771:notify_rc restart_letsencrypt
Feb8 13:50:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:50:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 13:55:01 rc_service: service 4938:notify_rc restart_letsencrypt
Feb8 13:55:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 13:55:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:00:01 rc_service: service 5148:notify_rc restart_letsencrypt
Feb8 14:00:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:00:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:05:01 rc_service: service 5344:notify_rc restart_letsencrypt
Feb8 14:05:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:05:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:10:01 rc_service: service 5521:notify_rc restart_letsencrypt
Feb8 14:10:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:15:01 rc_service: service 5712:notify_rc restart_letsencrypt
Feb8 14:15:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:15:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:20:01 rc_service: service 5888:notify_rc restart_letsencrypt
Feb8 14:20:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ycSeAgKWC7ZF9XOc3_kfr_Yr8HK2moalNYes_o8oLUI/3384500451: bad response
Feb8 14:20:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/dp5-M1Vob6pZXkCoqC0nwYF82_DnNDxqsX8psUC66HY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ycSeAgKWC7ZF9XOc3_kfr_Yr8HK2moalNYes_o8oLUI/3384500451", "token": "dp5-M1Vob6pZXkCoqC0nwYF82_DnNDxqsX8psUC66HY", "keyAuthorization": "dp5-M1Vob6pZXk
Feb8 14:25:01 rc_service: service 6066:notify_rc restart_letsencrypt
Feb8 14:25:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/xrINmHwr5FIgkvSD4e8pkwbUfWSrw6dpPAwjD7jL3x0/3384533049: bad response
Feb8 14:25:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/DnkZp4UdkPlZd1eS3TNYExOORZjQRngudND8bayf3RY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/xrINmHwr5FIgkvSD4e8pkwbUfWSrw6dpPAwjD7jL3x0/3384533049", "token": "DnkZp4UdkPlZd1eS3TNYExOORZjQRngudND8bayf3RY", "keyAuthorization": "DnkZp4UdkPlZd1
Feb8 14:30:01 rc_service: service 6250:notify_rc restart_letsencrypt
Feb8 14:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:35:01 rc_service: service 6417:notify_rc restart_letsencrypt
Feb8 14:35:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/XNEL5NgGMDraxVq1EpfVu7zOPFMpoDSd9bhnwyCAKJw/3384600291: bad response
Feb8 14:35:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/4BfTLjBk_xie21Aoe1kSzApp4MGAZ4YLFqyDJbc23RI: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/XNEL5NgGMDraxVq1EpfVu7zOPFMpoDSd9bhnwyCAKJw/3384600291", "token": "4BfTLjBk_xie21Aoe1kSzApp4MGAZ4YLFqyDJbc23RI", "keyAuthorization": "4BfTLjBk_xie21
Feb8 14:40:01 rc_service: service 6585:notify_rc restart_letsencrypt
Feb8 14:40:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/_HLfSx5GeeNMqnk0rml7bEMJPcAf7MiFxI_Vrfad_hs/3384632001: bad response
Feb8 14:40:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/pCJwq0_v48ymEIC3ZCZc0pCwUtqapuXa4z0NJmlFWXE: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/_HLfSx5GeeNMqnk0rml7bEMJPcAf7MiFxI_Vrfad_hs/3384632001", "token": "pCJwq0_v48ymEIC3ZCZc0pCwUtqapuXa4z0NJmlFWXE", "keyAuthorization": "pCJwq0_v48ymEI
Feb8 14:45:01 rc_service: service 6770:notify_rc restart_letsencrypt
Feb8 14:45:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/3E68s5jU1A0wKGjNqF-0FQH4aGQ4gqHtPBTb7TRYiWs/3384664577: bad response
Feb8 14:45:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/AyvPk_zyMYrHQtz9Mex6C1afrWbatp8uKTBkcDMQ3v0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/3E68s5jU1A0wKGjNqF-0FQH4aGQ4gqHtPBTb7TRYiWs/3384664577", "token": "AyvPk_zyMYrHQtz9Mex6C1afrWbatp8uKTBkcDMQ3v0", "keyAuthorization": "AyvPk_zyMYrHQt
Feb8 14:50:01 rc_service: service 6940:notify_rc restart_letsencrypt
Feb8 14:50:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:50:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 14:55:01 rc_service: service 7113:notify_rc restart_letsencrypt
Feb8 14:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 14:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:00:01 rc_service: service 7307:notify_rc restart_letsencrypt
Feb8 15:00:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:00:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:05:01 rc_service: service 7501:notify_rc restart_letsencrypt
Feb8 15:05:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:05:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:10:01 rc_service: service 7693:notify_rc restart_letsencrypt
Feb8 15:10:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:10:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:15:01 rc_service: service 7894:notify_rc restart_letsencrypt
Feb8 15:15:23 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:15:23 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:20:01 rc_service: service 8062:notify_rc restart_letsencrypt
Feb8 15:20:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ga3tbEnenmZ4ryVrr4qWvSiaTb4tNReRNcWXzf6af6E/3384911090: bad response
Feb8 15:20:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/mVsadjvKcEgRqhlcuUB85ur054tlULvLn-t8CGFUK8s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ga3tbEnenmZ4ryVrr4qWvSiaTb4tNReRNcWXzf6af6E/3384911090", "token": "mVsadjvKcEgRqhlcuUB85ur054tlULvLn-t8CGFUK8s", "keyAuthorization": "mVsadjvKcEgRqh
Feb8 15:25:01 rc_service: service 8230:notify_rc restart_letsencrypt
Feb8 15:25:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:25:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:30:01 rc_service: service 8434:notify_rc restart_letsencrypt
Feb8 15:30:44 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ipTnKhGoI_2Ew_pcj7qv6Djzi5R_tpp8B5tO-2yPV0E/3384978743: bad response
Feb8 15:30:44 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/7hd0Uhff2crd5i9IZZXeDvNQ0tHsyq9NTRyc-2RzwJA: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ipTnKhGoI_2Ew_pcj7qv6Djzi5R_tpp8B5tO-2yPV0E/3384978743", "token": "7hd0Uhff2crd5i9IZZXeDvNQ0tHsyq9NTRyc-2RzwJA", "keyAuthorization": "7hd0Uhff2crd5i
Feb8 15:35:01 rc_service: service 8602:notify_rc restart_letsencrypt
Feb8 15:35:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:35:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 15:40:01 rc_service: service 8769:notify_rc restart_letsencrypt
Feb8 15:40:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/mzAxq5cvTkrrWAiUKDMYZvRGMTB7xIEJpV9NoDfa3mQ/3385040555: bad response
Feb8 15:40:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/Oq5W81hnIeUdl_5lzlOqoTsZhyuSLuoy1WerEqxMjM4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/mzAxq5cvTkrrWAiUKDMYZvRGMTB7xIEJpV9NoDfa3mQ/3385040555", "token": "Oq5W81hnIeUdl_5lzlOqoTsZhyuSLuoy1WerEqxMjM4", "keyAuthorization": "Oq5W81hnIeUdl_
Feb8 15:45:01 rc_service: service 8956:notify_rc restart_letsencrypt
Feb8 15:45:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/mSj5vcLtElIuyp9sqmff-ZR9F2R6slsNmFMZ7Td4o3M/3385071899: bad response
Feb8 15:45:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/1ExjRHZGHbHmySgVUsp2HtK20umoVlAcZU3dNs1HKDA: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/mSj5vcLtElIuyp9sqmff-ZR9F2R6slsNmFMZ7Td4o3M/3385071899", "token": "1ExjRHZGHbHmySgVUsp2HtK20umoVlAcZU3dNs1HKDA", "keyAuthorization": "1ExjRHZGHbHmyS
Feb8 15:50:01 rc_service: service 9124:notify_rc restart_letsencrypt
Feb8 15:50:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ywYd8GaxaepXGs3WP90_4BszkwN-3eInFG3PjkuVOCE/3385105213: bad response
Feb8 15:50:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/FxBBuronfC9b9f7B1TvOopkTidqNpggze6Z8eQ-Wsbg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ywYd8GaxaepXGs3WP90_4BszkwN-3eInFG3PjkuVOCE/3385105213", "token": "FxBBuronfC9b9f7B1TvOopkTidqNpggze6Z8eQ-Wsbg", "keyAuthorization": "FxBBuronfC9b9f
Feb8 15:55:01 rc_service: service 9292:notify_rc restart_letsencrypt
Feb8 15:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 15:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:00:01 rc_service: service 9460:notify_rc restart_letsencrypt
Feb8 16:00:24 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:00:24 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:05:01 rc_service: service 9642:notify_rc restart_letsencrypt
Feb8 16:05:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:05:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:10:01 rc_service: service 9809:notify_rc restart_letsencrypt
Feb8 16:10:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:10:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:15:01 rc_service: service 9980:notify_rc restart_letsencrypt
Feb8 16:15:26 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:15:26 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:20:01 rc_service: service 10146:notify_rc restart_letsencrypt
Feb8 16:20:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/c-b-x0Y8EosGCYKyhg3ny4eaT24Tm7TFHsARTpf4Q4k/3385317740: bad response
Feb8 16:20:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/lnizwvKdUurola9u97nPm4NVRr3AozwaI47kEXZG_n0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/c-b-x0Y8EosGCYKyhg3ny4eaT24Tm7TFHsARTpf4Q4k/3385317740", "token": "lnizwvKdUurola9u97nPm4NVRr3AozwaI47kEXZG_n0", "keyAuthorization": "lnizwvKdUurola
Feb8 16:23:10 roamast: wl1.1: add client to monitor list
Feb8 16:25:01 rc_service: service 10322:notify_rc restart_letsencrypt
Feb8 16:25:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:25:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:30:01 rc_service: service 10520:notify_rc restart_letsencrypt
Feb8 16:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 16:35:01 rc_service: service 10705:notify_rc restart_letsencrypt
Feb8 16:35:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/nLXpjgoH6LTay-u2-OWajRhdTQOe_-vOxAkWrQ6_O7k/3385414914: bad response
Feb8 16:35:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/Kpuf5rnq5MZw37Hb7RSGl6ZlPoL57f6yetm81imlZHc: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/nLXpjgoH6LTay-u2-OWajRhdTQOe_-vOxAkWrQ6_O7k/3385414914", "token": "Kpuf5rnq5MZw37Hb7RSGl6ZlPoL57f6yetm81imlZHc", "keyAuthorization": "Kpuf5rnq5MZw37
Feb8 16:40:01 rc_service: service 10892:notify_rc restart_letsencrypt
Feb8 16:40:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/2FTfSFGQCfl_THk8_vknbnw_ClylApfg0khwUxzFWtQ/3385446715: bad response
Feb8 16:40:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/qvQHW6rEXwE54nPnOMnrG0IT16temxlAzp6r1vjbbxk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/2FTfSFGQCfl_THk8_vknbnw_ClylApfg0khwUxzFWtQ/3385446715", "token": "qvQHW6rEXwE54nPnOMnrG0IT16temxlAzp6r1vjbbxk", "keyAuthorization": "qvQHW6rEXwE54n
Feb8 16:45:01 rc_service: service 11084:notify_rc restart_letsencrypt
Feb8 16:45:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/vAjkPuH3NTrbMHHD8UKvhOEFmExvvLGigshJRQvcj6I/3385479483: bad response
Feb8 16:45:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/zn6rZ7UDgaZ2DQNUgPbpT5WI1vKczlGkDoxK_Ho-Sj0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/vAjkPuH3NTrbMHHD8UKvhOEFmExvvLGigshJRQvcj6I/3385479483", "token": "zn6rZ7UDgaZ2DQNUgPbpT5WI1vKczlGkDoxK_Ho-Sj0", "keyAuthorization": "zn6rZ7UDgaZ2DQ
Feb8 16:46:20 roamast: wl1.1: add client to monitor list
Feb8 16:50:01 rc_service: service 11271:notify_rc restart_letsencrypt
Feb8 16:50:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/jt89gw563ar5VMDoK7QZV5FkyDLxTvHzpTAxqE5kxyE/3385511430: bad response
Feb8 16:50:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/18W6rb5rnkbVhDQ4WtrxulMLWInl9V7SRdWoD75-Xa4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/jt89gw563ar5VMDoK7QZV5FkyDLxTvHzpTAxqE5kxyE/3385511430", "token": "18W6rb5rnkbVhDQ4WtrxulMLWInl9V7SRdWoD75-Xa4", "keyAuthorization": "18W6rb5rnkbVhD
Feb8 16:55:01 rc_service: service 11438:notify_rc restart_letsencrypt
Feb8 16:55:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 16:55:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:00:01 rc_service: service 11647:notify_rc restart_letsencrypt
Feb8 17:00:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:00:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:05:01 rc_service: service 11850:notify_rc restart_letsencrypt
Feb8 17:05:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:05:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:10:01 rc_service: service 12035:notify_rc restart_letsencrypt
Feb8 17:10:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:10:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:15:01 rc_service: service 12216:notify_rc restart_letsencrypt
Feb8 17:15:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:15:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:20:01 rc_service: service 12395:notify_rc restart_letsencrypt
Feb8 17:20:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:20:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:25:01 rc_service: service 12580:notify_rc restart_letsencrypt
Feb8 17:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/QZX03y264_Ig6Bnt0bWbnrqFYx5i8NEUZ1uCce_kImc/3385741748: bad response
Feb8 17:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/LSnoMIyrax7QRHR427bWVqLYK2QMv9INpTHXE6Dv8bI: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/QZX03y264_Ig6Bnt0bWbnrqFYx5i8NEUZ1uCce_kImc/3385741748", "token": "LSnoMIyrax7QRHR427bWVqLYK2QMv9INpTHXE6Dv8bI", "keyAuthorization": "LSnoMIyrax7QRH
Feb8 17:30:01 rc_service: service 12756:notify_rc restart_letsencrypt
Feb8 17:30:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:30:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:35:01 rc_service: service 12944:notify_rc restart_letsencrypt
Feb8 17:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ZKW5PFaDa4fL2jKfGTDIN18uZqIT_XjxXSrJ0SBnPfY/3385803748: bad response
Feb8 17:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/1lGwkM-EL8awiD31o0K6ZIwcqQo7UZR3nTZsaRn5hio: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ZKW5PFaDa4fL2jKfGTDIN18uZqIT_XjxXSrJ0SBnPfY/3385803748", "token": "1lGwkM-EL8awiD31o0K6ZIwcqQo7UZR3nTZsaRn5hio", "keyAuthorization": "1lGwkM-EL8awiD
Feb8 17:40:01 rc_service: service 13134:notify_rc restart_letsencrypt
Feb8 17:40:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 17:40:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 17:45:01 rc_service: service 13301:notify_rc restart_letsencrypt
Feb8 17:45:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/H4xujkY-MjzzBHvqSGghqn4OiAVlDB6xAZOPlK0t8JM/3385869175: bad response
Feb8 17:45:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/mUTYzD6wrSkfx1nrgtcltghq1CK3l5y7z-DWCPZZVg8: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/H4xujkY-MjzzBHvqSGghqn4OiAVlDB6xAZOPlK0t8JM/3385869175", "token": "mUTYzD6wrSkfx1nrgtcltghq1CK3l5y7z-DWCPZZVg8", "keyAuthorization": "mUTYzD6wrSkfx1
Feb8 17:50:01 rc_service: service 13489:notify_rc restart_letsencrypt
Feb8 17:50:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/KRKA4AtJTvr0tT1JVnmc1KhxnyIM29Or7ERUkppocSY/3385903226: bad response
Feb8 17:50:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/pxG3bNWzVLFNDlDqRF-naws5tyhh6rezIN318KLk-7A: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/KRKA4AtJTvr0tT1JVnmc1KhxnyIM29Or7ERUkppocSY/3385903226", "token": "pxG3bNWzVLFNDlDqRF-naws5tyhh6rezIN318KLk-7A", "keyAuthorization": "pxG3bNWzVLFNDl
Feb8 17:55:01 rc_service: service 13657:notify_rc restart_letsencrypt
Feb8 17:55:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/7-6zo4WpDhpxYJq1wpiA3YS57GOWb20cMY-q_kZcLfo/3385937381: bad response
Feb8 17:55:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/U8L4ZbJJFTxNE90a1gzZVIfwv9JGDKJfHbRc_zLjfeY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/7-6zo4WpDhpxYJq1wpiA3YS57GOWb20cMY-q_kZcLfo/3385937381", "token": "U8L4ZbJJFTxNE90a1gzZVIfwv9JGDKJfHbRc_zLjfeY", "keyAuthorization": "U8L4ZbJJFTxNE9
Feb8 18:00:01 rc_service: service 13826:notify_rc restart_letsencrypt
Feb8 18:00:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:00:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:05:01 rc_service: service 14009:notify_rc restart_letsencrypt
Feb8 18:05:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:05:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:10:01 rc_service: service 14183:notify_rc restart_letsencrypt
Feb8 18:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:10:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:15:01 rc_service: service 14356:notify_rc restart_letsencrypt
Feb8 18:15:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:15:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:20:01 rc_service: service 14578:notify_rc restart_letsencrypt
Feb8 18:20:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:20:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:25:01 rc_service: service 14747:notify_rc restart_letsencrypt
Feb8 18:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/F1WWtPm7f9bP4aEBvJ0sqCUiwVyNjXxbkhk7CqTXSXU/3386138192: bad response
Feb8 18:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/4QfdVWHn3FwsC5hC6j8O1PP5Ee5E63I6Gm7XVMgGGtU: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/F1WWtPm7f9bP4aEBvJ0sqCUiwVyNjXxbkhk7CqTXSXU/3386138192", "token": "4QfdVWHn3FwsC5hC6j8O1PP5Ee5E63I6Gm7XVMgGGtU", "keyAuthorization": "4QfdVWHn3FwsC5
Feb8 18:30:01 rc_service: service 14926:notify_rc restart_letsencrypt
Feb8 18:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:35:01 rc_service: service 15102:notify_rc restart_letsencrypt
Feb8 18:35:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 18:35:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 18:40:01 rc_service: service 15289:notify_rc restart_letsencrypt
Feb8 18:40:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/5aljgoqi-hfcIuYhtqRAXfuq5jK7VNA5RkVDE96S2pY/3386232266: bad response
Feb8 18:40:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/-vgKyVzyDjXkMpfap-NOUOlqLa5fIJRv6AGzJsh5Tfs: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5aljgoqi-hfcIuYhtqRAXfuq5jK7VNA5RkVDE96S2pY/3386232266", "token": "-vgKyVzyDjXkMpfap-NOUOlqLa5fIJRv6AGzJsh5Tfs", "keyAuthorization": "-vgKyVzyDjXkMp
Feb8 18:45:01 rc_service: service 15476:notify_rc restart_letsencrypt
Feb8 18:45:41 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/urBMb2MvrxuXipL-Cl0E1rYU6V9l-BdelBLgGYMfWIU/3386264278: bad response
Feb8 18:45:41 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/mD0mBmTtdCxUxJlKJKEwBOkqkl11dIlGf9KQCdWxFnk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/urBMb2MvrxuXipL-Cl0E1rYU6V9l-BdelBLgGYMfWIU/3386264278", "token": "mD0mBmTtdCxUxJlKJKEwBOkqkl11dIlGf9KQCdWxFnk", "keyAuthorization": "mD0mBmTtdCxUxJ
Feb8 18:50:01 rc_service: service 15651:notify_rc restart_letsencrypt
Feb8 18:50:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/ycLXABEIXOSp0Ynjzo44l63ob-z5YK5tj741V5rP2Aw/3386295384: bad response
Feb8 18:50:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/GHjF-BVldeXIlHMXoGD1Zf9ulfxs95cNjkntxp9-cnk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ycLXABEIXOSp0Ynjzo44l63ob-z5YK5tj741V5rP2Aw/3386295384", "token": "GHjF-BVldeXIlHMXoGD1Zf9ulfxs95cNjkntxp9-cnk", "keyAuthorization": "GHjF-BVldeXIlH
Feb8 18:55:01 rc_service: service 15846:notify_rc restart_letsencrypt
Feb8 18:55:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/J99bdDjrfZVsZzVTgqqpvRjgHXPnhxGY5fqhw7zz5-E/3386325652: bad response
Feb8 18:55:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well-known/acme-challenge/GBOQj_Mv4rZgDg8R_7fHjv-T71LweDDnSc7TElHmODY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/J99bdDjrfZVsZzVTgqqpvRjgHXPnhxGY5fqhw7zz5-E/3386325652", "token": "GBOQj_Mv4rZgDg8R_7fHjv-T71LweDDnSc7TElHmODY", "keyAuthorization": "GBOQj_Mv4rZgDg
Feb8 19:00:01 rc_service: service 16020:notify_rc restart_letsencrypt
Feb8 19:00:27 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 19:00:27 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 19:03:40 roamast: eth1: add client to monitor list
Feb8 19:05:01 rc_service: service 16215:notify_rc restart_letsencrypt
Feb8 19:05:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 19:05:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb8 19:08:18 rc_service: httpd 381:notify_rc restart_wan_if 0
Feb8 19:08:18 pppd: Connection terminated.
Feb8 19:08:21 wan: ==
Feb8 19:08:21 pppd: pppd 2.4.7 started by adminyyg, uid 0
Feb8 19:08:21 pppd: Connected to 00:22:93:66:e0:1f via interface eth0
Feb8 19:08:21 pppd: Connect: ppp0 <--> eth0
Feb8 19:08:21 pppd: PAP authentication succeeded
Feb8 19:08:21 pppd: peer from calling number 00:22:93:66:E0:1F authorized
Feb8 19:08:22 pppd: localIP address 222.75.230.51
Feb8 19:08:22 pppd: remote IP address 222.75.228.1
Feb8 19:08:22 pppd: primary   DNS address 118.118.118.11
Feb8 19:08:22 pppd: secondary DNS address 202.100.96.68
Feb8 19:08:22 rc_service: ip-up 16415:notify_rc start_firewall
Feb8 19:08:22 miniupnpd: shutting down MiniUPnPd
Feb8 19:08:22 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 19:08:22 wan: finish adding multi routes
Feb8 19:08:22 rc_service: ip-up 16415:notify_rc stop_upnp
Feb8 19:08:22 rc_service: waitting "start_firewall" via ip-up ...
Feb8 19:08:22 ntp: start NTP update
Feb8 19:08:23 miniupnpd: version 1.9 started
Feb8 19:08:23 miniupnpd: HTTP listening on port 41115
Feb8 19:08:23 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 19:08:23 rc_service: ip-up 16415:notify_rc start_upnp
Feb8 19:08:23 rc_service: waitting "stop_upnp" via ip-up ...
Feb8 19:08:23 miniupnpd: shutting down MiniUPnPd
Feb8 19:08:24 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb8 19:08:24 miniupnpd: version 1.9 started
Feb8 19:08:25 ddns update: ez-ipupdate: starting...
Feb8 19:08:25 miniupnpd: HTTP listening on port 52833
Feb8 19:08:25 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 19:08:25 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb8 19:08:25 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 11:08:24 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb8 19:08:25 ddns update: retval= 0, ddns_return_code (,200)
Feb8 19:08:25 ddns update: asusddns_update: 0
Feb8 19:08:26 ddns: ddns update ok
Feb8 19:08:32 rc_service: zcip 16474:notify_rc start_firewall
Feb8 19:08:32 zcip client: configured 169.254.72.55
Feb8 19:08:33 miniupnpd: shutting down MiniUPnPd
Feb8 19:08:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 19:08:33 miniupnpd: version 1.9 started
Feb8 19:08:34 miniupnpd: HTTP listening on port 45410
Feb8 19:08:34 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 19:08:41 rc_service: ip-up 16415:notify_rc start_firewall
Feb8 19:08:41 miniupnpd: shutting down MiniUPnPd
Feb8 19:08:41 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb8 19:08:42 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb8 19:08:42 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb8 19:08:42 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb8 19:08:42 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb8 19:08:42 miniupnpd: version 1.9 started
Feb8 19:08:42 miniupnpd: HTTP listening on port 39265
Feb8 19:08:42 miniupnpd: Listening for NAT-PMP/PCP traffic on port 5351
Feb8 19:10:02 rc_service: service 16637:notify_rc restart_letsencrypt
Feb8 19:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb8 19:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)

ldyyg 发表于 2018-2-8 19:23:14

Master 发表于 2018-2-8 13:43
把你的系统日志和设定档传上来

设定档怎么传啊?

Bg2018 发表于 2018-2-9 05:38:07

这日志也够长的了,滑动半天,同是AC88U一直都不敢升级固件,买来就7743固件A6版

ldyyg 发表于 2018-2-9 08:25:39

Bg2018 发表于 2018-2-9 05:38
这日志也够长的了,滑动半天,同是AC88U一直都不敢升级固件,买来就7743固件A6版 ...

如果稳定的话最好别升级。顺便问一下,A6版的5G信号如何,A5版5G信号不稳定,一会有,一会没有,挺烦人。

Master 发表于 2018-2-9 09:44:08

ldyyg 发表于 2018-2-8 19:23
设定档怎么传啊?
先在“恢复/导出/上传设置”页面,点“保存”按钮,然后将导出的设定档打包传上来就可以了。
看了你的系统日志,你有开双拨功能是不是?先关掉双拨,观察一下。
页: [1]
查看完整版本: RT-AC88U无网络