华硕网络产品技术交流平台

 找回密码
 立即注册

QQ登录

只需一步,快速开始

手机号码,快捷登录

查看: 5186|回复: 7

[求助] RT-AC88U无网络

[复制链接]

19

主题

55

回帖

246

积分

中级会员

Rank: 3Rank: 3

积分
246
发表于 2018-2-8 11:29:28 | 显示全部楼层 |阅读模式
RT-AC88U,A5版本,升级3.0.0.4.384_20308后WAN口互联网连接正常,实际各个客户端(包括有线和无线)均无网络,重启就好了,然不足24小时,又会出现上述问题,求助各位大佬怎么解决啊?

微信扫一扫,阅读更方便^_^

639

主题

6305

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
17269

RT-AC88URT-AX68U

发表于 2018-2-8 13:43:40 | 显示全部楼层
把你的系统日志和设定档传上来

256

主题

3734

回帖

9243

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
9243

RT-AX86U

发表于 2018-2-8 13:58:33 | 显示全部楼层
将你WAN页面的internet detected选项开启,选择PPP echo看看

19

主题

55

回帖

246

积分

中级会员

Rank: 3Rank: 3

积分
246
 楼主| 发表于 2018-2-8 19:14:08 | 显示全部楼层
Master 发表于 2018-2-8 13:43
把你的系统日志和设定档传上来

Feb 14 00:00:25 syslogd started: BusyBox v1.17.4
Feb 14 00:00:25 kernel: klogd started: BusyBox v1.17.4 (2018-01-25 20:31:57 CST)
Feb 14 00:00:25 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Jan 25 20:41:22 CST 2018
Feb 14 00:00:25 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 00:00:25 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 00:00:25 kernel: Machine: Northstar Prototype
Feb 14 00:00:25 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 00:00:25 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 00:00:25 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 00:00:25 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 00:00:25 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 00:00:25 kernel: Virtual kernel memory layout:
Feb 14 00:00:25 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 00:00:25 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 00:00:25 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 00:00:25 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 00:00:25 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 00:00:25 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 00:00:25 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 00:00:25 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 00:00:25 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 00:00:25 kernel: * Invalid signature of oopsbuf: C5-41-00-28-40-40-40-00 (len 4210688)
Feb 14 00:00:25 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 00:00:25 kernel: Mount-cache hash table entries: 512
Feb 14 00:00:25 kernel: CPU1: Booted secondary processor
Feb 14 00:00:25 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 00:00:25 kernel: Total size:  128MB
Feb 14 00:00:25 kernel: Block size:  128KB
Feb 14 00:00:25 kernel: Page Size:   2048B
Feb 14 00:00:25 kernel: OOB Size:    64B
Feb 14 00:00:25 kernel: Sector size: 512B
Feb 14 00:00:25 kernel: Spare size:  16B
Feb 14 00:00:25 kernel: ECC level:   8 (8-bit)
Feb 14 00:00:25 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 00:00:25 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 00:00:25 kernel: bio: create slab <bio-0> at 0
Feb 14 00:00:25 kernel: PCI: no core
Feb 14 00:00:25 kernel: PCI: no core
Feb 14 00:00:25 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 1
Feb 14 00:00:26 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 1
Feb 14 00:00:26 nat: apply redirect rules
Feb 14 00:00:26 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 00:00:26 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 00:00:26 kernel: pflash: found no supported devices
Feb 14 00:00:26 kernel: bcmsflash: found no supported devices
Feb 14 00:00:26 kernel: Boot partition size = 524288(0x80000)
Feb 14 00:00:26 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 00:00:26 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 00:00:26 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 00:00:26 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 00:00:26 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 00:00:26 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 00:00:26 kernel: 0x0000003bfe80-0x000004000000 : "rootfs"
Feb 14 00:00:26 kernel: === PPTP init ===
Feb 14 00:00:26 kernel: Registering the dns_resolver key type
Feb 14 00:00:26 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 00:00:26 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 00:00:26 kernel: Available 7 bytes at (off,len):
Feb 14 00:00:26 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 00:00:26 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 00:00:26 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 00:00:26 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 00:00:26 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 00:00:26 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 00:00:26 kernel: Disabling lock debugging due to kernel taint
Feb 14 00:00:26 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 00:00:26 kernel: rtk port_phyEnableAll ok
Feb 14 00:00:26 kernel: register rtl8365mb done (link down at first)
Feb 14 00:00:26 kernel: et_module_init: passivemode set to 0x0
Feb 14 00:00:26 kernel: et_module_init: txworkq set to 0x0
Feb 14 00:00:26 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 00:00:26 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 00:00:26 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 00:00:26 kernel: dpsta_init: msglevel set to 0x1
Feb 14 00:00:26 kernel: dpsta_init: fail to get ifnames!
Feb 14 00:00:26 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:26 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 00:00:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:80 started
Feb 14 00:00:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:26 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:26 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:26 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 00:00:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:84 started
Feb 14 00:00:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:26 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:26 dnsmasq[334]: warning: no upstream servers configured
Feb 14 00:00:26 kernel: reset usb phy..
Feb 14 00:00:26 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 00:00:26 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 00:00:26 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 00:00:27 RT-AC88U: start httpd
Feb 14 00:00:27 kernel: Empty flash at 0x005c0bb8 ends at 0x005c1000
Feb 14 00:00:27 kernel: jffs2_scan_eraseblock(): Node at 0x005d97f8 {0x1985, 0xe002, 0x00000044) has invalid CRC 0xffffffff (calculated 0x98f7fb1d)
Feb 14 00:00:27 kernel: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x005d97fc: 0x0044 instead
Feb 14 00:00:27 kernel: rtk port_phyEnableAll (on) ok
Feb 14 00:00:27 lldpd[374]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 00:00:27 lldpd[374]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 00:00:27 syslog: Generating SSL certificate...
Feb 14 00:00:29 NAT Tunnel: AAE Service is stopped
Feb 14 00:00:29 AAE: AAE Service is started
Feb 14 00:00:29 jffs2: valid logs(1)
Feb 14 00:00:29 hour monitor: daemon is starting
Feb 14 00:00:29 disk monitor: be idle
Feb 14 00:00:29 hour monitor: daemon terminates
Feb 14 00:00:30 miniupnpd[426]: version 1.9 started
Feb 14 00:00:30 miniupnpd[426]: HTTP listening on port 47027
Feb 14 00:00:30 miniupnpd[426]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:30 Mastiff: init
Feb 14 00:00:30 kernel: dhd_detach(): thread:dhd_watchdog_thread:84 terminated OK
Feb 14 00:00:30 kernel: dhd_detach(): thread:dhd_watchdog_thread:80 terminated OK
Feb 14 00:00:31 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:00:33 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:33 kernel: dhd_attach(): thread:dhd_watchdog_thread:206 started
Feb 14 00:00:34 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:34 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:34 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:34 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:34 kernel: dhd_attach(): thread:dhd_watchdog_thread:20a started
Feb 14 00:00:35 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:35 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:35 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:38 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb 14 00:00:38 wan: [deconfig] udhcpc done[286]
Feb 14 00:00:38 rc_service: udhcpc 601:notify_rc start_firewall
Feb 14 00:00:38 wan: finish adding multi routes
Feb 14 00:00:38 rc_service: udhcpc 601:notify_rc stop_upnp
Feb 14 00:00:38 rc_service: waitting "start_firewall" via udhcpc ...
Feb 14 00:00:40 WAN Connection: WAN was restored.
Feb 14 00:00:43 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 00:00:43 syslog: module leds-usb not found in modules.dep
Feb 14 00:00:43 kernel: SCSI subsystem initialized
Feb 14 00:00:44 miniupnpd[426]: shutting down MiniUPnPd
Feb 14 00:00:44 nat: apply redirect rules
Feb 14 00:00:51 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 00:00:51 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 00:00:51 miniupnpd[734]: version 1.9 started
Feb 14 00:00:51 miniupnpd[734]: HTTP listening on port 37435
Feb 14 00:00:51 miniupnpd[734]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:51 rc_service: udhcpc 601:notify_rc start_upnp
Feb 14 00:00:51 rc_service: waitting "stop_upnp" via udhcpc ...
Feb 14 00:00:51 miniupnpd[734]: shutting down MiniUPnPd
Feb 14 00:00:53 miniupnpd[736]: version 1.9 started
Feb 14 00:00:53 miniupnpd[736]: HTTP listening on port 49460
Feb 14 00:00:53 miniupnpd[736]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:58 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:03:04 roamast: eth1: add client [d0:ff:98:df:98:63] to monitor list
Feb 14 00:00:15 syslogd started: BusyBox v1.17.4
Feb 14 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2018-01-25 20:31:57 CST)
Feb 14 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Jan 25 20:41:22 CST 2018
Feb 14 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 00:00:15 kernel: Machine: Northstar Prototype
Feb 14 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 00:00:15 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 00:00:15 kernel: Virtual kernel memory layout:
Feb 14 00:00:15 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 00:00:15 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 00:00:15 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 00:00:15 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 00:00:15 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 00:00:15 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 00:00:15 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 00:00:15 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 00:00:15 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 00:00:15 kernel: * Invalid signature of oopsbuf: E1-45-A0-28-48-C0-D0-30 (len 283332946)
Feb 14 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 00:00:15 kernel: Mount-cache hash table entries: 512
Feb 14 00:00:16 kernel: CPU1: Booted secondary processor
Feb 14 00:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 00:00:16 kernel: Total size:  128MB
Feb 14 00:00:16 kernel: Block size:  128KB
Feb 14 00:00:16 kernel: Page Size:   2048B
Feb 14 00:00:16 kernel: OOB Size:    64B
Feb 14 00:00:16 kernel: Sector size: 512B
Feb 14 00:00:16 kernel: Spare size:  16B
Feb 14 00:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 00:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 00:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 00:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 00:00:16 kernel: PCI: no core
Feb 14 00:00:16 kernel: PCI: no core
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 1
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 1
Feb 14 00:00:16 nat: apply redirect rules
Feb 14 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 00:00:16 kernel: pflash: found no supported devices
Feb 14 00:00:16 kernel: bcmsflash: found no supported devices
Feb 14 00:00:16 kernel: Boot partition size = 524288(0x80000)
Feb 14 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 00:00:16 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 00:00:16 kernel: 0x0000003bfe80-0x000004000000 : "rootfs"
Feb 14 00:00:16 kernel: === PPTP init ===
Feb 14 00:00:17 kernel: Registering the dns_resolver key type
Feb 14 00:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 00:00:17 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 00:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 00:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 00:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 00:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 00:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 00:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 00:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 00:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 00:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 00:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 00:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 00:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 00:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 00:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 00:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 00:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 00:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 00:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 00:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:17 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 00:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 00:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:17 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:17 kernel: reset usb phy..
Feb 14 00:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 00:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 00:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 00:00:17 kernel: Empty flash at 0x005c0bb8 ends at 0x005c1000
Feb 14 00:00:17 kernel: jffs2_scan_eraseblock(): Node at 0x005d97f8 {0x1985, 0xe002, 0x00000044) has invalid CRC 0xe0011985 (calculated 0x98f7fb1d)
Feb 14 00:00:17 kernel: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x005d97fc: 0x0044 instead
Feb 14 00:00:17 kernel: JFFS2 notice: (233) check_node_data: wrong data CRC in data node at 0x00106f7c: read 0xe8a14997, calculated 0x597f6c69.
Feb 14 00:00:19 dnsmasq[355]: warning: no upstream servers configured
Feb 14 00:00:19 kernel: rtk port_phyEnableAll (on) ok
Feb 14 00:00:19 RT-AC88U: start httpd
Feb 14 00:00:20 syslog: Generating SSL certificate...
Feb 14 00:00:20 lldpd[385]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 00:00:20 lldpd[385]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 00:00:21 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:00:22 NAT Tunnel: AAE Service is stopped
Feb 14 00:00:22 AAE: AAE Service is started
Feb 14 00:00:22 disk monitor: be idle
Feb 14 00:00:22 hour monitor: daemon is starting
Feb 14 00:00:22 jffs2: valid logs(1)
Feb 14 00:00:22 hour monitor: daemon terminates
Feb 14 00:00:22 miniupnpd[430]: version 1.9 started
Feb 14 00:00:22 miniupnpd[430]: HTTP listening on port 33538
Feb 14 00:00:22 miniupnpd[430]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:22 Mastiff: init
Feb 14 00:00:22 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb 14 00:00:22 wan: [deconfig] udhcpc done[286]
Feb 14 00:00:23 rc_service: udhcpc 442:notify_rc start_firewall
Feb 14 00:00:23 wan: finish adding multi routes
Feb 14 00:00:23 rc_service: udhcpc 442:notify_rc stop_upnp
Feb 14 00:00:23 rc_service: waitting "start_firewall" via udhcpc ...
Feb 14 00:00:27 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 00:00:27 syslog: module leds-usb not found in modules.dep
Feb 14 00:00:27 kernel: SCSI subsystem initialized
Feb 14 00:00:28 WAN Connection: WAN was restored.
Feb 14 00:00:29 miniupnpd[430]: shutting down MiniUPnPd
Feb 14 00:00:29 nat: apply redirect rules
Feb 14 00:00:35 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 00:00:35 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 00:00:36 miniupnpd[576]: version 1.9 started
Feb 14 00:00:36 miniupnpd[576]: HTTP listening on port 41741
Feb 14 00:00:36 miniupnpd[576]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:36 rc_service: udhcpc 442:notify_rc start_upnp
Feb 14 00:00:36 rc_service: waitting "stop_upnp" via udhcpc ...
Feb 14 00:00:36 miniupnpd[576]: shutting down MiniUPnPd
Feb 14 00:00:37 miniupnpd[579]: version 1.9 started
Feb 14 00:00:37 miniupnpd[579]: HTTP listening on port 60835
Feb 14 00:00:37 miniupnpd[579]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:42 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:04:55 rc_service: httpd 363:notify_rc start_autodet
Feb 14 00:05:15 rc_service: httpd 363:notify_rc start_autodet
Feb 14 00:06:13 rc_service: httpd 363:notify_rc restart_wan_if 0
Feb 14 00:06:13 wan: [deconfig] udhcpc done[286]
Feb 14 00:06:14 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:06:16 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb 14 00:06:16 wan: [deconfig] udhcpc done[286]
Feb 14 00:06:16 pppd[696]: pppd 2.4.7 started by admin, uid 0
Feb 14 00:06:16 rc_service: udhcpc 697:notify_rc start_firewall
Feb 14 00:06:16 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:06:16 miniupnpd[579]: shutting down MiniUPnPd
Feb 14 00:06:16 nat: apply redirect rules
Feb 14 00:06:17 WAN Connection: Fail to connect with some issues.
Feb 14 00:06:17 miniupnpd[718]: version 1.9 started
Feb 14 00:06:17 miniupnpd[718]: HTTP listening on port 37056
Feb 14 00:06:17 miniupnpd[718]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:06:21 pppd[696]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 00:06:21 pppd[696]: Connect: ppp0 <--> eth0
Feb 14 00:06:21 pppd[696]: PAP authentication succeeded
Feb 14 00:06:21 pppd[696]: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 00:06:22 pppd[696]: local  IP address 106.45.236.126
Feb 14 00:06:22 pppd[696]: remote IP address 106.45.236.1
Feb 14 00:06:22 pppd[696]: primary   DNS address 118.118.118.11
Feb 14 00:06:22 pppd[696]: secondary DNS address 202.100.96.68
Feb 14 00:06:22 rc_service: ip-up 734:notify_rc start_firewall
Feb 14 00:06:22 miniupnpd[718]: shutting down MiniUPnPd
Feb 14 00:06:23 wan: finish adding multi routes
Feb 14 08:06:23 rc_service: ip-up 734:notify_rc stop_upnp
Feb 14 08:06:23 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 00:06:23 nat: apply redirect rules
Feb 14 00:06:23 miniupnpd[784]: version 1.9 started
Feb 14 00:06:23 miniupnpd[784]: HTTP listening on port 48713
Feb 14 00:06:23 miniupnpd[784]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:06:24 rc_service: ip-up 734:notify_rc start_upnp
Feb 14 08:06:24 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 00:06:24 miniupnpd[784]: shutting down MiniUPnPd
Feb 14 00:06:24 WAN Connection: WAN was restored.
Feb 14 00:06:25 miniupnpd[786]: version 1.9 started
Feb 14 00:06:25 miniupnpd[786]: HTTP listening on port 49114
Feb 14 00:06:25 miniupnpd[786]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:06:27 rc_service: httpd 363:notify_rc start_webs_update
Feb 14 00:06:29 ntp: start NTP update
Feb  4 10:40:57 rc_service: ntp 459:notify_rc restart_upnp
Feb  4 02:40:57 miniupnpd[786]: shutting down MiniUPnPd
Feb  4 02:40:58 miniupnpd[853]: version 1.9 started
Feb  4 02:40:58 miniupnpd[853]: HTTP listening on port 58194
Feb  4 02:40:58 miniupnpd[853]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:40:59 rc_service: ntp 459:notify_rc restart_diskmon
Feb  4 02:40:59 disk_monitor: Finish
Feb  4 02:40:59 disk monitor: be idle
Feb  4 02:41:30 crond[362]: time disparity of 511355 minutes detected
Feb 14 08:00:15 syslogd started: BusyBox v1.17.4
Feb 14 08:00:15 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:15 kernel: Machine: Northstar Prototype
Feb 14 08:00:15 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 08:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:15 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:15 kernel: Virtual kernel memory layout:
Feb 14 08:00:15 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:15 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:15 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:15 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:15 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:15 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 08:00:15 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:15 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:15 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:15 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:15 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:  128MB
Feb 14 08:00:16 kernel: Block size:  128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:  16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:16 kernel: pflash: found no supported devices
Feb 14 08:00:16 kernel: bcmsflash: found no supported devices
Feb 14 08:00:16 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:16 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:16 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:16 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:16 nat: apply redirect rules
Feb 14 08:00:16 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:17 kernel: Empty flash at 0x001073e4 ends at 0x00107800
Feb 14 08:00:17 kernel: [dump prev ops] from 80000000, local len(2232)
Feb 14 08:00:17 kernel: _ Reboot message ... _______________________________________________________
Feb 14 08:00:17 kernel: <0>Restarting system.
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable ��ead fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, sizeto read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, sie to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5,  [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cache entUnable to read page, block 1adf1 Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adr: Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS e 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cFS error: Unable to read page, bHFS error: Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUAment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQe, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SSQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read<3>SQUASHFS error: Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to r5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: ____________________________________________________________________________
Feb 14 08:00:19 dnsmasq[355]: warning: no upstream servers configured
Feb 14 08:00:19 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:19 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:20 lldpd[385]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:20 lldpd[385]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:21 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:22 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:22 AAE: AAE Service is started
Feb 14 08:00:22 jffs2: valid logs(1)
Feb 14 08:00:22 hour monitor: daemon is starting
Feb 14 08:00:22 hour monitor: daemon terminates
Feb 14 08:00:22 disk monitor: be idle
Feb 14 08:00:22 miniupnpd[424]: version 1.9 started
Feb 14 08:00:22 miniupnpd[424]: HTTP listening on port 60025
Feb 14 08:00:22 miniupnpd[424]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:22 Mastiff: init
Feb 14 08:00:23 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb 14 08:00:23 wan: [deconfig] udhcpc done[286]
Feb 14 08:00:23 pppd[443]: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:23 rc_service: udhcpc 442:notify_rc start_firewall
Feb 14 08:00:23 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 08:00:23 pppd[443]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:23 pppd[443]: Connect: ppp0 <--> eth0
Feb 14 08:00:26 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:26 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:26 kernel: SCSI subsystem initialized
Feb 14 08:00:27 pppd[443]: PAP authentication succeeded
Feb 14 08:00:27 pppd[443]: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:27 pppd[443]: local  IP address 106.45.236.181
Feb 14 08:00:27 pppd[443]: remote IP address 106.45.236.1
Feb 14 08:00:27 pppd[443]: primary   DNS address 118.118.118.11
Feb 14 08:00:27 pppd[443]: secondary DNS address 202.100.96.68
Feb 14 08:00:27 rc_service: ip-up 542:notify_rc start_firewall
Feb 14 08:00:27 rc_service: waitting "start_firewall" via  ...
Feb 14 08:00:28 miniupnpd[424]: shutting down MiniUPnPd
Feb 14 08:00:28 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:30 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:30 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:30 miniupnpd[615]: version 1.9 started
Feb 14 08:00:30 miniupnpd[615]: HTTP listening on port 38787
Feb 14 08:00:30 miniupnpd[615]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:31 miniupnpd[615]: shutting down MiniUPnPd
Feb 14 08:00:31 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:31 wan: finish adding multi routes
Feb 14 08:00:31 rc_service: ip-up 542:notify_rc stop_upnp
Feb 14 08:00:31 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:31 miniupnpd[651]: version 1.9 started
Feb 14 08:00:31 miniupnpd[651]: HTTP listening on port 55150
Feb 14 08:00:31 miniupnpd[651]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:32 WAN Connection: WAN was restored.
Feb 14 08:00:32 rc_service: ip-up 542:notify_rc start_upnp
Feb 14 08:00:32 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:32 miniupnpd[651]: shutting down MiniUPnPd
Feb 14 08:00:33 miniupnpd[656]: version 1.9 started
Feb 14 08:00:33 miniupnpd[656]: HTTP listening on port 57258
Feb 14 08:00:33 miniupnpd[656]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:34 ntp: start NTP update
Feb  4 10:46:41 rc_service: ntp 636:notify_rc restart_upnp
Feb  4 10:46:41 miniupnpd[656]: shutting down MiniUPnPd
Feb  4 10:46:41 rc_service: ntp 636:notify_rc restart_diskmon
Feb  4 10:46:41 disk_monitor: Finish
Feb  4 10:46:41 miniupnpd[664]: version 1.9 started
Feb  4 10:46:41 miniupnpd[664]: HTTP listening on port 34032
Feb  4 10:46:41 miniupnpd[664]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:46:42 disk monitor: be idle
Feb  4 10:47:08 crond[362]: time disparity of 511366 minutes detected
Feb  4 10:47:10 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  4 10:48:17 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb  4 10:48:17 Mastiff: select error
Feb  4 10:48:17 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb  4 10:48:17 Mastiff: select error
Feb  4 10:48:17 rc_service: httpd 363:notify_rc restart_ddns
Feb  4 10:48:17 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 10:48:17 ddns update: ez-ipupdate: starting...
Feb  4 10:48:17 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 10:48:18 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:48:17 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 10:48:18 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 10:48:18 ddns update: asusddns_update: 0
Feb  4 10:48:18 ddns: ddns update ok
Feb  4 10:48:36 watchdog: start ddns.
Feb  4 10:48:36 rc_service: watchdog 367:notify_rc restart_ddns
Feb  4 10:48:36 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 10:48:36 rc_service: httpd 363:notify_rc restart_firewall
Feb  4 10:48:37 ddns update: ez-ipupdate: starting...
Feb  4 10:48:37 miniupnpd[664]: shutting down MiniUPnPd
Feb  4 10:48:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:48:37 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 10:48:37 miniupnpd[985]: version 1.9 started
Feb  4 10:48:37 miniupnpd[985]: HTTP listening on port 60127
Feb  4 10:48:37 miniupnpd[985]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:48:38 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:48:36 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 10:48:38 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 10:48:38 ddns update: asusddns_update: 0
Feb  4 10:48:39 ddns: ddns update ok
Feb  4 10:49:33 rc_service: cfg_server 1006:notify_rc restart_wireless
Feb  4 10:49:36 kernel: dhd_detach(): thread:dhd_watchdog_thread:7e terminated OK
Feb  4 10:49:36 kernel: dhd_detach(): thread:dhd_watchdog_thread:7a terminated OK
Feb  4 10:49:40 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:49:40 kernel: dhd_attach(): thread:dhd_watchdog_thread:449 started
Feb  4 10:49:41 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:49:41 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:49:41 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb  4 10:49:41 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:49:41 kernel: dhd_attach(): thread:dhd_watchdog_thread:451 started
Feb  4 10:49:42 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:49:42 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:49:42 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:50:03 rc_service: cfg_server 1225:notify_rc restart_wireless
Feb  4 10:50:05 lldpd[385]: unable to send packet on real device for eth1: Network is down
Feb  4 10:50:05 lldpd[385]: unable to send packet on real device for eth2: No such device or address
Feb  4 10:50:05 kernel: dhd_detach(): thread:dhd_watchdog_thread:451 terminated OK
Feb  4 10:50:05 kernel: dhd_detach(): thread:dhd_watchdog_thread:449 terminated OK
Feb  4 10:50:09 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:50:09 kernel: dhd_attach(): thread:dhd_watchdog_thread:522 started
Feb  4 10:50:09 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:50:09 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:50:09 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb  4 10:50:09 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:50:10 kernel: dhd_attach(): thread:dhd_watchdog_thread:527 started
Feb  4 10:50:10 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:50:10 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:50:10 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:50:35 WAN Connection: Fail to connect with some issues.
Feb  4 10:50:36 DualWAN: skip single wan wan_led_control - WANRED off
Feb  4 10:50:36 nat: apply redirect rules
Feb  4 10:50:36 pppd[443]: Connection terminated.
Feb  4 10:50:36 pppd[443]: Modem hangup
Feb  4 10:50:46 pppd[443]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  4 10:50:46 pppd[443]: Connect: ppp0 <--> eth0
Feb  4 10:50:46 pppd[443]: PAP authentication succeeded
Feb  4 10:50:46 pppd[443]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  4 10:50:47 pppd[443]: local  IP address 106.45.237.16
Feb  4 10:50:47 pppd[443]: remote IP address 106.45.236.1
Feb  4 10:50:47 pppd[443]: primary   DNS address 118.118.118.11
Feb  4 10:50:47 pppd[443]: secondary DNS address 202.100.96.68
Feb  4 10:50:47 rc_service: ip-up 1437:notify_rc start_firewall
Feb  4 10:50:47 miniupnpd[985]: shutting down MiniUPnPd
Feb  4 10:50:47 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:50:47 wan: finish adding multi routes
Feb  4 10:50:47 ntp: start NTP update
Feb  4 10:50:47 rc_service: ip-up 1437:notify_rc stop_upnp
Feb  4 10:50:47 rc_service: waitting "start_firewall" via ip-up ...
Feb  4 10:50:48 miniupnpd[1473]: version 1.9 started
Feb  4 10:50:48 miniupnpd[1473]: HTTP listening on port 40870
Feb  4 10:50:48 miniupnpd[1473]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:50:48 rc_service: ip-up 1437:notify_rc start_upnp
Feb  4 10:50:48 rc_service: waitting "stop_upnp" via ip-up ...
Feb  4 10:50:48 miniupnpd[1473]: shutting down MiniUPnPd
Feb  4 10:50:49 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 10:50:50 miniupnpd[1478]: version 1.9 started
Feb  4 10:50:50 miniupnpd[1478]: HTTP listening on port 57985
Feb  4 10:50:50 miniupnpd[1478]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:50:50 ddns update: ez-ipupdate: starting...
Feb  4 10:50:50 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 10:50:51 WAN Connection: WAN was restored.
Feb  4 10:50:52 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:50:50 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 10:50:52 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 10:50:52 ddns update: asusddns_update: 0
Feb  4 10:50:52 ddns: ddns update ok
Feb  4 10:51:11 rc_service: httpd 363:notify_rc restart_net_and_phy
Feb  4 10:51:13 iTunes: daemon is stoped
Feb  4 10:51:13 FTP Server: daemon is stoped
Feb  4 10:51:14 Samba Server: smb daemon is stoped
Feb  4 10:51:14 kernel: gro disabled
Feb  4 10:51:14 miniupnpd[1478]: shutting down MiniUPnPd
Feb  4 10:51:16 pppd[443]: Connection terminated.
Feb  4 10:51:16 wan: [deconfig] udhcpc done[286]
Feb  4 10:51:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:51:21 kernel: dhd_detach(): thread:dhd_watchdog_thread:527 terminated OK
Feb  4 10:51:22 kernel: dhd_detach(): thread:dhd_watchdog_thread:522 terminated OK
Feb  4 10:51:24 kernel: rtk port_phyEnableAll (off) ok
Feb  4 10:51:25 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:51:25 kernel: dhd_attach(): thread:dhd_watchdog_thread:65c started
Feb  4 10:51:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:51:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:51:26 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb  4 10:51:26 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:51:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:660 started
Feb  4 10:51:27 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:51:27 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:51:27 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:51:29 nat: apply redirect rules
Feb  4 10:51:29 dnsmasq[1704]: warning: no upstream servers configured
Feb  4 10:51:29 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb  4 10:51:29 wan: [deconfig] udhcpc done[286]
Feb  4 10:51:29 pppd[1709]: pppd 2.4.7 started by adminyyg, uid 0
Feb  4 10:51:29 rc_service: udhcpc 1710:notify_rc start_firewall
Feb  4 10:51:29 rc_service: waitting "restart_net_and_phy" via  ...
Feb  4 10:51:29 pppd[1709]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  4 10:51:29 pppd[1709]: Connect: ppp0 <--> eth0
Feb  4 10:51:29 pppd[1709]: PAP authentication succeeded
Feb  4 10:51:29 pppd[1709]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  4 10:51:29 pppd[1709]: local  IP address 106.45.237.16
Feb  4 10:51:29 pppd[1709]: remote IP address 106.45.236.1
Feb  4 10:51:29 pppd[1709]: primary   DNS address 118.118.118.11
Feb  4 10:51:29 pppd[1709]: secondary DNS address 202.100.96.68
Feb  4 10:51:29 rc_service: ip-up 1715:notify_rc start_firewall
Feb  4 10:51:29 rc_service: waitting "restart_net_and_phy" via  ...
Feb  4 10:51:32 kernel: rtk port_phyEnableAll (on) ok
Feb  4 10:51:32 miniupnpd[1739]: version 1.9 started
Feb  4 10:51:32 miniupnpd[1739]: HTTP listening on port 43249
Feb  4 10:51:32 miniupnpd[1739]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:51:32 RT-AC88U: start httpd
Feb  4 10:51:33 syslog: Generating SSL certificate...
Feb  4 10:51:33 wan: finish adding multi routes
Feb  4 10:51:33 WAN Connection: WAN was exceptionally disconnected.
Feb  4 10:51:34 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb  4 10:51:35 miniupnpd[1739]: shutting down MiniUPnPd
Feb  4 10:51:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:51:35 WAN Connection: WAN was restored.
Feb  4 10:51:36 miniupnpd[1808]: version 1.9 started
Feb  4 10:51:36 miniupnpd[1808]: HTTP listening on port 42260
Feb  4 10:51:36 miniupnpd[1808]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:51:37 miniupnpd[1808]: shutting down MiniUPnPd
Feb  4 10:51:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:51:37 wan: finish adding multi routes
Feb  4 10:51:37 rc_service: ip-up 1715:notify_rc stop_upnp
Feb  4 10:51:37 rc_service: waitting "start_firewall" via ip-up ...
Feb  4 10:51:38 miniupnpd[1858]: version 1.9 started
Feb  4 10:51:38 miniupnpd[1858]: HTTP listening on port 48268
Feb  4 10:51:38 miniupnpd[1858]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:51:38 rc_service: ip-up 1715:notify_rc start_upnp
Feb  4 10:51:38 rc_service: waitting "stop_upnp" via ip-up ...
Feb  4 10:51:38 miniupnpd[1858]: shutting down MiniUPnPd
Feb  4 10:51:39 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 10:51:39 ddns update: ez-ipupdate: starting...
Feb  4 10:51:39 miniupnpd[1864]: version 1.9 started
Feb  4 10:51:39 miniupnpd[1864]: HTTP listening on port 58065
Feb  4 10:51:39 miniupnpd[1864]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:51:43 ntp: start NTP update
Feb  4 10:51:45 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 10:51:45 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:51:44 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 10:51:45 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 10:51:45 ddns update: asusddns_update: 0
Feb  4 10:51:45 ddns: ddns update ok
Feb  4 10:55:43 rc_service: cfg_server 1985:notify_rc restart_wireless;restart_qos;restart_firewall;
Feb  4 10:55:45 kernel: dhd_detach(): thread:dhd_watchdog_thread:660 terminated OK
Feb  4 10:55:45 kernel: dhd_detach(): thread:dhd_watchdog_thread:65c terminated OK
Feb  4 10:55:49 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:55:49 kernel: dhd_attach(): thread:dhd_watchdog_thread:811 started
Feb  4 10:55:50 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:55:50 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:55:50 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb  4 10:55:50 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:55:50 kernel: dhd_attach(): thread:dhd_watchdog_thread:815 started
Feb  4 10:55:51 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:55:51 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:55:51 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:55:52 kernel: Register interface [wl1.1]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:55:58 miniupnpd[1864]: shutting down MiniUPnPd
Feb  4 10:55:58 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:55:58 miniupnpd[2225]: version 1.9 started
Feb  4 10:55:58 miniupnpd[2225]: HTTP listening on port 46637
Feb  4 10:55:58 miniupnpd[2225]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:58:57 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  4 11:00:42 disk_monitor: Got SIGALRM...
Feb  4 11:01:07 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  4 11:17:02 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  4 11:17:26 Mastiff: Got AAE_SIG_EULA_FLAG_SIGNED
Feb  4 11:17:26 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb  4 11:17:26 Mastiff: select error
Feb  4 11:17:41 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 11:17:41 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 11:17:42 kernel: sizeof forward pkt param = 192
Feb  4 11:17:42 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb  4 11:17:42 miniupnpd[2225]: shutting down MiniUPnPd
Feb  4 11:17:43 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 11:17:44 miniupnpd[3091]: version 1.9 started
Feb  4 11:17:44 miniupnpd[3091]: HTTP listening on port 50142
Feb  4 11:17:44 miniupnpd[3091]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 11:17:46 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 20030 is big. Consider r2q change.
Feb  4 11:17:48 kernel:  *** ERROR: [tdts_shell_ioctl_sig_op_load:95] tdts_core_rule_parsing_trf_load() fail!
Feb  4 11:17:49 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 11:17:49 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 11:17:49 kernel: sizeof forward pkt param = 192
Feb  4 11:17:55 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb  4 11:17:56 miniupnpd[3091]: shutting down MiniUPnPd
Feb  4 11:17:56 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 11:17:56 miniupnpd[3344]: version 1.9 started
Feb  4 11:17:57 kernel: tdts_udb: Unknown parameter `161'
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_ct_event_handler (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_devid_un_bootp (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_policy_match (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_usr_msg_handler (err 0)
Feb  4 11:17:58 miniupnpd[3344]: HTTP listening on port 32962
Feb  4 11:17:58 miniupnpd[3344]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_wan_detection (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol dev_wan (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol mode (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_unregister_qos_ops (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_get_action (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_devid_un_http_ua (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_do_fastpath_action (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_qos_data (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_register_qos_ops (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_reg_func_find_ct (err 0)
Feb  4 11:17:58 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 11:17:59 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 11:17:59 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 11:17:59 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 11:17:59 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb  4 11:18:11 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 11:18:11 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 11:18:11 kernel: sizeof forward pkt param = 192
Feb  4 11:18:24 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 11:18:25 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 11:18:25 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 11:18:25 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 11:18:25 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb  4 11:18:25 rc_service: bwdpi_check 415:notify_rc start_firewall
Feb  4 11:18:25 miniupnpd[3344]: shutting down MiniUPnPd
Feb  4 11:18:25 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 11:18:26 miniupnpd[3653]: version 1.9 started
Feb  4 11:18:26 miniupnpd[3653]: HTTP listening on port 36449
Feb  4 11:18:26 miniupnpd[3653]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 11:34:22 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  4 11:57:07 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  4 12:02:11 rc_service: httpd 1741:notify_rc restart_wan_if 0
Feb  4 12:02:11 pppd[1709]: Connection terminated.
Feb  4 12:02:12 wan: [deconfig] udhcpc done[286]
Feb  4 12:02:14 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb  4 12:02:14 pppd[4641]: pppd 2.4.7 started by adminyyg, uid 0
Feb  4 12:02:14 pppd[4641]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  4 12:02:15 pppd[4641]: Connect: ppp0 <--> eth0
Feb  4 12:02:15 pppd[4641]: PAP authentication succeeded
Feb  4 12:02:15 pppd[4641]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  4 12:02:15 pppd[4641]: local  IP address 14.135.64.229
Feb  4 12:02:15 pppd[4641]: remote IP address 14.135.64.1
Feb  4 12:02:15 pppd[4641]: primary   DNS address 118.118.118.11
Feb  4 12:02:15 pppd[4641]: secondary DNS address 202.100.96.68
Feb  4 12:02:15 rc_service: ip-up 4646:notify_rc start_firewall
Feb  4 12:02:16 miniupnpd[3653]: delete_filter_rule() : iptc_commit(): Resource temporarily unavailable
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9906 -> 192.168.1.100:9906 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9907 -> 192.168.1.100:9907 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9908 -> 192.168.1.100:9908 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8730 -> 192.168.1.100:8730 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 51417 -> 192.168.1.100:51417 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 51417 -> 192.168.1.100:51417 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8001 -> 192.168.1.100:8001 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 21000 -> 192.168.1.100:21000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9800 -> 192.168.1.100:9800 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9802 -> 192.168.1.100:9802 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 38000 -> 192.168.1.100:38000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 44300 -> 192.168.1.100:44300 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 3306 -> 192.168.1.100:3306 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 1868 -> 192.168.1.100:1868 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 22220 -> 192.168.1.100:22220 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8000 -> 192.168.1.100:8000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8809 -> 192.168.1.100:8809 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8200 -> 192.168.1.100:8200 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8200 -> 192.168.1.100:8200 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 5001 -> 192.168.1.100:5001 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 5001 -> 192.168.1.100:5001 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 3689 -> 192.168.1.100:3689 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 3689 -> 192.168.1.100:3689 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8008 -> 192.168.1.100:8008 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8008 -> 192.168.1.100:8008 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8009 -> 192.168.1.100:8009 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8009 -> 192.168.1.100:8009 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8010 -> 192.168.1.100:8010 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8010 -> 192.168.1.100:8010 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8011 -> 192.168.1.100:8011 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8011 -> 192.168.1.100:8011 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8012 -> 192.168.1.100:8012 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8012 -> 192.168.1.100:8012 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8807 -> 192.168.1.100:8807 protocol UDP
Feb  4 12:02:16 wan: finish adding multi routes
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 5548 -> 192.168.1.100:5548 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 1884 -> 192.168.1.100:1884 protocol TCP
Feb  4 12:02:16 rc_service: ip-up 4646:notify_rc stop_upnp
Feb  4 12:02:16 rc_service: waitting "start_firewall" via ip-up ...
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 12000 -> 192.168.1.100:12000 protocol TCP
Feb  4 12:02:16 ntp: start NTP update
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 14000 -> 192.168.1.100:14000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 60000 -> 192.168.1.100:60000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 36667 -> 192.168.1.100:36667 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 1828 -> 192.168.1.100:1828 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 1828 -> 192.168.1.100:1828 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9900 -> 192.168.1.100:9900 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9901 -> 192.168.1.100:9901 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9902 -> 192.168.1.100:9902 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9903 -> 192.168.1.100:9903 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9904 -> 192.168.1.100:9904 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9905 -> 192.168.1.100:9905 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9906 -> 192.168.1.100:9906 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9907 -> 192.168.1.100:9907 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9908 -> 192.168.1.100:9908 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8730 -> 192.168.1.100:8730 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: shutting down MiniUPnPd
Feb  4 12:02:16 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 12:02:17 miniupnpd[4684]: version 1.9 started
Feb  4 12:02:17 miniupnpd[4684]: HTTP listening on port 40056
Feb  4 12:02:17 rc_service: ip-up 4646:notify_rc start_upnp
Feb  4 12:02:17 rc_service: waitting "stop_upnp" via ip-up ...
Feb  4 12:02:17 miniupnpd[4684]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 12:02:17 miniupnpd[4684]: shutting down MiniUPnPd
Feb  4 12:02:18 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 12:02:19 ddns update: ez-ipupdate: starting...
Feb  4 12:02:19 miniupnpd[4688]: version 1.9 started
Feb  4 12:02:19 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 12:02:19 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 04:02:18 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 12:02:19 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 12:02:19 ddns update: asusddns_update: 0
Feb  4 12:02:19 miniupnpd[4688]: HTTP listening on port 56620
Feb  4 12:02:19 miniupnpd[4688]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 12:02:19 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 12:02:19 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 12:02:19 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 12:02:19 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 12:02:19 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb  4 12:02:20 ddns: ddns update ok
Feb  4 12:02:26 rc_service: zcip 4743:notify_rc start_firewall
Feb  4 12:02:26 zcip client: configured 169.254.72.55
Feb  4 12:02:27 miniupnpd[4688]: shutting down MiniUPnPd
Feb  4 12:02:27 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 12:02:27 miniupnpd[4764]: version 1.9 started
Feb  4 12:02:27 miniupnpd[4764]: HTTP listening on port 49274
Feb  4 12:02:27 miniupnpd[4764]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 12:51:32 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  4 13:04:37 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  4 13:06:26 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb  4 13:06:26 miniupnpd[4764]: shutting down MiniUPnPd
Feb  4 13:06:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 13:06:27 miniupnpd[6381]: version 1.9 started
Feb  4 13:06:29 miniupnpd[6381]: HTTP listening on port 43318
Feb  4 13:06:29 miniupnpd[6381]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 13:06:29 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 13:06:29 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 13:06:29 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 13:06:29 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 13:06:29 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 13:06:29 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 13:06:30 kernel: sizeof forward pkt param = 192
Feb  4 13:06:47 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 13:06:47 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 13:06:47 kernel: sizeof forward pkt param = 192
Feb  4 13:06:59 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 13:06:59 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 13:06:59 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 13:06:59 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 13:06:59 rc_service: bwdpi_check 415:notify_rc start_firewall
Feb  4 13:06:59 miniupnpd[6381]: shutting down MiniUPnPd
Feb  4 13:06:59 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 13:07:00 miniupnpd[6853]: version 1.9 started
Feb  4 13:07:00 miniupnpd[6853]: HTTP listening on port 41162
Feb  4 13:07:00 miniupnpd[6853]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 17:44:42 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  4 18:31:52 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  4 18:33:12 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  4 23:00:42 disk_monitor: Got SIGALRM...
Feb  4 23:03:32 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  4 23:59:02 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  5 00:02:16 ntp: start NTP update
Feb  5 05:40:24 pppd[4641]: Connection terminated.
Feb  5 05:40:25 pppd[4641]: Modem hangup
Feb  5 05:40:25 WAN Connection: Fail to connect with some issues.
Feb  5 05:40:26 DualWAN: skip single wan wan_led_control - WANRED off
Feb  5 05:40:26 nat: apply redirect rules
Feb  5 05:40:35 pppd[4641]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  5 05:40:35 pppd[4641]: Connect: ppp0 <--> eth0
Feb  5 05:40:35 pppd[4641]: PAP authentication succeeded
Feb  5 05:40:35 pppd[4641]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  5 05:40:35 pppd[4641]: local  IP address 222.75.136.67
Feb  5 05:40:35 pppd[4641]: remote IP address 222.75.136.1
Feb  5 05:40:35 pppd[4641]: primary   DNS address 118.118.118.11
Feb  5 05:40:35 pppd[4641]: secondary DNS address 202.100.96.68
Feb  5 05:40:35 rc_service: ip-up 29037:notify_rc start_firewall
Feb  5 05:40:36 wan: finish adding multi routes
Feb  5 05:40:36 rc_service: ip-up 29037:notify_rc stop_upnp
Feb  5 05:40:36 rc_service: waitting "start_firewall" via ip-up ...
Feb  5 05:40:36 ntp: start NTP update
Feb  5 05:40:36 wan: finish adding multi routes
Feb  5 05:40:36 miniupnpd[6853]: shutting down MiniUPnPd
Feb  5 05:40:36 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 05:40:37 miniupnpd[29092]: version 1.9 started
Feb  5 05:40:37 rc_service: ip-up 29037:notify_rc start_upnp
Feb  5 05:40:37 rc_service: waitting "stop_upnp" via ip-up ...
Feb  5 05:40:37 miniupnpd[29092]: HTTP listening on port 58994
Feb  5 05:40:37 miniupnpd[29092]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 05:40:37 miniupnpd[29092]: shutting down MiniUPnPd
Feb  5 05:40:38 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  5 05:40:38 ddns update: ez-ipupdate: starting...
Feb  5 05:40:38 miniupnpd[29096]: version 1.9 started
Feb  5 05:40:38 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  5 05:40:39 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 21:40:38 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  5 05:40:39 ddns update: retval= 0, ddns_return_code (,200)
Feb  5 05:40:39 ddns update: asusddns_update: 0
Feb  5 05:40:39 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  5 05:40:39 miniupnpd[29096]: HTTP listening on port 33508
Feb  5 05:40:39 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  5 05:40:39 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  5 05:40:39 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  5 05:40:39 miniupnpd[29096]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 05:40:39 ddns: ddns update ok
Feb  5 05:40:41 WAN Connection: WAN was restored.
Feb  5 05:40:42 ntp: start NTP update
Feb  5 05:50:32 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  5 05:50:32 kernel: UDB Core Version: 0.2.14 r3529123
Feb  5 05:50:32 kernel: sizeof forward pkt param = 192
Feb  5 05:52:04 rc_service: httpd 1741:notify_rc restart_firewall
Feb  5 05:52:04 rc_service: httpd 1741:notify_rc restart_firewall;restart_wrs
Feb  5 05:52:04 rc_service: waitting "restart_firewall" via httpd ...
Feb  5 05:52:04 miniupnpd[29096]: shutting down MiniUPnPd
Feb  5 05:52:04 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 05:52:05 miniupnpd[29819]: version 1.9 started
Feb  5 05:52:05 miniupnpd[29819]: HTTP listening on port 51495
Feb  5 05:52:05 miniupnpd[29819]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 05:52:05 miniupnpd[29819]: shutting down MiniUPnPd
Feb  5 05:52:05 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 05:52:06 miniupnpd[29841]: version 1.9 started
Feb  5 05:52:06 miniupnpd[29841]: HTTP listening on port 44619
Feb  5 05:52:06 miniupnpd[29841]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 05:52:12 hour monitor: daemon is starting
Feb  5 07:22:12 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  5 08:07:22 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  5 08:48:42 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  5 12:24:57 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  5 14:09:02 pppd[4641]: Connection terminated.
Feb  5 14:09:02 WAN Connection: Fail to connect with some issues.
Feb  5 14:09:02 pppd[4641]: Modem hangup
Feb  5 14:09:02 DualWAN: skip single wan wan_led_control - WANRED off
Feb  5 14:09:03 miniupnpd[29841]: addnatrule() : iptc_commit() error : Invalid argument
Feb  5 14:09:03 miniupnpd[29841]: Failed to redirect 36667 -> 192.168.1.100:36667 protocol UDP
Feb  5 14:09:03 nat: apply redirect rules
Feb  5 14:09:12 pppd[4641]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  5 14:09:12 pppd[4641]: Connect: ppp0 <--> eth0
Feb  5 14:09:12 pppd[4641]: PAP authentication succeeded
Feb  5 14:09:12 pppd[4641]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  5 14:09:12 pppd[4641]: local  IP address 36.103.106.38
Feb  5 14:09:12 pppd[4641]: remote IP address 36.103.104.1
Feb  5 14:09:12 pppd[4641]: primary   DNS address 118.118.118.11
Feb  5 14:09:12 pppd[4641]: secondary DNS address 202.100.96.68
Feb  5 14:09:12 rc_service: ip-up 9681:notify_rc start_firewall
Feb  5 14:09:13 wan: finish adding multi routes
Feb  5 14:09:13 rc_service: ip-up 9681:notify_rc stop_upnp
Feb  5 14:09:13 rc_service: waitting "start_firewall" via ip-up ...
Feb  5 14:09:13 ntp: start NTP update
Feb  5 14:09:12 WAN Connection: WAN was restored.
Feb  5 14:09:12 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0) error!
Feb  5 14:09:13 miniupnpd[29841]: shutting down MiniUPnPd
Feb  5 14:09:13 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 14:09:13 miniupnpd[9724]: version 1.9 started
Feb  5 14:09:14 rc_service: ip-up 9681:notify_rc start_upnp
Feb  5 14:09:14 rc_service: waitting "stop_upnp" via ip-up ...
Feb  5 14:09:16 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  5 14:09:16 ddns update: ez-ipupdate: starting...
Feb  5 14:09:16 miniupnpd[9727]: version 1.9 started
Feb  5 14:09:16 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  5 14:09:17 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Mon, 05 Feb 2018 06:09:16 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  5 14:09:17 ddns update: retval= 0, ddns_return_code (,200)
Feb  5 14:09:17 ddns update: asusddns_update: 0
Feb  5 14:09:18 ddns: ddns update ok
Feb  5 14:09:21 miniupnpd[9727]: HTTP listening on port 34860
Feb  5 14:09:21 miniupnpd[9727]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 14:09:22 rc_service: ip-up 9681:notify_rc start_firewall
Feb  5 14:09:22 miniupnpd[9727]: shutting down MiniUPnPd
Feb  5 14:09:22 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 14:09:22 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  5 14:09:22 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  5 14:09:22 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  5 14:09:22 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  5 14:09:23 miniupnpd[9822]: version 1.9 started
Feb  5 14:09:25 miniupnpd[9822]: HTTP listening on port 52346
Feb  5 14:09:25 miniupnpd[9822]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 17:59:41 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  5 18:39:16 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  5 18:57:01 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  5 20:58:41 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  5 21:00:01 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  6 02:09:09 ntp: start NTP update
Feb  6 07:40:16 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  6 10:48:17 rc_service: rc 6671:notify_rc restart_wrs
Feb  6 12:07:36 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  6 12:35:36 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  6 13:35:01 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  6 14:09:09 ntp: start NTP update
Feb  6 17:27:20 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  6 18:00:15 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  6 19:06:50 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  6 19:39:59 miniupnpd[9822]: upnp_event_process_notify: connect(192.168.1.159:2869): No route to host
Feb  6 20:51:24 miniupnpd[9822]: upnp_event_send: send(): Connection reset by peer
Feb  7 02:09:06 ntp: start NTP update
Feb  7 05:35:15 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  7 06:13:18 WAN Connection: Fail to connect with some issues.
Feb  7 06:13:18 DualWAN: skip single wan wan_led_control - WANRED off
Feb  7 06:13:19 nat: apply redirect rules
Feb  7 06:13:20 pppd[4641]: Connection terminated.
Feb  7 06:13:20 pppd[4641]: Modem hangup
Feb  7 06:13:30 pppd[4641]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  7 06:13:30 pppd[4641]: Connect: ppp0 <--> eth0
Feb  7 06:13:31 pppd[4641]: PAP authentication succeeded
Feb  7 06:13:31 pppd[4641]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  7 06:13:31 pppd[4641]: local  IP address 111.113.210.229
Feb  7 06:13:31 pppd[4641]: remote IP address 111.113.208.1
Feb  7 06:13:31 pppd[4641]: primary   DNS address 118.118.118.11
Feb  7 06:13:31 pppd[4641]: secondary DNS address 202.100.96.68
Feb  7 06:13:31 rc_service: ip-up 3097:notify_rc start_firewall
Feb  7 06:13:31 wan: finish adding multi routes
Feb  7 06:13:31 rc_service: ip-up 3097:notify_rc stop_upnp
Feb  7 06:13:31 rc_service: waitting "start_firewall" via ip-up ...
Feb  7 06:13:31 ntp: start NTP update
Feb  7 06:13:32 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 06:13:33 WAN Connection: WAN was restored.
Feb  7 06:13:33 miniupnpd[3139]: version 1.9 started
Feb  7 06:13:33 rc_service: ip-up 3097:notify_rc start_upnp
Feb  7 06:13:33 rc_service: waitting "stop_upnp" via ip-up ...
Feb  7 06:13:34 miniupnpd[3139]: HTTP listening on port 56850
Feb  7 06:13:34 miniupnpd[3139]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 06:13:34 miniupnpd[3139]: shutting down MiniUPnPd
Feb  7 06:13:34 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 06:13:34 miniupnpd[3142]: version 1.9 started
Feb  7 06:13:35 ddns update: ez-ipupdate: starting...
Feb  7 06:13:35 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  7 06:13:35 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Tue, 06 Feb 2018 22:13:35 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  7 06:13:35 ddns update: retval= 0, ddns_return_code (,200)
Feb  7 06:13:35 ddns update: asusddns_update: 0
Feb  7 06:13:36 ddns: ddns update ok
Feb  7 06:13:36 miniupnpd[3142]: HTTP listening on port 42188
Feb  7 06:13:36 miniupnpd[3142]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 06:13:51 rc_service: ip-up 3097:notify_rc start_firewall
Feb  7 06:13:51 miniupnpd[3142]: shutting down MiniUPnPd
Feb  7 06:13:51 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 06:13:52 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  7 06:13:52 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  7 06:13:52 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  7 06:13:52 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  7 06:13:52 miniupnpd[3247]: version 1.9 started
Feb  7 06:13:52 miniupnpd[3247]: HTTP listening on port 37856
Feb  7 06:13:52 miniupnpd[3247]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 07:44:15 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 08:49:55 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 09:04:15 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 12:10:50 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  7 13:29:55 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  7 13:44:05 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 17:09:55 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 18:58:10 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  7 18:59:30 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb 14 08:00:16 syslogd started: BusyBox v1.17.4
Feb 14 08:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:16 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:16 kernel: Machine: Northstar Prototype
Feb 14 08:00:16 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 08:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:16 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:16 kernel: Virtual kernel memory layout:
Feb 14 08:00:16 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:16 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:16 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:16 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:16 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:16 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 08:00:16 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:16 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:16 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:16 kernel: * Invalid signature of oopsbuf: E1-45-A1-28-49-C0-E1-B8 (len 2967688019)
Feb 14 08:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:16 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:16 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:  128MB
Feb 14 08:00:16 kernel: Block size:  128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:  16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 nat: apply redirect rules
Feb 14 08:00:17 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:17 kernel: pflash: found no supported devices
Feb 14 08:00:17 kernel: bcmsflash: found no supported devices
Feb 14 08:00:17 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:17 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:17 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:17 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:17 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:17 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:17 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:17 kernel: Register interface [wl1.1]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:20 dnsmasq[360]: warning: no upstream servers configured
Feb 14 08:00:20 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:20 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:21 lldpd[407]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:21 lldpd[407]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:22 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:23 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:23 AAE: AAE Service is started
Feb 14 08:00:23 jffs2: valid logs(1)
Feb 14 08:00:23 disk monitor: be idle
Feb 14 08:00:23 hour monitor: daemon is starting
Feb 14 08:00:23 Mastiff: init
Feb 14 08:00:23 miniupnpd[457]: version 1.9 started
Feb 14 08:00:23 miniupnpd[457]: HTTP listening on port 49363
Feb 14 08:00:23 miniupnpd[457]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:24 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb 14 08:00:24 pppd[487]: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:27 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:27 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:28 kernel: SCSI subsystem initialized
Feb 14 08:00:36 rc_service: zcip 586:notify_rc start_firewall
Feb 14 08:00:36 zcip client: configured 169.254.72.55
Feb 14 08:00:36 miniupnpd[457]: shutting down MiniUPnPd
Feb 14 08:00:36 nat: apply nat rules (/tmp/nat_rules__eth0)
Feb 14 08:00:37 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:37 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:37 miniupnpd[629]: version 1.9 started
Feb 14 08:00:37 miniupnpd[629]: HTTP listening on port 39976
Feb 14 08:00:37 miniupnpd[629]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:39 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:39 pppd[487]: Connect: ppp0 <--> eth0
Feb 14 08:00:39 pppd[487]: PAP authentication succeeded
Feb 14 08:00:39 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:40 pppd[487]: local  IP address 14.134.10.226
Feb 14 08:00:40 pppd[487]: remote IP address 14.134.8.1
Feb 14 08:00:40 pppd[487]: primary   DNS address 118.118.118.11
Feb 14 08:00:40 pppd[487]: secondary DNS address 202.100.96.68
Feb 14 08:00:40 rc_service: ip-up 642:notify_rc start_firewall
Feb 14 08:00:41 miniupnpd[629]: shutting down MiniUPnPd
Feb 14 08:00:41 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:41 wan: finish adding multi routes
Feb 14 08:00:41 rc_service: ip-up 642:notify_rc stop_upnp
Feb 14 08:00:41 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:41 WAN Connection: WAN was restored.
Feb 14 08:00:41 ntp: start NTP update
Feb 14 08:00:42 miniupnpd[688]: version 1.9 started
Feb 14 08:00:42 miniupnpd[688]: HTTP listening on port 55984
Feb 14 08:00:42 miniupnpd[688]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:42 rc_service: ip-up 642:notify_rc start_upnp
Feb 14 08:00:42 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:42 miniupnpd[688]: shutting down MiniUPnPd
Feb 14 08:00:43 miniupnpd[691]: version 1.9 started
Feb 14 08:00:43 miniupnpd[691]: HTTP listening on port 37594
Feb 14 08:00:43 miniupnpd[691]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:44 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb 14 08:00:45 ntp: start NTP update
Feb  7 19:03:27 rc_service: ntp 667:notify_rc restart_upnp
Feb  7 19:03:27 miniupnpd[691]: shutting down MiniUPnPd
Feb  7 19:03:27 rc_service: ntp 667:notify_rc restart_diskmon
Feb  7 19:03:27 disk_monitor: Finish
Feb  7 19:03:27 miniupnpd[699]: version 1.9 started
Feb  7 19:03:27 miniupnpd[699]: HTTP listening on port 43288
Feb  7 19:03:27 miniupnpd[699]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:03:28 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 19:03:28 ddns update: ez-ipupdate: starting...
Feb  7 19:03:28 disk monitor: be idle
Feb  7 19:03:32 watchdog: start ddns.
Feb  7 19:03:32 rc_service: watchdog 385:notify_rc restart_ddns
Feb  7 19:03:32 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 19:03:33 ddns update: ez-ipupdate: starting...
Feb  7 19:03:41 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  7 19:03:41 kernel: UDB Core Version: 0.2.14 r3529123
Feb  7 19:03:41 kernel: sizeof forward pkt param = 192
Feb  7 19:03:43 crond[367]: time disparity of 516183 minutes detected
Feb  7 19:03:46 rc_service: ip-up 642:notify_rc start_firewall
Feb  7 19:03:47 miniupnpd[699]: shutting down MiniUPnPd
Feb  7 19:03:47 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 19:03:47 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  7 19:03:47 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  7 19:03:47 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  7 19:03:47 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  7 19:03:48 miniupnpd[928]: version 1.9 started
Feb  7 19:03:48 miniupnpd[928]: HTTP listening on port 50567
Feb  7 19:03:48 miniupnpd[928]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:04:02 watchdog: start ddns.
Feb  7 19:04:02 rc_service: watchdog 385:notify_rc start_ddns
Feb  7 19:04:02 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 19:04:02 ddns update: ez-ipupdate: starting...
Feb  7 19:04:03 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  7 19:04:03 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 11:04:02 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  7 19:04:03 ddns update: retval= 0, ddns_return_code (,200)
Feb  7 19:04:03 ddns update: asusddns_update: 0
Feb  7 19:04:03 ddns: ddns update ok
Feb  7 19:05:01 rc_service: service 1229:notify_rc restart_letsencrypt
Feb  7 19:05:05 hour monitor: ntp sync fail, will retry after 120 sec
Feb  7 19:05:11 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  7 19:05:11 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  7 19:05:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... v6qElfg/3375327968: bad response
Feb  7 19:05:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... MxDvWJYcWjEGbreGDo: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/73r9I0PHZk7unVNKi-CBuBHHHf8E5tL4rNKev6qElfg/3375327968", "token": "9oVAs6TDWuGS8KwA9PrzZiBShMxDvWJYcWjEGbreGDo", "keyAuthorization": "9oVAs6TDWuGS8K
Feb  7 19:09:24 pppd[487]: Connection terminated.
Feb  7 19:09:24 pppd[487]: Modem hangup
Feb  7 19:09:25 WAN Connection: Fail to connect with some issues.
Feb  7 19:09:25 DualWAN: skip single wan wan_led_control - WANRED off
Feb  7 19:09:26 nat: apply redirect rules
Feb  7 19:09:34 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  7 19:09:34 pppd[487]: Connect: ppp0 <--> eth0
Feb  7 19:09:34 pppd[487]: PAP authentication succeeded
Feb  7 19:09:34 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  7 19:09:34 pppd[487]: local  IP address 14.134.8.18
Feb  7 19:09:34 pppd[487]: remote IP address 14.134.8.1
Feb  7 19:09:34 pppd[487]: primary   DNS address 118.118.118.11
Feb  7 19:09:34 pppd[487]: secondary DNS address 202.100.96.68
Feb  7 19:09:34 rc_service: ip-up 1405:notify_rc start_firewall
Feb  7 19:09:35 miniupnpd[928]: shutting down MiniUPnPd
Feb  7 19:09:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 19:09:35 wan: finish adding multi routes
Feb  7 19:09:35 ntp: start NTP update
Feb  7 19:09:35 rc_service: ip-up 1405:notify_rc stop_upnp
Feb  7 19:09:35 rc_service: waitting "start_firewall" via ip-up ...
Feb  7 19:09:35 miniupnpd[1443]: version 1.9 started
Feb  7 19:09:35 miniupnpd[1443]: HTTP listening on port 39756
Feb  7 19:09:35 miniupnpd[1443]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:09:36 rc_service: ip-up 1405:notify_rc start_upnp
Feb  7 19:09:36 rc_service: waitting "stop_upnp" via ip-up ...
Feb  7 19:09:36 miniupnpd[1443]: shutting down MiniUPnPd
Feb  7 19:09:37 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 19:09:37 ddns update: ez-ipupdate: starting...
Feb  7 19:09:37 miniupnpd[1446]: version 1.9 started
Feb  7 19:09:37 miniupnpd[1446]: HTTP listening on port 44498
Feb  7 19:09:37 miniupnpd[1446]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:09:39 WAN Connection: WAN was restored.
Feb  7 19:09:42 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  7 19:09:43 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 11:09:41 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  7 19:09:43 ddns update: retval= 0, ddns_return_code (,200)
Feb  7 19:09:43 ddns update: asusddns_update: 0
Feb  7 19:09:43 ddns: ddns update ok
Feb  7 19:09:53 rc_service: ip-up 1405:notify_rc start_firewall
Feb  7 19:09:54 miniupnpd[1446]: shutting down MiniUPnPd
Feb  7 19:09:54 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 19:09:54 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  7 19:09:54 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  7 19:09:54 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  7 19:09:54 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  7 19:09:55 miniupnpd[1542]: version 1.9 started
Feb  7 19:09:55 miniupnpd[1542]: HTTP listening on port 54874
Feb  7 19:09:55 miniupnpd[1542]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:10:01 rc_service: service 1565:notify_rc restart_letsencrypt
Feb  7 19:10:11 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 19:10:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... VF7nkIM/3375374659: bad response
Feb  7 19:10:40 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... h99k-79ARFCWA76X4s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/LmS4jCntmGe_8Rx7KIhv_54ni8utoiVvEy7IVF7nkIM/3375374659", "token": "t6-yxN2xu5Iiwl5To_vJt24A5h99k-79ARFCWA76X4s", "keyAuthorization": "t6-yxN2xu5Iiwl
Feb  7 19:11:26 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  7 19:15:01 rc_service: service 1763:notify_rc restart_letsencrypt
Feb  7 19:15:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 27XOwOM/3375424395: bad response
Feb  7 19:15:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... pN_4xcrEmlGsef0PrY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/KnfbDSizir0-QXYBFLxYLGXEvPoEttI8N0jr27XOwOM/3375424395", "token": "gjT-_YhVglJUxs4ZGnQBowhqrpN_4xcrEmlGsef0PrY", "keyAuthorization": "gjT-_YhVglJUxs
Feb  7 19:20:01 rc_service: service 1957:notify_rc restart_letsencrypt
Feb  7 19:20:42 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 0CfJ0hg/3375470525: bad response
Feb  7 19:20:42 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 1Zvppnh8-hgQFDI96c: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/edLLFpMybWoFZ8m4n_3zXW6-qsiKrdI4zKv00CfJ0hg/3375470525", "token": "K6xyCxqa4w8IZX5Qym5mrjLIY1Zvppnh8-hgQFDI96c", "keyAuthorization": "K6xyCxqa4w8IZX
Feb  7 19:25:01 rc_service: service 2131:notify_rc restart_letsencrypt
Feb  7 19:25:40 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... VtWftIw/3375515545: bad response
Feb  7 19:25:40 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... ZtoV4jR3KoH6EEZtb4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/BqtNSYWjy36HMyMlGE1o5rtp8gbgSo54HnCDVtWftIw/3375515545", "token": "0LRbCp3GmLPCcyLscMrS1X0K7ZtoV4jR3KoH6EEZtb4", "keyAuthorization": "0LRbCp3GmLPCcy
Feb  7 19:30:01 rc_service: service 2335:notify_rc restart_letsencrypt
Feb  7 19:30:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:30:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:35:01 rc_service: service 2522:notify_rc restart_letsencrypt
Feb  7 19:35:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:35:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:40:01 rc_service: service 2730:notify_rc restart_letsencrypt
Feb  7 19:40:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:40:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:45:01 rc_service: service 2906:notify_rc restart_letsencrypt
Feb  7 19:45:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:45:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:50:01 rc_service: service 3099:notify_rc restart_letsencrypt
Feb  7 19:50:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:50:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:55:01 rc_service: service 3299:notify_rc restart_letsencrypt
Feb  7 19:55:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:55:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:00:01 rc_service: service 3522:notify_rc restart_letsencrypt
Feb  7 20:00:26 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:00:26 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:05:01 rc_service: service 3723:notify_rc restart_letsencrypt
Feb  7 20:05:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... nJ8rQwE/3375900419: bad response
Feb  7 20:05:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... iHSdQouy9PDVnDgbjY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/vLiU6Kn-oz4eg0kjcCNXwThdEOyFM6W8zemGnJ8rQwE/3375900419", "token": "0wsSI3mYk6EfI6OD3dVxwYFfriHSdQouy9PDVnDgbjY", "keyAuthorization": "0wsSI3mYk6EfI6
Feb  7 20:10:01 rc_service: service 3933:notify_rc restart_letsencrypt
Feb  7 20:10:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:10:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:15:01 rc_service: service 4114:notify_rc restart_letsencrypt
Feb  7 20:15:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... x9XEfIo/3375992845: bad response
Feb  7 20:15:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... Y6oVugV2gWPfCHioVM: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/PAFEOOpQCI0Hy6T-r8kMoyTzAK93h6WUIrh7x9XEfIo/3375992845", "token": "m2-Mkvpcq-R_4VwR1MiDB_FRUY6oVugV2gWPfCHioVM", "keyAuthorization": "m2-Mkvpcq-R_4V
Feb  7 20:20:01 rc_service: service 4319:notify_rc restart_letsencrypt
Feb  7 20:20:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... WCUhwJY/3376041045: bad response
Feb  7 20:20:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... uHdBZcBR-gJgQJLvoY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/iN5WFvIm_ka-NtU2DDXz3MwQfWeDPwq56dILWCUhwJY/3376041045", "token": "4dkooKUhFTKSjOyBUpltxdYbfuHdBZcBR-gJgQJLvoY", "keyAuthorization": "4dkooKUhFTKSjO
Feb  7 20:25:01 rc_service: service 4531:notify_rc restart_letsencrypt
Feb  7 20:25:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... QxdRhFw/3376088779: bad response
Feb  7 20:25:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... WdMBmjYrbhgPDjOIHs: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/z7hAy5p6ADGuYnrXJby8f6xT8-HlKfLT9oq8QxdRhFw/3376088779", "token": "REZ04fmJnLCoGhOliu-61dX49WdMBmjYrbhgPDjOIHs", "keyAuthorization": "REZ04fmJnLCoGh
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:30:01 rc_service: service 4725:notify_rc restart_letsencrypt
Feb  7 20:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... fC0AsJA/3376133444: bad response
Feb  7 20:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... N-36LR6oyO9iIsiuvg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/qwTqKJ5ksgB2bU9iA1yeTcx970VQ_MXsFXtsfC0AsJA/3376133444", "token": "8qjJ0U8XoJmQkCQaDvPiCYX01N-36LR6oyO9iIsiuvg", "keyAuthorization": "8qjJ0U8XoJmQkC
Feb  7 20:35:01 rc_service: service 4910:notify_rc restart_letsencrypt
Feb  7 20:35:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:35:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:40:01 rc_service: service 5091:notify_rc restart_letsencrypt
Feb  7 20:40:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:40:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:45:01 rc_service: service 5282:notify_rc restart_letsencrypt
Feb  7 20:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:50:01 rc_service: service 5460:notify_rc restart_letsencrypt
Feb  7 20:50:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:50:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:55:01 rc_service: service 5650:notify_rc restart_letsencrypt
Feb  7 20:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:00:01 rc_service: service 5836:notify_rc restart_letsencrypt
Feb  7 21:00:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:00:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:05:01 rc_service: service 6039:notify_rc restart_letsencrypt
Feb  7 21:05:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:05:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:10:01 rc_service: service 6222:notify_rc restart_letsencrypt
Feb  7 21:10:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 6cs7imE/3376500311: bad response
Feb  7 21:10:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... -39_yrD0wMn2QC6YNc: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/SEJkba2KTqx0lEPethz8PwJXuvn0JRP-pji_6cs7imE/3376500311", "token": "vumoNpqWuaKUMwbJ49PCyTLDe-39_yrD0wMn2QC6YNc", "keyAuthorization": "vumoNpqWuaKUMw
Feb  7 21:15:01 rc_service: service 6404:notify_rc restart_letsencrypt
Feb  7 21:15:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:15:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:20:01 rc_service: service 6582:notify_rc restart_letsencrypt
Feb  7 21:20:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... fFfsu-k/3376567739: bad response
Feb  7 21:20:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... eevDhYtmmBFbIUTDD4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/H46dOXkaBwX_Epyoqik2AgHgb70uUAsI-uhVfFfsu-k/3376567739", "token": "GXiHbfSCB-C1t5qhVTeY7jabDeevDhYtmmBFbIUTDD4", "keyAuthorization": "GXiHbfSCB-C1t5
Feb  7 21:25:01 rc_service: service 6750:notify_rc restart_letsencrypt
Feb  7 21:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... HBnAhY0/3376602714: bad response
Feb  7 21:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... RgnODh6QEKEeDADeWY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/LB_v6C8NG7X9Foccpinhb6V1598K5fI5KlAlHBnAhY0/3376602714", "token": "jchSUI3-t7IxNRu1Oj-Ul8xTfRgnODh6QEKEeDADeWY", "keyAuthorization": "jchSUI3-t7IxNR
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:30:01 rc_service: service 6952:notify_rc restart_letsencrypt
Feb  7 21:30:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... Ga1-vYs/3376638209: bad response
Feb  7 21:30:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 6uqm5abBlAwNVn1nTQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/fKYDO7yQG7z7w7kFN_1GPS3nz3xzzh8KN5dpGa1-vYs/3376638209", "token": "ZfGlx8-NOXWy6F8fQFYlCAKrJ6uqm5abBlAwNVn1nTQ", "keyAuthorization": "ZfGlx8-NOXWy6F
Feb  7 21:35:01 rc_service: service 7156:notify_rc restart_letsencrypt
Feb  7 21:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... LNMOt5M/3376672847: bad response
Feb  7 21:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... tN-cI1mqzYStoVs3s0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/WBW1TXIcGGV4ctISYSoOofogY48oXCsmGy3ELNMOt5M/3376672847", "token": "WgSniVgEVPFtk0m1Zhs9EQfS3tN-cI1mqzYStoVs3s0", "keyAuthorization": "WgSniVgEVPFtk0
Feb  7 21:40:01 rc_service: service 7344:notify_rc restart_letsencrypt
Feb  7 21:40:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:40:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:45:01 rc_service: service 7525:notify_rc restart_letsencrypt
Feb  7 21:45:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:45:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:50:01 rc_service: service 7699:notify_rc restart_letsencrypt
Feb  7 21:50:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:50:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:55:01 rc_service: service 7879:notify_rc restart_letsencrypt
Feb  7 21:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 22:00:01 rc_service: service 8049:notify_rc restart_letsencrypt
Feb  7 22:00:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 22:00:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 22:05:01 rc_service: service 8221:notify_rc restart_letsencrypt
Feb  7 22:05:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 22:05:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 22:10:01 rc_service: service 8388:notify_rc restart_letsencrypt
Feb  7 22:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 22:10:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 22:15:01 rc_service: service 8556:notify_rc restart_letsencrypt
Feb  7 22:15:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... n4jORDU/3376947249: bad response
Feb  7 22:15:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... IwDsFOEx-qiop0Uo6k: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/0YJcZQU8EJfv1QvDqWn2TZk3Q_iweenFcCdSn4jORDU/3376947249", "token": "kzbD_kArREN1G-uC0MwadJuDMIwDsFOEx-qiop0Uo6k", "keyAuthorization": "kzbD_kArREN1G-
Feb  7 22:18:51 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  7 22:20:01 rc_service: service 8746:notify_rc restart_letsencrypt
Feb  7 22:20:44 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... otak5B8/3376979122: bad response
Feb  7 22:20:44 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... apVeAFMtSsc-ilOaMQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/_Y-13Ji7sLolSLutBpgs5SkzRo5UPhe2s93cotak5B8/3376979122", "token": "X_vm3oTtjj_ApcjVg5B3oBv0ZapVeAFMtSsc-ilOaMQ", "keyAuthorization": "X_vm3oTtjj_Apc
Feb  7 22:25:01 rc_service: service 8929:notify_rc restart_letsencrypt
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:27:06 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  7 22:58:01 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 23:03:28 disk_monitor: Got SIGALRM...
Feb  7 23:22:06 WAN Connection: Fail to connect with some issues.
Feb  7 23:22:06 DualWAN: skip single wan wan_led_control - WANRED off
Feb  7 23:22:07 nat: apply redirect rules
Feb  7 23:22:08 pppd[487]: Connection terminated.
Feb  7 23:22:08 pppd[487]: Modem hangup
Feb  7 23:22:18 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  7 23:22:18 pppd[487]: Connect: ppp0 <--> eth0
Feb  7 23:22:18 pppd[487]: PAP authentication succeeded
Feb  7 23:22:18 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  7 23:22:18 pppd[487]: local  IP address 36.103.150.104
Feb  7 23:22:18 pppd[487]: remote IP address 36.103.148.1
Feb  7 23:22:18 pppd[487]: primary   DNS address 118.118.118.11
Feb  7 23:22:18 pppd[487]: secondary DNS address 202.100.96.68
Feb  7 23:22:18 rc_service: ip-up 10431:notify_rc start_firewall
Feb  7 23:22:19 wan: finish adding multi routes
Feb  7 23:22:19 rc_service: ip-up 10431:notify_rc stop_upnp
Feb  7 23:22:19 rc_service: waitting "start_firewall" via ip-up ...
Feb  7 23:22:19 ntp: start NTP update
Feb  7 23:22:20 miniupnpd[1542]: shutting down MiniUPnPd
Feb  7 23:22:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 23:22:21 miniupnpd[10473]: version 1.9 started
Feb  7 23:22:21 rc_service: ip-up 10431:notify_rc start_upnp
Feb  7 23:22:21 rc_service: waitting "stop_upnp" via ip-up ...
Feb  7 23:22:22 WAN Connection: WAN was restored.
Feb  7 23:22:23 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 23:22:23 ddns update: ez-ipupdate: starting...
Feb  7 23:22:24 miniupnpd[10479]: version 1.9 started
Feb  7 23:22:24 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  7 23:22:24 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 15:22:22 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  7 23:22:24 ddns update: retval= 0, ddns_return_code (,200)
Feb  7 23:22:24 ddns update: asusddns_update: 0
Feb  7 23:22:24 miniupnpd[10479]: HTTP listening on port 56655
Feb  7 23:22:24 miniupnpd[10479]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 23:22:25 ddns: ddns update ok
Feb  7 23:22:40 rc_service: ip-up 10431:notify_rc start_firewall
Feb  7 23:22:40 miniupnpd[10479]: shutting down MiniUPnPd
Feb  7 23:22:40 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 23:22:40 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  7 23:22:41 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  7 23:22:41 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  7 23:22:41 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  7 23:22:41 miniupnpd[10581]: version 1.9 started
Feb  7 23:22:41 miniupnpd[10581]: HTTP listening on port 46090
Feb  7 23:22:41 miniupnpd[10581]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:30:54 pppd[487]: Connection terminated.
Feb  8 01:30:54 pppd[487]: Modem hangup
Feb  8 01:30:55 WAN Connection: Fail to connect with some issues.
Feb  8 01:30:55 DualWAN: skip single wan wan_led_control - WANRED off
Feb  8 01:30:55 nat: apply redirect rules
Feb  8 01:31:04 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  8 01:31:04 pppd[487]: Connect: ppp0 <--> eth0
Feb  8 01:31:05 pppd[487]: PAP authentication succeeded
Feb  8 01:31:05 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  8 01:31:05 pppd[487]: local  IP address 222.75.136.117
Feb  8 01:31:05 pppd[487]: remote IP address 222.75.136.1
Feb  8 01:31:05 pppd[487]: primary   DNS address 118.118.118.11
Feb  8 01:31:05 pppd[487]: secondary DNS address 202.100.96.68
Feb  8 01:31:05 rc_service: ip-up 13992:notify_rc start_firewall
Feb  8 01:31:06 wan: finish adding multi routes
Feb  8 01:31:06 rc_service: ip-up 13992:notify_rc stop_upnp
Feb  8 01:31:06 rc_service: waitting "start_firewall" via ip-up ...
Feb  8 01:31:06 ntp: start NTP update
Feb  8 01:31:06 wan: finish adding multi routes
Feb  8 01:31:07 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 01:31:07 miniupnpd[14050]: version 1.9 started
Feb  8 01:31:08 rc_service: ip-up 13992:notify_rc start_upnp
Feb  8 01:31:08 rc_service: waitting "stop_upnp" via ip-up ...
Feb  8 01:31:08 miniupnpd[14050]: HTTP listening on port 33796
Feb  8 01:31:08 miniupnpd[14050]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 01:31:08 miniupnpd[14050]: shutting down MiniUPnPd
Feb  8 01:31:09 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 01:31:09 ddns update: ez-ipupdate: starting...
Feb  8 01:31:09 miniupnpd[14053]: version 1.9 started
Feb  8 01:31:09 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 01:31:11 WAN Connection: WAN was restored.
Feb  8 01:31:11 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 17:31:11 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 01:31:11 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 01:31:11 ddns update: asusddns_update: 0
Feb  8 01:31:12 ntp: start NTP update
Feb  8 01:31:12 ddns: ddns update ok
Feb  8 01:31:12 miniupnpd[14053]: HTTP listening on port 51743
Feb  8 01:31:12 miniupnpd[14053]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 01:31:25 rc_service: ip-up 13992:notify_rc start_firewall
Feb  8 01:31:26 miniupnpd[14053]: shutting down MiniUPnPd
Feb  8 01:31:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 01:31:26 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  8 01:31:26 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  8 01:31:26 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  8 01:31:26 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  8 01:31:27 miniupnpd[14166]: version 1.9 started
Feb  8 01:31:27 miniupnpd[14166]: HTTP listening on port 47802
Feb  8 01:31:27 miniupnpd[14166]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:15:06 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  8 05:25:17 WAN Connection: Fail to connect with some issues.
Feb  8 05:25:17 pppd[487]: Connection terminated.
Feb  8 05:25:17 DualWAN: skip single wan wan_led_control - WANRED off
Feb  8 05:25:17 pppd[487]: Modem hangup
Feb  8 05:25:18 nat: apply redirect rules
Feb  8 05:25:28 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  8 05:25:28 pppd[487]: Connect: ppp0 <--> eth0
Feb  8 05:25:28 pppd[487]: PAP authentication succeeded
Feb  8 05:25:28 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  8 05:25:28 pppd[487]: local  IP address 222.75.138.149
Feb  8 05:25:28 pppd[487]: remote IP address 222.75.136.1
Feb  8 05:25:28 pppd[487]: primary   DNS address 118.118.118.11
Feb  8 05:25:28 pppd[487]: secondary DNS address 202.100.96.68
Feb  8 05:25:28 rc_service: ip-up 19961:notify_rc start_firewall
Feb  8 05:25:29 wan: finish adding multi routes
Feb  8 05:25:29 rc_service: ip-up 19961:notify_rc stop_upnp
Feb  8 05:25:29 rc_service: waitting "start_firewall" via ip-up ...
Feb  8 05:25:29 ntp: start NTP update
Feb  8 05:25:30 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 05:25:30 miniupnpd[20002]: version 1.9 started
Feb  8 05:25:31 rc_service: ip-up 19961:notify_rc start_upnp
Feb  8 05:25:31 rc_service: waitting "stop_upnp" via ip-up ...
Feb  8 05:25:33 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 05:25:33 WAN Connection: WAN was restored.
Feb  8 05:25:33 ddns update: ez-ipupdate: starting...
Feb  8 05:25:33 miniupnpd[20008]: version 1.9 started
Feb  8 05:25:33 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 05:25:33 miniupnpd[20008]: HTTP listening on port 44435
Feb  8 05:25:33 miniupnpd[20008]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 05:25:34 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 21:25:33 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 05:25:34 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 05:25:34 ddns update: asusddns_update: 0
Feb  8 05:25:35 ddns: ddns update ok
Feb  8 05:25:49 rc_service: ip-up 19961:notify_rc start_firewall
Feb  8 05:25:50 miniupnpd[20008]: shutting down MiniUPnPd
Feb  8 05:25:50 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 05:25:50 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  8 05:25:50 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  8 05:25:50 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  8 05:25:50 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  8 05:25:50 miniupnpd[20114]: version 1.9 started
Feb  8 05:25:51 miniupnpd[20114]: HTTP listening on port 49710
Feb  8 05:25:51 miniupnpd[20114]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:49:16 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 12:05:56 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb 14 08:00:16 syslogd started: BusyBox v1.17.4
Feb 14 08:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:16 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:16 kernel: Machine: Northstar Prototype
Feb 14 08:00:16 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 08:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:16 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:16 kernel: Virtual kernel memory layout:
Feb 14 08:00:16 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:16 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:16 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:16 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:16 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:16 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 08:00:16 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:16 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:16 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:16 kernel: * Invalid signature of oopsbuf: ED-45-A1-28-4B-C0-F1-B8 (len 2967688019)
Feb 14 08:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:16 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:16 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:  128MB
Feb 14 08:00:16 kernel: Block size:  128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:  16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 nat: apply redirect rules
Feb 14 08:00:17 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:17 kernel: pflash: found no supported devices
Feb 14 08:00:17 kernel: bcmsflash: found no supported devices
Feb 14 08:00:17 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:17 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:17 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:17 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:17 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:17 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:17 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:18 kernel: Register interface [wl1.1]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:20 dnsmasq[360]: warning: no upstream servers configured
Feb 14 08:00:20 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:20 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:21 lldpd[403]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:21 lldpd[403]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:22 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:23 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:23 AAE: AAE Service is started
Feb 14 08:00:23 disk monitor: be idle
Feb 14 08:00:23 jffs2: valid logs(1)
Feb 14 08:00:23 hour monitor: daemon is starting
Feb 14 08:00:23 miniupnpd[447]: version 1.9 started
Feb 14 08:00:23 miniupnpd[447]: HTTP listening on port 44203
Feb 14 08:00:23 miniupnpd[447]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:23 Mastiff: init
Feb 14 08:00:24 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb 14 08:00:24 pppd[494]: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:24 pppd[494]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:24 pppd[494]: Connect: ppp0 <--> eth0
Feb 14 08:00:29 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:29 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:29 kernel: SCSI subsystem initialized
Feb 14 08:00:31 pppd[494]: PAP authentication succeeded
Feb 14 08:00:31 pppd[494]: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:32 pppd[494]: local  IP address 14.135.47.158
Feb 14 08:00:32 pppd[494]: remote IP address 14.135.44.1
Feb 14 08:00:32 pppd[494]: primary   DNS address 118.118.118.11
Feb 14 08:00:32 pppd[494]: secondary DNS address 202.100.96.68
Feb 14 08:00:32 rc_service: ip-up 599:notify_rc start_firewall
Feb 14 08:00:33 miniupnpd[447]: shutting down MiniUPnPd
Feb 14 08:00:33 wan: finish adding multi routes
Feb 14 08:00:33 rc_service: ip-up 599:notify_rc stop_upnp
Feb 14 08:00:33 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:34 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:34 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:34 miniupnpd[673]: version 1.9 started
Feb 14 08:00:34 miniupnpd[673]: HTTP listening on port 59552
Feb 14 08:00:34 miniupnpd[673]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:35 rc_service: ip-up 599:notify_rc start_upnp
Feb 14 08:00:35 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:35 miniupnpd[673]: shutting down MiniUPnPd
Feb 14 08:00:36 miniupnpd[676]: version 1.9 started
Feb 14 08:00:36 miniupnpd[676]: HTTP listening on port 34339
Feb 14 08:00:36 miniupnpd[676]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:36 rc_service: zcip 674:notify_rc start_firewall
Feb 14 08:00:36 zcip client: configured 169.254.72.55
Feb 14 08:00:37 miniupnpd[676]: shutting down MiniUPnPd
Feb 14 08:00:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:37 WAN Connection: WAN was restored.
Feb 14 08:00:38 miniupnpd[700]: version 1.9 started
Feb 14 08:00:38 miniupnpd[700]: HTTP listening on port 42534
Feb 14 08:00:38 miniupnpd[700]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:39 ntp: start NTP update
Feb  8 12:11:45 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 12:11:45 rc_service: ntp 634:notify_rc restart_upnp
Feb  8 12:11:45 miniupnpd[700]: shutting down MiniUPnPd
Feb  8 12:11:46 rc_service: ntp 634:notify_rc restart_diskmon
Feb  8 12:11:46 disk_monitor: Finish
Feb  8 12:11:46 miniupnpd[709]: version 1.9 started
Feb  8 12:11:46 miniupnpd[709]: HTTP listening on port 36592
Feb  8 12:11:46 miniupnpd[709]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 12:11:46 ddns update: ez-ipupdate: starting...
Feb  8 12:11:47 disk monitor: be idle
Feb  8 12:11:49 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 12:11:50 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  8 12:11:50 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 04:11:49 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 12:11:50 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 12:11:50 ddns update: asusddns_update: 0
Feb  8 12:11:50 ddns: ddns update ok
Feb  8 12:11:56 watchdog: start ddns.
Feb  8 12:11:56 rc_service: watchdog 385:notify_rc restart_ddns
Feb  8 12:11:56 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 12:11:57 ddns update: ez-ipupdate: starting...
Feb  8 12:11:57 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 12:11:57 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 04:11:56 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 12:11:57 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 12:11:57 ddns update: asusddns_update: 0
Feb  8 12:11:58 ddns: ddns update ok
Feb  8 12:11:59 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  8 12:11:59 kernel: UDB Core Version: 0.2.14 r3529123
Feb  8 12:12:00 kernel: sizeof forward pkt param = 192
Feb  8 12:12:05 rc_service: ip-up 599:notify_rc start_firewall
Feb  8 12:12:05 miniupnpd[709]: shutting down MiniUPnPd
Feb  8 12:12:05 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 12:12:05 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  8 12:12:05 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  8 12:12:06 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  8 12:12:06 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  8 12:12:06 miniupnpd[927]: version 1.9 started
Feb  8 12:12:06 miniupnpd[927]: HTTP listening on port 48445
Feb  8 12:12:06 miniupnpd[927]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 12:12:07 crond[367]: time disparity of 517211 minutes detected
Feb  8 12:13:28 hour monitor: ntp sync fail, will retry after 120 sec
Feb  8 12:15:01 rc_service: service 1274:notify_rc restart_letsencrypt
Feb  8 12:15:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... wHYEmJI/3383577670: bad response
Feb  8 12:15:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... NjCAX38P5FfuvZkc7M: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/OO44Vb-2J7fKMtjXV5BujFR3IkWDyGPGCwqQwHYEmJI/3383577670", "token": "X89Yhgh7l4WrRfj8D8Rc8R7NXNjCAX38P5FfuvZkc7M", "keyAuthorization": "X89Yhgh7l4WrRf
Feb  8 12:16:35 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  8 12:20:01 rc_service: service 1493:notify_rc restart_letsencrypt
Feb  8 12:20:46 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... Z9d57DE/3383612929: bad response
Feb  8 12:20:46 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... TYQbB1HROrKm742OnU: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/kyNTsCQepj-Jj6Zx-XA2mjqBVGyf49PyNY4pZ9d57DE/3383612929", "token": "cHrgk8lrt3LDqQGyb50G-MXHgTYQbB1HROrKm742OnU", "keyAuthorization": "cHrgk8lrt3LDqQ
Feb  8 12:25:01 rc_service: service 1676:notify_rc restart_letsencrypt
Feb  8 12:25:43 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... ArdTsnk/3383649057: bad response
Feb  8 12:25:43 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... NGPpfoKv12WdM_xRnM: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/XUC7hyGZmBVdAq_7IgTRCEm07dooqsD3OsX5ArdTsnk/3383649057", "token": "SGiLa8WGGRqgVCPSeAO9pf7z8NGPpfoKv12WdM_xRnM", "keyAuthorization": "SGiLa8WGGRqgVC
Feb  8 12:30:01 rc_service: service 1888:notify_rc restart_letsencrypt
Feb  8 12:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... is1xOGM/3383684402: bad response
Feb  8 12:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... QqBXg8dvXIJ5ohqSaY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/J7f73FC_ZdwK8z23WQQ54FJKQ9Qe_9923HCZis1xOGM/3383684402", "token": "gJyzUhDEjwchdVbmUi5r7nKGXQqBXg8dvXIJ5ohqSaY", "keyAuthorization": "gJyzUhDEjwchdV
Feb  8 12:35:01 rc_service: service 2070:notify_rc restart_letsencrypt
Feb  8 12:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... L9XkODo/3383720390: bad response
Feb  8 12:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... w4U89eiK5ttp_zxbfg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/8OE9ZRIQSk9gHCeV4XHfB1WvcgtnOtwY6YIsL9XkODo/3383720390", "token": "w2wu9M4qcrLm816G1NpE6uDnew4U89eiK5ttp_zxbfg", "keyAuthorization": "w2wu9M4qcrLm81
Feb  8 12:40:01 rc_service: service 2250:notify_rc restart_letsencrypt
Feb  8 12:40:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 12:40:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 12:45:01 rc_service: service 2416:notify_rc restart_letsencrypt
Feb  8 12:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 12:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 12:50:01 rc_service: service 2586:notify_rc restart_letsencrypt
Feb  8 12:50:23 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 12:50:23 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 12:55:01 rc_service: service 2760:notify_rc restart_letsencrypt
Feb  8 12:55:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 12:55:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:00:01 rc_service: service 2949:notify_rc restart_letsencrypt
Feb  8 13:00:28 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:00:28 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:00:47 disk_monitor: Got SIGALRM...
Feb  8 13:05:01 rc_service: service 3136:notify_rc restart_letsencrypt
Feb  8 13:05:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:05:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:10:01 rc_service: service 3318:notify_rc restart_letsencrypt
Feb  8 13:10:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:15:01 rc_service: service 3499:notify_rc restart_letsencrypt
Feb  8 13:15:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:15:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:20:01 rc_service: service 3665:notify_rc restart_letsencrypt
Feb  8 13:20:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... AgYNbyI/3384071976: bad response
Feb  8 13:20:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... TRmViHQIUKylkwr58s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/OzkwOpnbd4QLa15eEGwvL8qQh-mwGs9Zo5Y9AgYNbyI/3384071976", "token": "KuJUuEXJC-DinxDYqSpraC_l_TRmViHQIUKylkwr58s", "keyAuthorization": "KuJUuEXJC-Dinx
Feb  8 13:25:01 rc_service: service 3874:notify_rc restart_letsencrypt
Feb  8 13:25:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... FTpxy3s/3384109591: bad response
Feb  8 13:25:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... OjSarNEfcotgTejHN0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/PB78BDPisYAGo0TSq69auD89fx7LcKQqXC59FTpxy3s/3384109591", "token": "T5_Bcz7MxvyFGRQYQmbvvcH0qOjSarNEfcotgTejHN0", "keyAuthorization": "T5_Bcz7MxvyFGR
Feb  8 13:30:01 rc_service: service 4061:notify_rc restart_letsencrypt
Feb  8 13:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... yjkHmYk/3384150409: bad response
Feb  8 13:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... KsHm_fJjP5q96axkVQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/JHfiBfiDC9tbCirV_MP8HpVanKpxFgrFKKSbyjkHmYk/3384150409", "token": "9w-OWYMk0xTvH3RjWwrDFKaK-KsHm_fJjP5q96axkVQ", "keyAuthorization": "9w-OWYMk0xTvH3
Feb  8 13:35:01 rc_service: service 4229:notify_rc restart_letsencrypt
Feb  8 13:35:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... wD30k-4/3384185149: bad response
Feb  8 13:35:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 6CptjbdiSExJ6jzxro: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/cvyLtS_4zj_GDbIOv4h8g17bSBkA6dIMYMj_wD30k-4/3384185149", "token": "2TKeOTZdPjyv4fO0GYvX89bY_6CptjbdiSExJ6jzxro", "keyAuthorization": "2TKeOTZdPjyv4f
Feb  8 13:40:01 rc_service: service 4398:notify_rc restart_letsencrypt
Feb  8 13:40:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... Im1MM8k/3384218650: bad response
Feb  8 13:40:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... n7ahawItEaleabUVVk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/h_misnPPv6AeKkyLgX2HcrW3-c2mp87P-cejIm1MM8k/3384218650", "token": "QyGrRhMZQmjY1jfXyn8R6JYUin7ahawItEaleabUVVk", "keyAuthorization": "QyGrRhMZQmjY1j
Feb  8 13:45:01 rc_service: service 4565:notify_rc restart_letsencrypt
Feb  8 13:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:50:01 rc_service: service 4771:notify_rc restart_letsencrypt
Feb  8 13:50:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:50:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:55:01 rc_service: service 4938:notify_rc restart_letsencrypt
Feb  8 13:55:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:55:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:00:01 rc_service: service 5148:notify_rc restart_letsencrypt
Feb  8 14:00:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:00:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:05:01 rc_service: service 5344:notify_rc restart_letsencrypt
Feb  8 14:05:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:05:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:10:01 rc_service: service 5521:notify_rc restart_letsencrypt
Feb  8 14:10:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:15:01 rc_service: service 5712:notify_rc restart_letsencrypt
Feb  8 14:15:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:15:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:20:01 rc_service: service 5888:notify_rc restart_letsencrypt
Feb  8 14:20:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... _o8oLUI/3384500451: bad response
Feb  8 14:20:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... _DnNDxqsX8psUC66HY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ycSeAgKWC7ZF9XOc3_kfr_Yr8HK2moalNYes_o8oLUI/3384500451", "token": "dp5-M1Vob6pZXkCoqC0nwYF82_DnNDxqsX8psUC66HY", "keyAuthorization": "dp5-M1Vob6pZXk
Feb  8 14:25:01 rc_service: service 6066:notify_rc restart_letsencrypt
Feb  8 14:25:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... D7jL3x0/3384533049: bad response
Feb  8 14:25:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... ZjQRngudND8bayf3RY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/xrINmHwr5FIgkvSD4e8pkwbUfWSrw6dpPAwjD7jL3x0/3384533049", "token": "DnkZp4UdkPlZd1eS3TNYExOORZjQRngudND8bayf3RY", "keyAuthorization": "DnkZp4UdkPlZd1
Feb  8 14:30:01 rc_service: service 6250:notify_rc restart_letsencrypt
Feb  8 14:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:35:01 rc_service: service 6417:notify_rc restart_letsencrypt
Feb  8 14:35:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... wyCAKJw/3384600291: bad response
Feb  8 14:35:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... MGAZ4YLFqyDJbc23RI: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/XNEL5NgGMDraxVq1EpfVu7zOPFMpoDSd9bhnwyCAKJw/3384600291", "token": "4BfTLjBk_xie21Aoe1kSzApp4MGAZ4YLFqyDJbc23RI", "keyAuthorization": "4BfTLjBk_xie21
Feb  8 14:40:01 rc_service: service 6585:notify_rc restart_letsencrypt
Feb  8 14:40:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... rfad_hs/3384632001: bad response
Feb  8 14:40:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... tqapuXa4z0NJmlFWXE: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/_HLfSx5GeeNMqnk0rml7bEMJPcAf7MiFxI_Vrfad_hs/3384632001", "token": "pCJwq0_v48ymEIC3ZCZc0pCwUtqapuXa4z0NJmlFWXE", "keyAuthorization": "pCJwq0_v48ymEI
Feb  8 14:45:01 rc_service: service 6770:notify_rc restart_letsencrypt
Feb  8 14:45:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 7TRYiWs/3384664577: bad response
Feb  8 14:45:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... Wbatp8uKTBkcDMQ3v0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/3E68s5jU1A0wKGjNqF-0FQH4aGQ4gqHtPBTb7TRYiWs/3384664577", "token": "AyvPk_zyMYrHQtz9Mex6C1afrWbatp8uKTBkcDMQ3v0", "keyAuthorization": "AyvPk_zyMYrHQt
Feb  8 14:50:01 rc_service: service 6940:notify_rc restart_letsencrypt
Feb  8 14:50:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:50:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:55:01 rc_service: service 7113:notify_rc restart_letsencrypt
Feb  8 14:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:00:01 rc_service: service 7307:notify_rc restart_letsencrypt
Feb  8 15:00:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:00:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:05:01 rc_service: service 7501:notify_rc restart_letsencrypt
Feb  8 15:05:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:05:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:10:01 rc_service: service 7693:notify_rc restart_letsencrypt
Feb  8 15:10:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:10:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:15:01 rc_service: service 7894:notify_rc restart_letsencrypt
Feb  8 15:15:23 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:15:23 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:20:01 rc_service: service 8062:notify_rc restart_letsencrypt
Feb  8 15:20:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... zf6af6E/3384911090: bad response
Feb  8 15:20:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 4tlULvLn-t8CGFUK8s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ga3tbEnenmZ4ryVrr4qWvSiaTb4tNReRNcWXzf6af6E/3384911090", "token": "mVsadjvKcEgRqhlcuUB85ur054tlULvLn-t8CGFUK8s", "keyAuthorization": "mVsadjvKcEgRqh
Feb  8 15:25:01 rc_service: service 8230:notify_rc restart_letsencrypt
Feb  8 15:25:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:25:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:30:01 rc_service: service 8434:notify_rc restart_letsencrypt
Feb  8 15:30:44 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... -2yPV0E/3384978743: bad response
Feb  8 15:30:44 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... tHsyq9NTRyc-2RzwJA: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ipTnKhGoI_2Ew_pcj7qv6Djzi5R_tpp8B5tO-2yPV0E/3384978743", "token": "7hd0Uhff2crd5i9IZZXeDvNQ0tHsyq9NTRyc-2RzwJA", "keyAuthorization": "7hd0Uhff2crd5i
Feb  8 15:35:01 rc_service: service 8602:notify_rc restart_letsencrypt
Feb  8 15:35:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:35:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:40:01 rc_service: service 8769:notify_rc restart_letsencrypt
Feb  8 15:40:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... oDfa3mQ/3385040555: bad response
Feb  8 15:40:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... yuSLuoy1WerEqxMjM4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/mzAxq5cvTkrrWAiUKDMYZvRGMTB7xIEJpV9NoDfa3mQ/3385040555", "token": "Oq5W81hnIeUdl_5lzlOqoTsZhyuSLuoy1WerEqxMjM4", "keyAuthorization": "Oq5W81hnIeUdl_
Feb  8 15:45:01 rc_service: service 8956:notify_rc restart_letsencrypt
Feb  8 15:45:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 7Td4o3M/3385071899: bad response
Feb  8 15:45:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... umoVlAcZU3dNs1HKDA: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/mSj5vcLtElIuyp9sqmff-ZR9F2R6slsNmFMZ7Td4o3M/3385071899", "token": "1ExjRHZGHbHmySgVUsp2HtK20umoVlAcZU3dNs1HKDA", "keyAuthorization": "1ExjRHZGHbHmyS
Feb  8 15:50:01 rc_service: service 9124:notify_rc restart_letsencrypt
Feb  8 15:50:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... jkuVOCE/3385105213: bad response
Feb  8 15:50:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... dqNpggze6Z8eQ-Wsbg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ywYd8GaxaepXGs3WP90_4BszkwN-3eInFG3PjkuVOCE/3385105213", "token": "FxBBuronfC9b9f7B1TvOopkTidqNpggze6Z8eQ-Wsbg", "keyAuthorization": "FxBBuronfC9b9f
Feb  8 15:55:01 rc_service: service 9292:notify_rc restart_letsencrypt
Feb  8 15:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:00:01 rc_service: service 9460:notify_rc restart_letsencrypt
Feb  8 16:00:24 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:00:24 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:05:01 rc_service: service 9642:notify_rc restart_letsencrypt
Feb  8 16:05:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:05:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:10:01 rc_service: service 9809:notify_rc restart_letsencrypt
Feb  8 16:10:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:10:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:15:01 rc_service: service 9980:notify_rc restart_letsencrypt
Feb  8 16:15:26 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:15:26 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:20:01 rc_service: service 10146:notify_rc restart_letsencrypt
Feb  8 16:20:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... Tpf4Q4k/3385317740: bad response
Feb  8 16:20:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... r3AozwaI47kEXZG_n0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/c-b-x0Y8EosGCYKyhg3ny4eaT24Tm7TFHsARTpf4Q4k/3385317740", "token": "lnizwvKdUurola9u97nPm4NVRr3AozwaI47kEXZG_n0", "keyAuthorization": "lnizwvKdUurola
Feb  8 16:23:10 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  8 16:25:01 rc_service: service 10322:notify_rc restart_letsencrypt
Feb  8 16:25:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:25:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:30:01 rc_service: service 10520:notify_rc restart_letsencrypt
Feb  8 16:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:35:01 rc_service: service 10705:notify_rc restart_letsencrypt
Feb  8 16:35:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... rQ6_O7k/3385414914: bad response
Feb  8 16:35:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... oL57f6yetm81imlZHc: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/nLXpjgoH6LTay-u2-OWajRhdTQOe_-vOxAkWrQ6_O7k/3385414914", "token": "Kpuf5rnq5MZw37Hb7RSGl6ZlPoL57f6yetm81imlZHc", "keyAuthorization": "Kpuf5rnq5MZw37
Feb  8 16:40:01 rc_service: service 10892:notify_rc restart_letsencrypt
Feb  8 16:40:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... UxzFWtQ/3385446715: bad response
Feb  8 16:40:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 6temxlAzp6r1vjbbxk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/2FTfSFGQCfl_THk8_vknbnw_ClylApfg0khwUxzFWtQ/3385446715", "token": "qvQHW6rEXwE54nPnOMnrG0IT16temxlAzp6r1vjbbxk", "keyAuthorization": "qvQHW6rEXwE54n
Feb  8 16:45:01 rc_service: service 11084:notify_rc restart_letsencrypt
Feb  8 16:45:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... RQvcj6I/3385479483: bad response
Feb  8 16:45:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... vKczlGkDoxK_Ho-Sj0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/vAjkPuH3NTrbMHHD8UKvhOEFmExvvLGigshJRQvcj6I/3385479483", "token": "zn6rZ7UDgaZ2DQNUgPbpT5WI1vKczlGkDoxK_Ho-Sj0", "keyAuthorization": "zn6rZ7UDgaZ2DQ
Feb  8 16:46:20 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  8 16:50:01 rc_service: service 11271:notify_rc restart_letsencrypt
Feb  8 16:50:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... qE5kxyE/3385511430: bad response
Feb  8 16:50:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... Inl9V7SRdWoD75-Xa4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/jt89gw563ar5VMDoK7QZV5FkyDLxTvHzpTAxqE5kxyE/3385511430", "token": "18W6rb5rnkbVhDQ4WtrxulMLWInl9V7SRdWoD75-Xa4", "keyAuthorization": "18W6rb5rnkbVhD
Feb  8 16:55:01 rc_service: service 11438:notify_rc restart_letsencrypt
Feb  8 16:55:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:55:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:00:01 rc_service: service 11647:notify_rc restart_letsencrypt
Feb  8 17:00:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:00:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:05:01 rc_service: service 11850:notify_rc restart_letsencrypt
Feb  8 17:05:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:05:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:10:01 rc_service: service 12035:notify_rc restart_letsencrypt
Feb  8 17:10:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:10:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:15:01 rc_service: service 12216:notify_rc restart_letsencrypt
Feb  8 17:15:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:15:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:20:01 rc_service: service 12395:notify_rc restart_letsencrypt
Feb  8 17:20:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:20:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:25:01 rc_service: service 12580:notify_rc restart_letsencrypt
Feb  8 17:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... ce_kImc/3385741748: bad response
Feb  8 17:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 2QMv9INpTHXE6Dv8bI: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/QZX03y264_Ig6Bnt0bWbnrqFYx5i8NEUZ1uCce_kImc/3385741748", "token": "LSnoMIyrax7QRHR427bWVqLYK2QMv9INpTHXE6Dv8bI", "keyAuthorization": "LSnoMIyrax7QRH
Feb  8 17:30:01 rc_service: service 12756:notify_rc restart_letsencrypt
Feb  8 17:30:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:30:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:35:01 rc_service: service 12944:notify_rc restart_letsencrypt
Feb  8 17:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 0SBnPfY/3385803748: bad response
Feb  8 17:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... Qo7UZR3nTZsaRn5hio: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ZKW5PFaDa4fL2jKfGTDIN18uZqIT_XjxXSrJ0SBnPfY/3385803748", "token": "1lGwkM-EL8awiD31o0K6ZIwcqQo7UZR3nTZsaRn5hio", "keyAuthorization": "1lGwkM-EL8awiD
Feb  8 17:40:01 rc_service: service 13134:notify_rc restart_letsencrypt
Feb  8 17:40:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:40:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:45:01 rc_service: service 13301:notify_rc restart_letsencrypt
Feb  8 17:45:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... lK0t8JM/3385869175: bad response
Feb  8 17:45:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... CK3l5y7z-DWCPZZVg8: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/H4xujkY-MjzzBHvqSGghqn4OiAVlDB6xAZOPlK0t8JM/3385869175", "token": "mUTYzD6wrSkfx1nrgtcltghq1CK3l5y7z-DWCPZZVg8", "keyAuthorization": "mUTYzD6wrSkfx1
Feb  8 17:50:01 rc_service: service 13489:notify_rc restart_letsencrypt
Feb  8 17:50:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... kppocSY/3385903226: bad response
Feb  8 17:50:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... yhh6rezIN318KLk-7A: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/KRKA4AtJTvr0tT1JVnmc1KhxnyIM29Or7ERUkppocSY/3385903226", "token": "pxG3bNWzVLFNDlDqRF-naws5tyhh6rezIN318KLk-7A", "keyAuthorization": "pxG3bNWzVLFNDl
Feb  8 17:55:01 rc_service: service 13657:notify_rc restart_letsencrypt
Feb  8 17:55:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... _kZcLfo/3385937381: bad response
Feb  8 17:55:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 9JGDKJfHbRc_zLjfeY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/7-6zo4WpDhpxYJq1wpiA3YS57GOWb20cMY-q_kZcLfo/3385937381", "token": "U8L4ZbJJFTxNE90a1gzZVIfwv9JGDKJfHbRc_zLjfeY", "keyAuthorization": "U8L4ZbJJFTxNE9
Feb  8 18:00:01 rc_service: service 13826:notify_rc restart_letsencrypt
Feb  8 18:00:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:00:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:05:01 rc_service: service 14009:notify_rc restart_letsencrypt
Feb  8 18:05:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:05:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:10:01 rc_service: service 14183:notify_rc restart_letsencrypt
Feb  8 18:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:10:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:15:01 rc_service: service 14356:notify_rc restart_letsencrypt
Feb  8 18:15:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:15:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:20:01 rc_service: service 14578:notify_rc restart_letsencrypt
Feb  8 18:20:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:20:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:25:01 rc_service: service 14747:notify_rc restart_letsencrypt
Feb  8 18:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... CqTXSXU/3386138192: bad response
Feb  8 18:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... e5E63I6Gm7XVMgGGtU: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/F1WWtPm7f9bP4aEBvJ0sqCUiwVyNjXxbkhk7CqTXSXU/3386138192", "token": "4QfdVWHn3FwsC5hC6j8O1PP5Ee5E63I6Gm7XVMgGGtU", "keyAuthorization": "4QfdVWHn3FwsC5
Feb  8 18:30:01 rc_service: service 14926:notify_rc restart_letsencrypt
Feb  8 18:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:35:01 rc_service: service 15102:notify_rc restart_letsencrypt
Feb  8 18:35:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:35:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:40:01 rc_service: service 15289:notify_rc restart_letsencrypt
Feb  8 18:40:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... E96S2pY/3386232266: bad response
Feb  8 18:40:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... a5fIJRv6AGzJsh5Tfs: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5aljgoqi-hfcIuYhtqRAXfuq5jK7VNA5RkVDE96S2pY/3386232266", "token": "-vgKyVzyDjXkMpfap-NOUOlqLa5fIJRv6AGzJsh5Tfs", "keyAuthorization": "-vgKyVzyDjXkMp
Feb  8 18:45:01 rc_service: service 15476:notify_rc restart_letsencrypt
Feb  8 18:45:41 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... GYMfWIU/3386264278: bad response
Feb  8 18:45:41 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... l11dIlGf9KQCdWxFnk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/urBMb2MvrxuXipL-Cl0E1rYU6V9l-BdelBLgGYMfWIU/3386264278", "token": "mD0mBmTtdCxUxJlKJKEwBOkqkl11dIlGf9KQCdWxFnk", "keyAuthorization": "mD0mBmTtdCxUxJ
Feb  8 18:50:01 rc_service: service 15651:notify_rc restart_letsencrypt
Feb  8 18:50:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... V5rP2Aw/3386295384: bad response
Feb  8 18:50:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... fxs95cNjkntxp9-cnk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ycLXABEIXOSp0Ynjzo44l63ob-z5YK5tj741V5rP2Aw/3386295384", "token": "GHjF-BVldeXIlHMXoGD1Zf9ulfxs95cNjkntxp9-cnk", "keyAuthorization": "GHjF-BVldeXIlH
Feb  8 18:55:01 rc_service: service 15846:notify_rc restart_letsencrypt
Feb  8 18:55:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... w7zz5-E/3386325652: bad response
Feb  8 18:55:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 1LweDDnSc7TElHmODY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/J99bdDjrfZVsZzVTgqqpvRjgHXPnhxGY5fqhw7zz5-E/3386325652", "token": "GBOQj_Mv4rZgDg8R_7fHjv-T71LweDDnSc7TElHmODY", "keyAuthorization": "GBOQj_Mv4rZgDg
Feb  8 19:00:01 rc_service: service 16020:notify_rc restart_letsencrypt
Feb  8 19:00:27 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 19:00:27 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 19:03:40 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  8 19:05:01 rc_service: service 16215:notify_rc restart_letsencrypt
Feb  8 19:05:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 19:05:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 19:08:18 rc_service: httpd 381:notify_rc restart_wan_if 0
Feb  8 19:08:18 pppd[494]: Connection terminated.
Feb  8 19:08:21 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb  8 19:08:21 pppd[16410]: pppd 2.4.7 started by adminyyg, uid 0
Feb  8 19:08:21 pppd[16410]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  8 19:08:21 pppd[16410]: Connect: ppp0 <--> eth0
Feb  8 19:08:21 pppd[16410]: PAP authentication succeeded
Feb  8 19:08:21 pppd[16410]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  8 19:08:22 pppd[16410]: local  IP address 222.75.230.51
Feb  8 19:08:22 pppd[16410]: remote IP address 222.75.228.1
Feb  8 19:08:22 pppd[16410]: primary   DNS address 118.118.118.11
Feb  8 19:08:22 pppd[16410]: secondary DNS address 202.100.96.68
Feb  8 19:08:22 rc_service: ip-up 16415:notify_rc start_firewall
Feb  8 19:08:22 miniupnpd[927]: shutting down MiniUPnPd
Feb  8 19:08:22 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 19:08:22 wan: finish adding multi routes
Feb  8 19:08:22 rc_service: ip-up 16415:notify_rc stop_upnp
Feb  8 19:08:22 rc_service: waitting "start_firewall" via ip-up ...
Feb  8 19:08:22 ntp: start NTP update
Feb  8 19:08:23 miniupnpd[16453]: version 1.9 started
Feb  8 19:08:23 miniupnpd[16453]: HTTP listening on port 41115
Feb  8 19:08:23 miniupnpd[16453]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 19:08:23 rc_service: ip-up 16415:notify_rc start_upnp
Feb  8 19:08:23 rc_service: waitting "stop_upnp" via ip-up ...
Feb  8 19:08:23 miniupnpd[16453]: shutting down MiniUPnPd
Feb  8 19:08:24 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 19:08:24 miniupnpd[16457]: version 1.9 started
Feb  8 19:08:25 ddns update: ez-ipupdate: starting...
Feb  8 19:08:25 miniupnpd[16457]: HTTP listening on port 52833
Feb  8 19:08:25 miniupnpd[16457]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 19:08:25 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 19:08:25 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 11:08:24 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 19:08:25 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 19:08:25 ddns update: asusddns_update: 0
Feb  8 19:08:26 ddns: ddns update ok
Feb  8 19:08:32 rc_service: zcip 16474:notify_rc start_firewall
Feb  8 19:08:32 zcip client: configured 169.254.72.55
Feb  8 19:08:33 miniupnpd[16457]: shutting down MiniUPnPd
Feb  8 19:08:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 19:08:33 miniupnpd[16496]: version 1.9 started
Feb  8 19:08:34 miniupnpd[16496]: HTTP listening on port 45410
Feb  8 19:08:34 miniupnpd[16496]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 19:08:41 rc_service: ip-up 16415:notify_rc start_firewall
Feb  8 19:08:41 miniupnpd[16496]: shutting down MiniUPnPd
Feb  8 19:08:41 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 19:08:42 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  8 19:08:42 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  8 19:08:42 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  8 19:08:42 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  8 19:08:42 miniupnpd[16580]: version 1.9 started
Feb  8 19:08:42 miniupnpd[16580]: HTTP listening on port 39265
Feb  8 19:08:42 miniupnpd[16580]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 19:10:02 rc_service: service 16637:notify_rc restart_letsencrypt
Feb  8 19:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 19:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb 14 00:00:25 syslogd started: BusyBox v1.17.4
Feb 14 00:00:25 kernel: klogd started: BusyBox v1.17.4 (2018-01-25 20:31:57 CST)
Feb 14 00:00:25 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Jan 25 20:41:22 CST 2018
Feb 14 00:00:25 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 00:00:25 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 00:00:25 kernel: Machine: Northstar Prototype
Feb 14 00:00:25 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 00:00:25 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 00:00:25 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 00:00:25 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 00:00:25 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 00:00:25 kernel: Virtual kernel memory layout:
Feb 14 00:00:25 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 00:00:25 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 00:00:25 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 00:00:25 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 00:00:25 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 00:00:25 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 00:00:25 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 00:00:25 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 00:00:25 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 00:00:25 kernel: * Invalid signature of oopsbuf: C5-41-00-28-40-40-40-00 (len 4210688)
Feb 14 00:00:25 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 00:00:25 kernel: Mount-cache hash table entries: 512
Feb 14 00:00:25 kernel: CPU1: Booted secondary processor
Feb 14 00:00:25 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 00:00:25 kernel: Total size:  128MB
Feb 14 00:00:25 kernel: Block size:  128KB
Feb 14 00:00:25 kernel: Page Size:   2048B
Feb 14 00:00:25 kernel: OOB Size:    64B
Feb 14 00:00:25 kernel: Sector size: 512B
Feb 14 00:00:25 kernel: Spare size:  16B
Feb 14 00:00:25 kernel: ECC level:   8 (8-bit)
Feb 14 00:00:25 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 00:00:25 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 00:00:25 kernel: bio: create slab <bio-0> at 0
Feb 14 00:00:25 kernel: PCI: no core
Feb 14 00:00:25 kernel: PCI: no core
Feb 14 00:00:25 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 1
Feb 14 00:00:26 kernel: PCI: Fixing up bus 0
Feb 14 00:00:26 kernel: PCI: Fixing up bus 1
Feb 14 00:00:26 nat: apply redirect rules
Feb 14 00:00:26 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 00:00:26 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 00:00:26 kernel: pflash: found no supported devices
Feb 14 00:00:26 kernel: bcmsflash: found no supported devices
Feb 14 00:00:26 kernel: Boot partition size = 524288(0x80000)
Feb 14 00:00:26 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 00:00:26 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 00:00:26 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 00:00:26 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 00:00:26 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 00:00:26 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 00:00:26 kernel: 0x0000003bfe80-0x000004000000 : "rootfs"
Feb 14 00:00:26 kernel: === PPTP init ===
Feb 14 00:00:26 kernel: Registering the dns_resolver key type
Feb 14 00:00:26 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 00:00:26 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 00:00:26 kernel: Available 7 bytes at (off,len):
Feb 14 00:00:26 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 00:00:26 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 00:00:26 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 00:00:26 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 00:00:26 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 00:00:26 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 00:00:26 kernel: Disabling lock debugging due to kernel taint
Feb 14 00:00:26 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 00:00:26 kernel: rtk port_phyEnableAll ok
Feb 14 00:00:26 kernel: register rtl8365mb done (link down at first)
Feb 14 00:00:26 kernel: et_module_init: passivemode set to 0x0
Feb 14 00:00:26 kernel: et_module_init: txworkq set to 0x0
Feb 14 00:00:26 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 00:00:26 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 00:00:26 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 00:00:26 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 00:00:26 kernel: dpsta_init: msglevel set to 0x1
Feb 14 00:00:26 kernel: dpsta_init: fail to get ifnames!
Feb 14 00:00:26 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:26 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 00:00:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:80 started
Feb 14 00:00:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:26 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:26 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:26 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 00:00:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:84 started
Feb 14 00:00:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:26 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:26 dnsmasq[334]: warning: no upstream servers configured
Feb 14 00:00:26 kernel: reset usb phy..
Feb 14 00:00:26 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 00:00:26 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 00:00:26 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 00:00:27 RT-AC88U: start httpd
Feb 14 00:00:27 kernel: Empty flash at 0x005c0bb8 ends at 0x005c1000
Feb 14 00:00:27 kernel: jffs2_scan_eraseblock(): Node at 0x005d97f8 {0x1985, 0xe002, 0x00000044) has invalid CRC 0xffffffff (calculated 0x98f7fb1d)
Feb 14 00:00:27 kernel: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x005d97fc: 0x0044 instead
Feb 14 00:00:27 kernel: rtk port_phyEnableAll (on) ok
Feb 14 00:00:27 lldpd[374]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 00:00:27 lldpd[374]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 00:00:27 syslog: Generating SSL certificate...
Feb 14 00:00:29 NAT Tunnel: AAE Service is stopped
Feb 14 00:00:29 AAE: AAE Service is started
Feb 14 00:00:29 jffs2: valid logs(1)
Feb 14 00:00:29 hour monitor: daemon is starting
Feb 14 00:00:29 disk monitor: be idle
Feb 14 00:00:29 hour monitor: daemon terminates
Feb 14 00:00:30 miniupnpd[426]: version 1.9 started
Feb 14 00:00:30 miniupnpd[426]: HTTP listening on port 47027
Feb 14 00:00:30 miniupnpd[426]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:30 Mastiff: init
Feb 14 00:00:30 kernel: dhd_detach(): thread:dhd_watchdog_thread:84 terminated OK
Feb 14 00:00:30 kernel: dhd_detach(): thread:dhd_watchdog_thread:80 terminated OK
Feb 14 00:00:31 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:00:33 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:33 kernel: dhd_attach(): thread:dhd_watchdog_thread:206 started
Feb 14 00:00:34 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:34 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:34 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:34 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:34 kernel: dhd_attach(): thread:dhd_watchdog_thread:20a started
Feb 14 00:00:35 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:35 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:35 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:38 wan: [wan0_hwaddr] == [B0:6E:BFC:62:70]
Feb 14 00:00:38 wan: [deconfig] udhcpc done[286]
Feb 14 00:00:38 rc_service: udhcpc 601:notify_rc start_firewall
Feb 14 00:00:38 wan: finish adding multi routes
Feb 14 00:00:38 rc_service: udhcpc 601:notify_rc stop_upnp
Feb 14 00:00:38 rc_service: waitting "start_firewall" via udhcpc ...
Feb 14 00:00:40 WAN Connection: WAN was restored.
Feb 14 00:00:43 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 00:00:43 syslog: module leds-usb not found in modules.dep
Feb 14 00:00:43 kernel: SCSI subsystem initialized
Feb 14 00:00:44 miniupnpd[426]: shutting down MiniUPnPd
Feb 14 00:00:44 nat: apply redirect rules
Feb 14 00:00:51 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 00:00:51 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 00:00:51 miniupnpd[734]: version 1.9 started
Feb 14 00:00:51 miniupnpd[734]: HTTP listening on port 37435
Feb 14 00:00:51 miniupnpd[734]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:51 rc_service: udhcpc 601:notify_rc start_upnp
Feb 14 00:00:51 rc_service: waitting "stop_upnp" via udhcpc ...
Feb 14 00:00:51 miniupnpd[734]: shutting down MiniUPnPd
Feb 14 00:00:53 miniupnpd[736]: version 1.9 started
Feb 14 00:00:53 miniupnpd[736]: HTTP listening on port 49460
Feb 14 00:00:53 miniupnpd[736]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:58 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:03:04 roamast: eth1: add client [d0:ff:98:df:98:63] to monitor list
Feb 14 00:00:15 syslogd started: BusyBox v1.17.4
Feb 14 00:00:15 kernel: klogd started: BusyBox v1.17.4 (2018-01-25 20:31:57 CST)
Feb 14 00:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Thu Jan 25 20:41:22 CST 2018
Feb 14 00:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 00:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 00:00:15 kernel: Machine: Northstar Prototype
Feb 14 00:00:15 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 00:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 00:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 00:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 00:00:15 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 00:00:15 kernel: Virtual kernel memory layout:
Feb 14 00:00:15 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 00:00:15 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 00:00:15 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 00:00:15 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 00:00:15 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 00:00:15 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 00:00:15 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 00:00:15 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 00:00:15 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 00:00:15 kernel: * Invalid signature of oopsbuf: E1-45-A0-28-48-C0-D0-30 (len 283332946)
Feb 14 00:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 00:00:15 kernel: Mount-cache hash table entries: 512
Feb 14 00:00:16 kernel: CPU1: Booted secondary processor
Feb 14 00:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 00:00:16 kernel: Total size:  128MB
Feb 14 00:00:16 kernel: Block size:  128KB
Feb 14 00:00:16 kernel: Page Size:   2048B
Feb 14 00:00:16 kernel: OOB Size:    64B
Feb 14 00:00:16 kernel: Sector size: 512B
Feb 14 00:00:16 kernel: Spare size:  16B
Feb 14 00:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 00:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 00:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 00:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 00:00:16 kernel: PCI: no core
Feb 14 00:00:16 kernel: PCI: no core
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 1
Feb 14 00:00:16 kernel: PCI: Fixing up bus 0
Feb 14 00:00:16 kernel: PCI: Fixing up bus 1
Feb 14 00:00:16 nat: apply redirect rules
Feb 14 00:00:16 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 00:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 00:00:16 kernel: pflash: found no supported devices
Feb 14 00:00:16 kernel: bcmsflash: found no supported devices
Feb 14 00:00:16 kernel: Boot partition size = 524288(0x80000)
Feb 14 00:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 00:00:16 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 00:00:16 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 00:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 00:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 00:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 00:00:16 kernel: 0x0000003bfe80-0x000004000000 : "rootfs"
Feb 14 00:00:16 kernel: === PPTP init ===
Feb 14 00:00:17 kernel: Registering the dns_resolver key type
Feb 14 00:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 00:00:17 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 00:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 00:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 00:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 00:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 00:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 00:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 00:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 00:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 00:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 00:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 00:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 00:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 00:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 00:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 00:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 00:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 00:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 00:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 00:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 00:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 00:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 00:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:17 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 00:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 00:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 00:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 00:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 00:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 25 2018 at 20:43:15
Feb 14 00:00:17 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 00:00:17 kernel: reset usb phy..
Feb 14 00:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 00:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 00:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 00:00:17 kernel: Empty flash at 0x005c0bb8 ends at 0x005c1000
Feb 14 00:00:17 kernel: jffs2_scan_eraseblock(): Node at 0x005d97f8 {0x1985, 0xe002, 0x00000044) has invalid CRC 0xe0011985 (calculated 0x98f7fb1d)
Feb 14 00:00:17 kernel: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found at 0x005d97fc: 0x0044 instead
Feb 14 00:00:17 kernel: JFFS2 notice: (233) check_node_data: wrong data CRC in data node at 0x00106f7c: read 0xe8a14997, calculated 0x597f6c69.
Feb 14 00:00:19 dnsmasq[355]: warning: no upstream servers configured
Feb 14 00:00:19 kernel: rtk port_phyEnableAll (on) ok
Feb 14 00:00:19 RT-AC88U: start httpd
Feb 14 00:00:20 syslog: Generating SSL certificate...
Feb 14 00:00:20 lldpd[385]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 00:00:20 lldpd[385]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 00:00:21 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:00:22 NAT Tunnel: AAE Service is stopped
Feb 14 00:00:22 AAE: AAE Service is started
Feb 14 00:00:22 disk monitor: be idle
Feb 14 00:00:22 hour monitor: daemon is starting
Feb 14 00:00:22 jffs2: valid logs(1)
Feb 14 00:00:22 hour monitor: daemon terminates
Feb 14 00:00:22 miniupnpd[430]: version 1.9 started
Feb 14 00:00:22 miniupnpd[430]: HTTP listening on port 33538
Feb 14 00:00:22 miniupnpd[430]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:22 Mastiff: init
Feb 14 00:00:22 wan: [wan0_hwaddr] == [B0:6E:BF:DC:62:70]
Feb 14 00:00:22 wan: [deconfig] udhcpc done[286]
Feb 14 00:00:23 rc_service: udhcpc 442:notify_rc start_firewall
Feb 14 00:00:23 wan: finish adding multi routes
Feb 14 00:00:23 rc_service: udhcpc 442:notify_rc stop_upnp
Feb 14 00:00:23 rc_service: waitting "start_firewall" via udhcpc ...
Feb 14 00:00:27 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 00:00:27 syslog: module leds-usb not found in modules.dep
Feb 14 00:00:27 kernel: SCSI subsystem initialized
Feb 14 00:00:28 WAN Connection: WAN was restored.
Feb 14 00:00:29 miniupnpd[430]: shutting down MiniUPnPd
Feb 14 00:00:29 nat: apply redirect rules
Feb 14 00:00:35 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 00:00:35 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 00:00:36 miniupnpd[576]: version 1.9 started
Feb 14 00:00:36 miniupnpd[576]: HTTP listening on port 41741
Feb 14 00:00:36 miniupnpd[576]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:36 rc_service: udhcpc 442:notify_rc start_upnp
Feb 14 00:00:36 rc_service: waitting "stop_upnp" via udhcpc ...
Feb 14 00:00:36 miniupnpd[576]: shutting down MiniUPnPd
Feb 14 00:00:37 miniupnpd[579]: version 1.9 started
Feb 14 00:00:37 miniupnpd[579]: HTTP listening on port 60835
Feb 14 00:00:37 miniupnpd[579]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:00:42 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:04:55 rc_service: httpd 363:notify_rc start_autodet
Feb 14 00:05:15 rc_service: httpd 363:notify_rc start_autodet
Feb 14 00:06:13 rc_service: httpd 363:notify_rc restart_wan_if 0
Feb 14 00:06:13 wan: [deconfig] udhcpc done[286]
Feb 14 00:06:14 WAN Connection: ISP's DHCP did not function properly.
Feb 14 00:06:16 wan: [wan0_hwaddr] == [B0:6E:BF:DC:62:70]
Feb 14 00:06:16 wan: [deconfig] udhcpc done[286]
Feb 14 00:06:16 pppd[696]: pppd 2.4.7 started by admin, uid 0
Feb 14 00:06:16 rc_service: udhcpc 697:notify_rc start_firewall
Feb 14 00:06:16 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 00:06:16 miniupnpd[579]: shutting down MiniUPnPd
Feb 14 00:06:16 nat: apply redirect rules
Feb 14 00:06:17 WAN Connection: Fail to connect with some issues.
Feb 14 00:06:17 miniupnpd[718]: version 1.9 started
Feb 14 00:06:17 miniupnpd[718]: HTTP listening on port 37056
Feb 14 00:06:17 miniupnpd[718]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:06:21 pppd[696]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 00:06:21 pppd[696]: Connect: ppp0 <--> eth0
Feb 14 00:06:21 pppd[696]: PAP authentication succeeded
Feb 14 00:06:21 pppd[696]: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 00:06:22 pppd[696]: local  IP address 106.45.236.126
Feb 14 00:06:22 pppd[696]: remote IP address 106.45.236.1
Feb 14 00:06:22 pppd[696]: primary   DNS address 118.118.118.11
Feb 14 00:06:22 pppd[696]: secondary DNS address 202.100.96.68
Feb 14 00:06:22 rc_service: ip-up 734:notify_rc start_firewall
Feb 14 00:06:22 miniupnpd[718]: shutting down MiniUPnPd
Feb 14 00:06:23 wan: finish adding multi routes
Feb 14 08:06:23 rc_service: ip-up 734:notify_rc stop_upnp
Feb 14 08:06:23 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 00:06:23 nat: apply redirect rules
Feb 14 00:06:23 miniupnpd[784]: version 1.9 started
Feb 14 00:06:23 miniupnpd[784]: HTTP listening on port 48713
Feb 14 00:06:23 miniupnpd[784]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:06:24 rc_service: ip-up 734:notify_rc start_upnp
Feb 14 08:06:24 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 00:06:24 miniupnpd[784]: shutting down MiniUPnPd
Feb 14 00:06:24 WAN Connection: WAN was restored.
Feb 14 00:06:25 miniupnpd[786]: version 1.9 started
Feb 14 00:06:25 miniupnpd[786]: HTTP listening on port 49114
Feb 14 00:06:25 miniupnpd[786]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 00:06:27 rc_service: httpd 363:notify_rc start_webs_update
Feb 14 00:06:29 ntp: start NTP update
Feb  4 10:40:57 rc_service: ntp 459:notify_rc restart_upnp
Feb  4 02:40:57 miniupnpd[786]: shutting down MiniUPnPd
Feb  4 02:40:58 miniupnpd[853]: version 1.9 started
Feb  4 02:40:58 miniupnpd[853]: HTTP listening on port 58194
Feb  4 02:40:58 miniupnpd[853]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:40:59 rc_service: ntp 459:notify_rc restart_diskmon
Feb  4 02:40:59 disk_monitor: Finish
Feb  4 02:40:59 disk monitor: be idle
Feb  4 02:41:30 crond[362]: time disparity of 511355 minutes detected
Feb 14 08:00:15 syslogd started: BusyBox v1.17.4
Feb 14 08:00:15 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:15 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:15 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:15 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:15 kernel: Machine: Northstar Prototype
Feb 14 08:00:15 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:15 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:15 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 08:00:15 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:15 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:15 kernel: Virtual kernel memory layout:
Feb 14 08:00:15 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:15 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:15 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:15 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:15 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:15 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 08:00:15 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:15 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:15 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:15 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:15 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:15 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:  128MB
Feb 14 08:00:16 kernel: Block size:  128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:  16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:16 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:16 kernel: pflash: found no supported devices
Feb 14 08:00:16 kernel: bcmsflash: found no supported devices
Feb 14 08:00:16 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:16 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:16 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:16 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:16 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:16 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:16 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:16 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:16 nat: apply redirect rules
Feb 14 08:00:16 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:17 kernel: Empty flash at 0x001073e4 ends at 0x00107800
Feb 14 08:00:17 kernel: [dump prev ops] from 80000000, local len(2232)
Feb 14 08:00:17 kernel: _ Reboot message ... _______________________________________________________
Feb 14 08:00:17 kernel: <0>Restarting system.
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable ��ead fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, sizeto read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, sie to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5,  [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cache entUnable to read page, block 1adf1 Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adr: Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS e 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read fragment cFS error: Unable to read page, bHFS error: Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUAment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQe, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SSQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read<3>SQUASHFS error: Unable to read fragment cache entry [1adf1a5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to r5]
Feb 14 08:00:17 kernel: <3>SQUASHFS error: Unable to read page, block 1adf1a5, size a73c
Feb 14 08:00:17 kernel: ____________________________________________________________________________
Feb 14 08:00:19 dnsmasq[355]: warning: no upstream servers configured
Feb 14 08:00:19 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:19 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:20 lldpd[385]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:20 lldpd[385]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:21 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:22 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:22 AAE: AAE Service is started
Feb 14 08:00:22 jffs2: valid logs(1)
Feb 14 08:00:22 hour monitor: daemon is starting
Feb 14 08:00:22 hour monitor: daemon terminates
Feb 14 08:00:22 disk monitor: be idle
Feb 14 08:00:22 miniupnpd[424]: version 1.9 started
Feb 14 08:00:22 miniupnpd[424]: HTTP listening on port 60025
Feb 14 08:00:22 miniupnpd[424]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:22 Mastiff: init
Feb 14 08:00:23 wan: [wan0_hwaddr] == [B0:6E:BF:DC:62:70]
Feb 14 08:00:23 wan: [deconfig] udhcpc done[286]
Feb 14 08:00:23 pppd[443]: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:23 rc_service: udhcpc 442:notify_rc start_firewall
Feb 14 08:00:23 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb 14 08:00:23 pppd[443]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:23 pppd[443]: Connect: ppp0 <--> eth0
Feb 14 08:00:26 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:26 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:26 kernel: SCSI subsystem initialized
Feb 14 08:00:27 pppd[443]: PAP authentication succeeded
Feb 14 08:00:27 pppd[443]: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:27 pppd[443]: local  IP address 106.45.236.181
Feb 14 08:00:27 pppd[443]: remote IP address 106.45.236.1
Feb 14 08:00:27 pppd[443]: primary   DNS address 118.118.118.11
Feb 14 08:00:27 pppd[443]: secondary DNS address 202.100.96.68
Feb 14 08:00:27 rc_service: ip-up 542:notify_rc start_firewall
Feb 14 08:00:27 rc_service: waitting "start_firewall" via  ...
Feb 14 08:00:28 miniupnpd[424]: shutting down MiniUPnPd
Feb 14 08:00:28 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:30 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:30 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:30 miniupnpd[615]: version 1.9 started
Feb 14 08:00:30 miniupnpd[615]: HTTP listening on port 38787
Feb 14 08:00:30 miniupnpd[615]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:31 miniupnpd[615]: shutting down MiniUPnPd
Feb 14 08:00:31 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:31 wan: finish adding multi routes
Feb 14 08:00:31 rc_service: ip-up 542:notify_rc stop_upnp
Feb 14 08:00:31 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:31 miniupnpd[651]: version 1.9 started
Feb 14 08:00:31 miniupnpd[651]: HTTP listening on port 55150
Feb 14 08:00:31 miniupnpd[651]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:32 WAN Connection: WAN was restored.
Feb 14 08:00:32 rc_service: ip-up 542:notify_rc start_upnp
Feb 14 08:00:32 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:32 miniupnpd[651]: shutting down MiniUPnPd
Feb 14 08:00:33 miniupnpd[656]: version 1.9 started
Feb 14 08:00:33 miniupnpd[656]: HTTP listening on port 57258
Feb 14 08:00:33 miniupnpd[656]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:34 ntp: start NTP update
Feb  4 10:46:41 rc_service: ntp 636:notify_rc restart_upnp
Feb  4 10:46:41 miniupnpd[656]: shutting down MiniUPnPd
Feb  4 10:46:41 rc_service: ntp 636:notify_rc restart_diskmon
Feb  4 10:46:41 disk_monitor: Finish
Feb  4 10:46:41 miniupnpd[664]: version 1.9 started
Feb  4 10:46:41 miniupnpd[664]: HTTP listening on port 34032
Feb  4 10:46:41 miniupnpd[664]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:46:42 disk monitor: be idle
Feb  4 10:47:08 crond[362]: time disparity of 511366 minutes detected
Feb  4 10:47:10 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  4 10:48:17 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb  4 10:48:17 Mastiff: select error
Feb  4 10:48:17 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb  4 10:48:17 Mastiff: select error
Feb  4 10:48:17 rc_service: httpd 363:notify_rc restart_ddns
Feb  4 10:48:17 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 10:48:17 ddns update: ez-ipupdate: starting...
Feb  4 10:48:17 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 10:48:18 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:48:17 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 10:48:18 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 10:48:18 ddns update: asusddns_update: 0
Feb  4 10:48:18 ddns: ddns update ok
Feb  4 10:48:36 watchdog: start ddns.
Feb  4 10:48:36 rc_service: watchdog 367:notify_rc restart_ddns
Feb  4 10:48:36 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 10:48:36 rc_service: httpd 363:notify_rc restart_firewall
Feb  4 10:48:37 ddns update: ez-ipupdate: starting...
Feb  4 10:48:37 miniupnpd[664]: shutting down MiniUPnPd
Feb  4 10:48:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:48:37 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 10:48:37 miniupnpd[985]: version 1.9 started
Feb  4 10:48:37 miniupnpd[985]: HTTP listening on port 60127
Feb  4 10:48:37 miniupnpd[985]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:48:38 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:48:36 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 10:48:38 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 10:48:38 ddns update: asusddns_update: 0
Feb  4 10:48:39 ddns: ddns update ok
Feb  4 10:49:33 rc_service: cfg_server 1006:notify_rc restart_wireless
Feb  4 10:49:36 kernel: dhd_detach(): thread:dhd_watchdog_thread:7e terminated OK
Feb  4 10:49:36 kernel: dhd_detach(): thread:dhd_watchdog_thread:7a terminated OK
Feb  4 10:49:40 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:49:40 kernel: dhd_attach(): thread:dhd_watchdog_thread:449 started
Feb  4 10:49:41 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:49:41 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:49:41 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb  4 10:49:41 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:49:41 kernel: dhd_attach(): thread:dhd_watchdog_thread:451 started
Feb  4 10:49:42 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:49:42 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:49:42 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:50:03 rc_service: cfg_server 1225:notify_rc restart_wireless
Feb  4 10:50:05 lldpd[385]: unable to send packet on real device for eth1: Network is down
Feb  4 10:50:05 lldpd[385]: unable to send packet on real device for eth2: No such device or address
Feb  4 10:50:05 kernel: dhd_detach(): thread:dhd_watchdog_thread:451 terminated OK
Feb  4 10:50:05 kernel: dhd_detach(): thread:dhd_watchdog_thread:449 terminated OK
Feb  4 10:50:09 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:50:09 kernel: dhd_attach(): thread:dhd_watchdog_thread:522 started
Feb  4 10:50:09 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:50:09 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:50:09 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb  4 10:50:09 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:50:10 kernel: dhd_attach(): thread:dhd_watchdog_thread:527 started
Feb  4 10:50:10 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:50:10 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:50:10 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:50:35 WAN Connection: Fail to connect with some issues.
Feb  4 10:50:36 DualWAN: skip single wan wan_led_control - WANRED off
Feb  4 10:50:36 nat: apply redirect rules
Feb  4 10:50:36 pppd[443]: Connection terminated.
Feb  4 10:50:36 pppd[443]: Modem hangup
Feb  4 10:50:46 pppd[443]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  4 10:50:46 pppd[443]: Connect: ppp0 <--> eth0
Feb  4 10:50:46 pppd[443]: PAP authentication succeeded
Feb  4 10:50:46 pppd[443]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  4 10:50:47 pppd[443]: local  IP address 106.45.237.16
Feb  4 10:50:47 pppd[443]: remote IP address 106.45.236.1
Feb  4 10:50:47 pppd[443]: primary   DNS address 118.118.118.11
Feb  4 10:50:47 pppd[443]: secondary DNS address 202.100.96.68
Feb  4 10:50:47 rc_service: ip-up 1437:notify_rc start_firewall
Feb  4 10:50:47 miniupnpd[985]: shutting down MiniUPnPd
Feb  4 10:50:47 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:50:47 wan: finish adding multi routes
Feb  4 10:50:47 ntp: start NTP update
Feb  4 10:50:47 rc_service: ip-up 1437:notify_rc stop_upnp
Feb  4 10:50:47 rc_service: waitting "start_firewall" via ip-up ...
Feb  4 10:50:48 miniupnpd[1473]: version 1.9 started
Feb  4 10:50:48 miniupnpd[1473]: HTTP listening on port 40870
Feb  4 10:50:48 miniupnpd[1473]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:50:48 rc_service: ip-up 1437:notify_rc start_upnp
Feb  4 10:50:48 rc_service: waitting "stop_upnp" via ip-up ...
Feb  4 10:50:48 miniupnpd[1473]: shutting down MiniUPnPd
Feb  4 10:50:49 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 10:50:50 miniupnpd[1478]: version 1.9 started
Feb  4 10:50:50 miniupnpd[1478]: HTTP listening on port 57985
Feb  4 10:50:50 miniupnpd[1478]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:50:50 ddns update: ez-ipupdate: starting...
Feb  4 10:50:50 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 10:50:51 WAN Connection: WAN was restored.
Feb  4 10:50:52 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:50:50 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 10:50:52 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 10:50:52 ddns update: asusddns_update: 0
Feb  4 10:50:52 ddns: ddns update ok
Feb  4 10:51:11 rc_service: httpd 363:notify_rc restart_net_and_phy
Feb  4 10:51:13 iTunes: daemon is stoped
Feb  4 10:51:13 FTP Server: daemon is stoped
Feb  4 10:51:14 Samba Server: smb daemon is stoped
Feb  4 10:51:14 kernel: gro disabled
Feb  4 10:51:14 miniupnpd[1478]: shutting down MiniUPnPd
Feb  4 10:51:16 pppd[443]: Connection terminated.
Feb  4 10:51:16 wan: [deconfig] udhcpc done[286]
Feb  4 10:51:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:51:21 kernel: dhd_detach(): thread:dhd_watchdog_thread:527 terminated OK
Feb  4 10:51:22 kernel: dhd_detach(): thread:dhd_watchdog_thread:522 terminated OK
Feb  4 10:51:24 kernel: rtk port_phyEnableAll (off) ok
Feb  4 10:51:25 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:51:25 kernel: dhd_attach(): thread:dhd_watchdog_thread:65c started
Feb  4 10:51:26 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:51:26 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:51:26 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb  4 10:51:26 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:51:26 kernel: dhd_attach(): thread:dhd_watchdog_thread:660 started
Feb  4 10:51:27 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:51:27 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:51:27 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:51:29 nat: apply redirect rules
Feb  4 10:51:29 dnsmasq[1704]: warning: no upstream servers configured
Feb  4 10:51:29 wan: [wan0_hwaddr] == [B0:6E:BF:DC:62:70]
Feb  4 10:51:29 wan: [deconfig] udhcpc done[286]
Feb  4 10:51:29 pppd[1709]: pppd 2.4.7 started by adminyyg, uid 0
Feb  4 10:51:29 rc_service: udhcpc 1710:notify_rc start_firewall
Feb  4 10:51:29 rc_service: waitting "restart_net_and_phy" via  ...
Feb  4 10:51:29 pppd[1709]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  4 10:51:29 pppd[1709]: Connect: ppp0 <--> eth0
Feb  4 10:51:29 pppd[1709]: PAP authentication succeeded
Feb  4 10:51:29 pppd[1709]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  4 10:51:29 pppd[1709]: local  IP address 106.45.237.16
Feb  4 10:51:29 pppd[1709]: remote IP address 106.45.236.1
Feb  4 10:51:29 pppd[1709]: primary   DNS address 118.118.118.11
Feb  4 10:51:29 pppd[1709]: secondary DNS address 202.100.96.68
Feb  4 10:51:29 rc_service: ip-up 1715:notify_rc start_firewall
Feb  4 10:51:29 rc_service: waitting "restart_net_and_phy" via  ...
Feb  4 10:51:32 kernel: rtk port_phyEnableAll (on) ok
Feb  4 10:51:32 miniupnpd[1739]: version 1.9 started
Feb  4 10:51:32 miniupnpd[1739]: HTTP listening on port 43249
Feb  4 10:51:32 miniupnpd[1739]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:51:32 RT-AC88U: start httpd
Feb  4 10:51:33 syslog: Generating SSL certificate...
Feb  4 10:51:33 wan: finish adding multi routes
Feb  4 10:51:33 WAN Connection: WAN was exceptionally disconnected.
Feb  4 10:51:34 dhcp client: bound 192.168.100.2 via 192.168.100.1 during 259200 seconds.
Feb  4 10:51:35 miniupnpd[1739]: shutting down MiniUPnPd
Feb  4 10:51:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:51:35 WAN Connection: WAN was restored.
Feb  4 10:51:36 miniupnpd[1808]: version 1.9 started
Feb  4 10:51:36 miniupnpd[1808]: HTTP listening on port 42260
Feb  4 10:51:36 miniupnpd[1808]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:51:37 miniupnpd[1808]: shutting down MiniUPnPd
Feb  4 10:51:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:51:37 wan: finish adding multi routes
Feb  4 10:51:37 rc_service: ip-up 1715:notify_rc stop_upnp
Feb  4 10:51:37 rc_service: waitting "start_firewall" via ip-up ...
Feb  4 10:51:38 miniupnpd[1858]: version 1.9 started
Feb  4 10:51:38 miniupnpd[1858]: HTTP listening on port 48268
Feb  4 10:51:38 miniupnpd[1858]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:51:38 rc_service: ip-up 1715:notify_rc start_upnp
Feb  4 10:51:38 rc_service: waitting "stop_upnp" via ip-up ...
Feb  4 10:51:38 miniupnpd[1858]: shutting down MiniUPnPd
Feb  4 10:51:39 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 10:51:39 ddns update: ez-ipupdate: starting...
Feb  4 10:51:39 miniupnpd[1864]: version 1.9 started
Feb  4 10:51:39 miniupnpd[1864]: HTTP listening on port 58065
Feb  4 10:51:39 miniupnpd[1864]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:51:43 ntp: start NTP update
Feb  4 10:51:45 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 10:51:45 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 02:51:44 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 10:51:45 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 10:51:45 ddns update: asusddns_update: 0
Feb  4 10:51:45 ddns: ddns update ok
Feb  4 10:55:43 rc_service: cfg_server 1985:notify_rc restart_wireless;restart_qos;restart_firewall;
Feb  4 10:55:45 kernel: dhd_detach(): thread:dhd_watchdog_thread:660 terminated OK
Feb  4 10:55:45 kernel: dhd_detach(): thread:dhd_watchdog_thread:65c terminated OK
Feb  4 10:55:49 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:55:49 kernel: dhd_attach(): thread:dhd_watchdog_thread:811 started
Feb  4 10:55:50 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:55:50 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:55:50 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb  4 10:55:50 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb  4 10:55:50 kernel: dhd_attach(): thread:dhd_watchdog_thread:815 started
Feb  4 10:55:51 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb  4 10:55:51 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb  4 10:55:51 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:55:52 kernel: Register interface [wl1.1]  MAC: b0:6e:bf:dc:62:74
Feb  4 10:55:58 miniupnpd[1864]: shutting down MiniUPnPd
Feb  4 10:55:58 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 10:55:58 miniupnpd[2225]: version 1.9 started
Feb  4 10:55:58 miniupnpd[2225]: HTTP listening on port 46637
Feb  4 10:55:58 miniupnpd[2225]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 10:58:57 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  4 11:00:42 disk_monitor: Got SIGALRM...
Feb  4 11:01:07 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  4 11:17:02 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  4 11:17:26 Mastiff: Got AAE_SIG_EULA_FLAG_SIGNED
Feb  4 11:17:26 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
Feb  4 11:17:26 Mastiff: select error
Feb  4 11:17:41 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 11:17:41 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 11:17:42 kernel: sizeof forward pkt param = 192
Feb  4 11:17:42 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb  4 11:17:42 miniupnpd[2225]: shutting down MiniUPnPd
Feb  4 11:17:43 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 11:17:44 miniupnpd[3091]: version 1.9 started
Feb  4 11:17:44 miniupnpd[3091]: HTTP listening on port 50142
Feb  4 11:17:44 miniupnpd[3091]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 11:17:46 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb  4 11:17:46 kernel: HTB: quantum of class 20030 is big. Consider r2q change.
Feb  4 11:17:48 kernel:  *** ERROR: [tdts_shell_ioctl_sig_op_load:95] tdts_core_rule_parsing_trf_load() fail!
Feb  4 11:17:49 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 11:17:49 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 11:17:49 kernel: sizeof forward pkt param = 192
Feb  4 11:17:55 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb  4 11:17:56 miniupnpd[3091]: shutting down MiniUPnPd
Feb  4 11:17:56 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 11:17:56 miniupnpd[3344]: version 1.9 started
Feb  4 11:17:57 kernel: tdts_udb: Unknown parameter `161'
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_ct_event_handler (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_devid_un_bootp (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_policy_match (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_usr_msg_handler (err 0)
Feb  4 11:17:58 miniupnpd[3344]: HTTP listening on port 32962
Feb  4 11:17:58 miniupnpd[3344]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_wan_detection (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol dev_wan (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol mode (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_unregister_qos_ops (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_get_action (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_devid_un_http_ua (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_do_fastpath_action (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_update_qos_data (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_register_qos_ops (err 0)
Feb  4 11:17:58 kernel: tdts_udbfw: Unknown symbol udb_shell_reg_func_find_ct (err 0)
Feb  4 11:17:58 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 11:17:59 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 11:17:59 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 11:17:59 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 11:17:59 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb  4 11:18:11 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 11:18:11 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 11:18:11 kernel: sizeof forward pkt param = 192
Feb  4 11:18:24 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 11:18:25 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 11:18:25 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 11:18:25 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 11:18:25 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb  4 11:18:25 rc_service: bwdpi_check 415:notify_rc start_firewall
Feb  4 11:18:25 miniupnpd[3344]: shutting down MiniUPnPd
Feb  4 11:18:25 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 11:18:26 miniupnpd[3653]: version 1.9 started
Feb  4 11:18:26 miniupnpd[3653]: HTTP listening on port 36449
Feb  4 11:18:26 miniupnpd[3653]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 11:34:22 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  4 11:57:07 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  4 12:02:11 rc_service: httpd 1741:notify_rc restart_wan_if 0
Feb  4 12:02:11 pppd[1709]: Connection terminated.
Feb  4 12:02:12 wan: [deconfig] udhcpc done[286]
Feb  4 12:02:14 wan: [wan0_hwaddr] == [B0:6E:BF:DC:62:70]
Feb  4 12:02:14 pppd[4641]: pppd 2.4.7 started by adminyyg, uid 0
Feb  4 12:02:14 pppd[4641]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  4 12:02:15 pppd[4641]: Connect: ppp0 <--> eth0
Feb  4 12:02:15 pppd[4641]: PAP authentication succeeded
Feb  4 12:02:15 pppd[4641]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  4 12:02:15 pppd[4641]: local  IP address 14.135.64.229
Feb  4 12:02:15 pppd[4641]: remote IP address 14.135.64.1
Feb  4 12:02:15 pppd[4641]: primary   DNS address 118.118.118.11
Feb  4 12:02:15 pppd[4641]: secondary DNS address 202.100.96.68
Feb  4 12:02:15 rc_service: ip-up 4646:notify_rc start_firewall
Feb  4 12:02:16 miniupnpd[3653]: delete_filter_rule() : iptc_commit(): Resource temporarily unavailable
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9906 -> 192.168.1.100:9906 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9907 -> 192.168.1.100:9907 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9908 -> 192.168.1.100:9908 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8730 -> 192.168.1.100:8730 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 51417 -> 192.168.1.100:51417 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 51417 -> 192.168.1.100:51417 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8001 -> 192.168.1.100:8001 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 21000 -> 192.168.1.100:21000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9800 -> 192.168.1.100:9800 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9802 -> 192.168.1.100:9802 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 38000 -> 192.168.1.100:38000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 44300 -> 192.168.1.100:44300 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 3306 -> 192.168.1.100:3306 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 1868 -> 192.168.1.100:1868 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 22220 -> 192.168.1.100:22220 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8000 -> 192.168.1.100:8000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8809 -> 192.168.1.100:8809 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8200 -> 192.168.1.100:8200 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8200 -> 192.168.1.100:8200 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 5001 -> 192.168.1.100:5001 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 5001 -> 192.168.1.100:5001 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 3689 -> 192.168.1.100:3689 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 3689 -> 192.168.1.100:3689 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8008 -> 192.168.1.100:8008 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8008 -> 192.168.1.100:8008 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8009 -> 192.168.1.100:8009 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8009 -> 192.168.1.100:8009 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8010 -> 192.168.1.100:8010 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8010 -> 192.168.1.100:8010 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8011 -> 192.168.1.100:8011 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8011 -> 192.168.1.100:8011 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8012 -> 192.168.1.100:8012 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8012 -> 192.168.1.100:8012 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8807 -> 192.168.1.100:8807 protocol UDP
Feb  4 12:02:16 wan: finish adding multi routes
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 5548 -> 192.168.1.100:5548 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 1884 -> 192.168.1.100:1884 protocol TCP
Feb  4 12:02:16 rc_service: ip-up 4646:notify_rc stop_upnp
Feb  4 12:02:16 rc_service: waitting "start_firewall" via ip-up ...
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 12000 -> 192.168.1.100:12000 protocol TCP
Feb  4 12:02:16 ntp: start NTP update
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 14000 -> 192.168.1.100:14000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 60000 -> 192.168.1.100:60000 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 36667 -> 192.168.1.100:36667 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 1828 -> 192.168.1.100:1828 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 1828 -> 192.168.1.100:1828 protocol UDP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9900 -> 192.168.1.100:9900 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9901 -> 192.168.1.100:9901 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9902 -> 192.168.1.100:9902 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9903 -> 192.168.1.100:9903 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9904 -> 192.168.1.100:9904 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9905 -> 192.168.1.100:9905 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9906 -> 192.168.1.100:9906 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9907 -> 192.168.1.100:9907 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 9908 -> 192.168.1.100:9908 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: add_filter_rule() : chain FUPNP not found
Feb  4 12:02:16 miniupnpd[3653]: Failed to redirect 8730 -> 192.168.1.100:8730 protocol TCP
Feb  4 12:02:16 miniupnpd[3653]: shutting down MiniUPnPd
Feb  4 12:02:16 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 12:02:17 miniupnpd[4684]: version 1.9 started
Feb  4 12:02:17 miniupnpd[4684]: HTTP listening on port 40056
Feb  4 12:02:17 rc_service: ip-up 4646:notify_rc start_upnp
Feb  4 12:02:17 rc_service: waitting "stop_upnp" via ip-up ...
Feb  4 12:02:17 miniupnpd[4684]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 12:02:17 miniupnpd[4684]: shutting down MiniUPnPd
Feb  4 12:02:18 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  4 12:02:19 ddns update: ez-ipupdate: starting...
Feb  4 12:02:19 miniupnpd[4688]: version 1.9 started
Feb  4 12:02:19 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  4 12:02:19 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 04:02:18 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  4 12:02:19 ddns update: retval= 0, ddns_return_code (,200)
Feb  4 12:02:19 ddns update: asusddns_update: 0
Feb  4 12:02:19 miniupnpd[4688]: HTTP listening on port 56620
Feb  4 12:02:19 miniupnpd[4688]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 12:02:19 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 12:02:19 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 12:02:19 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 12:02:19 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 12:02:19 kernel: HTB: quantum of class 10030 is big. Consider r2q change.
Feb  4 12:02:20 ddns: ddns update ok
Feb  4 12:02:26 rc_service: zcip 4743:notify_rc start_firewall
Feb  4 12:02:26 zcip client: configured 169.254.72.55
Feb  4 12:02:27 miniupnpd[4688]: shutting down MiniUPnPd
Feb  4 12:02:27 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 12:02:27 miniupnpd[4764]: version 1.9 started
Feb  4 12:02:27 miniupnpd[4764]: HTTP listening on port 49274
Feb  4 12:02:27 miniupnpd[4764]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 12:51:32 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  4 13:04:37 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  4 13:06:26 rc_service: httpd 1741:notify_rc restart_firewall;restart_qos
Feb  4 13:06:26 miniupnpd[4764]: shutting down MiniUPnPd
Feb  4 13:06:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 13:06:27 miniupnpd[6381]: version 1.9 started
Feb  4 13:06:29 miniupnpd[6381]: HTTP listening on port 43318
Feb  4 13:06:29 miniupnpd[6381]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 13:06:29 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 13:06:29 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 13:06:29 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 13:06:29 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 13:06:29 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 13:06:29 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 13:06:30 kernel: sizeof forward pkt param = 192
Feb  4 13:06:47 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  4 13:06:47 kernel: UDB Core Version: 0.2.14 r3529123
Feb  4 13:06:47 kernel: sizeof forward pkt param = 192
Feb  4 13:06:59 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  4 13:06:59 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  4 13:06:59 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  4 13:06:59 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  4 13:06:59 rc_service: bwdpi_check 415:notify_rc start_firewall
Feb  4 13:06:59 miniupnpd[6381]: shutting down MiniUPnPd
Feb  4 13:06:59 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  4 13:07:00 miniupnpd[6853]: version 1.9 started
Feb  4 13:07:00 miniupnpd[6853]: HTTP listening on port 41162
Feb  4 13:07:00 miniupnpd[6853]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  4 17:44:42 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  4 18:31:52 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  4 18:33:12 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  4 23:00:42 disk_monitor: Got SIGALRM...
Feb  4 23:03:32 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  4 23:59:02 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  5 00:02:16 ntp: start NTP update
Feb  5 05:40:24 pppd[4641]: Connection terminated.
Feb  5 05:40:25 pppd[4641]: Modem hangup
Feb  5 05:40:25 WAN Connection: Fail to connect with some issues.
Feb  5 05:40:26 DualWAN: skip single wan wan_led_control - WANRED off
Feb  5 05:40:26 nat: apply redirect rules
Feb  5 05:40:35 pppd[4641]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  5 05:40:35 pppd[4641]: Connect: ppp0 <--> eth0
Feb  5 05:40:35 pppd[4641]: PAP authentication succeeded
Feb  5 05:40:35 pppd[4641]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  5 05:40:35 pppd[4641]: local  IP address 222.75.136.67
Feb  5 05:40:35 pppd[4641]: remote IP address 222.75.136.1
Feb  5 05:40:35 pppd[4641]: primary   DNS address 118.118.118.11
Feb  5 05:40:35 pppd[4641]: secondary DNS address 202.100.96.68
Feb  5 05:40:35 rc_service: ip-up 29037:notify_rc start_firewall
Feb  5 05:40:36 wan: finish adding multi routes
Feb  5 05:40:36 rc_service: ip-up 29037:notify_rc stop_upnp
Feb  5 05:40:36 rc_service: waitting "start_firewall" via ip-up ...
Feb  5 05:40:36 ntp: start NTP update
Feb  5 05:40:36 wan: finish adding multi routes
Feb  5 05:40:36 miniupnpd[6853]: shutting down MiniUPnPd
Feb  5 05:40:36 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 05:40:37 miniupnpd[29092]: version 1.9 started
Feb  5 05:40:37 rc_service: ip-up 29037:notify_rc start_upnp
Feb  5 05:40:37 rc_service: waitting "stop_upnp" via ip-up ...
Feb  5 05:40:37 miniupnpd[29092]: HTTP listening on port 58994
Feb  5 05:40:37 miniupnpd[29092]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 05:40:37 miniupnpd[29092]: shutting down MiniUPnPd
Feb  5 05:40:38 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  5 05:40:38 ddns update: ez-ipupdate: starting...
Feb  5 05:40:38 miniupnpd[29096]: version 1.9 started
Feb  5 05:40:38 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  5 05:40:39 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 04 Feb 2018 21:40:38 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  5 05:40:39 ddns update: retval= 0, ddns_return_code (,200)
Feb  5 05:40:39 ddns update: asusddns_update: 0
Feb  5 05:40:39 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  5 05:40:39 miniupnpd[29096]: HTTP listening on port 33508
Feb  5 05:40:39 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  5 05:40:39 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  5 05:40:39 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  5 05:40:39 miniupnpd[29096]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 05:40:39 ddns: ddns update ok
Feb  5 05:40:41 WAN Connection: WAN was restored.
Feb  5 05:40:42 ntp: start NTP update
Feb  5 05:50:32 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  5 05:50:32 kernel: UDB Core Version: 0.2.14 r3529123
Feb  5 05:50:32 kernel: sizeof forward pkt param = 192
Feb  5 05:52:04 rc_service: httpd 1741:notify_rc restart_firewall
Feb  5 05:52:04 rc_service: httpd 1741:notify_rc restart_firewall;restart_wrs
Feb  5 05:52:04 rc_service: waitting "restart_firewall" via httpd ...
Feb  5 05:52:04 miniupnpd[29096]: shutting down MiniUPnPd
Feb  5 05:52:04 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 05:52:05 miniupnpd[29819]: version 1.9 started
Feb  5 05:52:05 miniupnpd[29819]: HTTP listening on port 51495
Feb  5 05:52:05 miniupnpd[29819]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 05:52:05 miniupnpd[29819]: shutting down MiniUPnPd
Feb  5 05:52:05 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 05:52:06 miniupnpd[29841]: version 1.9 started
Feb  5 05:52:06 miniupnpd[29841]: HTTP listening on port 44619
Feb  5 05:52:06 miniupnpd[29841]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 05:52:12 hour monitor: daemon is starting
Feb  5 07:22:12 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  5 08:07:22 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  5 08:48:42 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  5 12:24:57 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  5 14:09:02 pppd[4641]: Connection terminated.
Feb  5 14:09:02 WAN Connection: Fail to connect with some issues.
Feb  5 14:09:02 pppd[4641]: Modem hangup
Feb  5 14:09:02 DualWAN: skip single wan wan_led_control - WANRED off
Feb  5 14:09:03 miniupnpd[29841]: addnatrule() : iptc_commit() error : Invalid argument
Feb  5 14:09:03 miniupnpd[29841]: Failed to redirect 36667 -> 192.168.1.100:36667 protocol UDP
Feb  5 14:09:03 nat: apply redirect rules
Feb  5 14:09:12 pppd[4641]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  5 14:09:12 pppd[4641]: Connect: ppp0 <--> eth0
Feb  5 14:09:12 pppd[4641]: PAP authentication succeeded
Feb  5 14:09:12 pppd[4641]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  5 14:09:12 pppd[4641]: local  IP address 36.103.106.38
Feb  5 14:09:12 pppd[4641]: remote IP address 36.103.104.1
Feb  5 14:09:12 pppd[4641]: primary   DNS address 118.118.118.11
Feb  5 14:09:12 pppd[4641]: secondary DNS address 202.100.96.68
Feb  5 14:09:12 rc_service: ip-up 9681:notify_rc start_firewall
Feb  5 14:09:13 wan: finish adding multi routes
Feb  5 14:09:13 rc_service: ip-up 9681:notify_rc stop_upnp
Feb  5 14:09:13 rc_service: waitting "start_firewall" via ip-up ...
Feb  5 14:09:13 ntp: start NTP update
Feb  5 14:09:12 WAN Connection: WAN was restored.
Feb  5 14:09:12 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0) error!
Feb  5 14:09:13 miniupnpd[29841]: shutting down MiniUPnPd
Feb  5 14:09:13 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 14:09:13 miniupnpd[9724]: version 1.9 started
Feb  5 14:09:14 rc_service: ip-up 9681:notify_rc start_upnp
Feb  5 14:09:14 rc_service: waitting "stop_upnp" via ip-up ...
Feb  5 14:09:16 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  5 14:09:16 ddns update: ez-ipupdate: starting...
Feb  5 14:09:16 miniupnpd[9727]: version 1.9 started
Feb  5 14:09:16 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  5 14:09:17 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Mon, 05 Feb 2018 06:09:16 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  5 14:09:17 ddns update: retval= 0, ddns_return_code (,200)
Feb  5 14:09:17 ddns update: asusddns_update: 0
Feb  5 14:09:18 ddns: ddns update ok
Feb  5 14:09:21 miniupnpd[9727]: HTTP listening on port 34860
Feb  5 14:09:21 miniupnpd[9727]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 14:09:22 rc_service: ip-up 9681:notify_rc start_firewall
Feb  5 14:09:22 miniupnpd[9727]: shutting down MiniUPnPd
Feb  5 14:09:22 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  5 14:09:22 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  5 14:09:22 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  5 14:09:22 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  5 14:09:22 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  5 14:09:23 miniupnpd[9822]: version 1.9 started
Feb  5 14:09:25 miniupnpd[9822]: HTTP listening on port 52346
Feb  5 14:09:25 miniupnpd[9822]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  5 17:59:41 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  5 18:39:16 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  5 18:57:01 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  5 20:58:41 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  5 21:00:01 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  6 02:09:09 ntp: start NTP update
Feb  6 07:40:16 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  6 10:48:17 rc_service: rc 6671:notify_rc restart_wrs
Feb  6 12:07:36 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  6 12:35:36 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  6 13:35:01 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  6 14:09:09 ntp: start NTP update
Feb  6 17:27:20 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  6 18:00:15 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  6 19:06:50 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  6 19:39:59 miniupnpd[9822]: upnp_event_process_notify: connect(192.168.1.159:2869): No route to host
Feb  6 20:51:24 miniupnpd[9822]: upnp_event_send: send(): Connection reset by peer
Feb  7 02:09:06 ntp: start NTP update
Feb  7 05:35:15 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  7 06:13:18 WAN Connection: Fail to connect with some issues.
Feb  7 06:13:18 DualWAN: skip single wan wan_led_control - WANRED off
Feb  7 06:13:19 nat: apply redirect rules
Feb  7 06:13:20 pppd[4641]: Connection terminated.
Feb  7 06:13:20 pppd[4641]: Modem hangup
Feb  7 06:13:30 pppd[4641]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  7 06:13:30 pppd[4641]: Connect: ppp0 <--> eth0
Feb  7 06:13:31 pppd[4641]: PAP authentication succeeded
Feb  7 06:13:31 pppd[4641]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  7 06:13:31 pppd[4641]: local  IP address 111.113.210.229
Feb  7 06:13:31 pppd[4641]: remote IP address 111.113.208.1
Feb  7 06:13:31 pppd[4641]: primary   DNS address 118.118.118.11
Feb  7 06:13:31 pppd[4641]: secondary DNS address 202.100.96.68
Feb  7 06:13:31 rc_service: ip-up 3097:notify_rc start_firewall
Feb  7 06:13:31 wan: finish adding multi routes
Feb  7 06:13:31 rc_service: ip-up 3097:notify_rc stop_upnp
Feb  7 06:13:31 rc_service: waitting "start_firewall" via ip-up ...
Feb  7 06:13:31 ntp: start NTP update
Feb  7 06:13:32 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 06:13:33 WAN Connection: WAN was restored.
Feb  7 06:13:33 miniupnpd[3139]: version 1.9 started
Feb  7 06:13:33 rc_service: ip-up 3097:notify_rc start_upnp
Feb  7 06:13:33 rc_service: waitting "stop_upnp" via ip-up ...
Feb  7 06:13:34 miniupnpd[3139]: HTTP listening on port 56850
Feb  7 06:13:34 miniupnpd[3139]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 06:13:34 miniupnpd[3139]: shutting down MiniUPnPd
Feb  7 06:13:34 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 06:13:34 miniupnpd[3142]: version 1.9 started
Feb  7 06:13:35 ddns update: ez-ipupdate: starting...
Feb  7 06:13:35 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  7 06:13:35 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Tue, 06 Feb 2018 22:13:35 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  7 06:13:35 ddns update: retval= 0, ddns_return_code (,200)
Feb  7 06:13:35 ddns update: asusddns_update: 0
Feb  7 06:13:36 ddns: ddns update ok
Feb  7 06:13:36 miniupnpd[3142]: HTTP listening on port 42188
Feb  7 06:13:36 miniupnpd[3142]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 06:13:51 rc_service: ip-up 3097:notify_rc start_firewall
Feb  7 06:13:51 miniupnpd[3142]: shutting down MiniUPnPd
Feb  7 06:13:51 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 06:13:52 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  7 06:13:52 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  7 06:13:52 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  7 06:13:52 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  7 06:13:52 miniupnpd[3247]: version 1.9 started
Feb  7 06:13:52 miniupnpd[3247]: HTTP listening on port 37856
Feb  7 06:13:52 miniupnpd[3247]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 07:44:15 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 08:49:55 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 09:04:15 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 12:10:50 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  7 13:29:55 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  7 13:44:05 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 17:09:55 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 18:58:10 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  7 18:59:30 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb 14 08:00:16 syslogd started: BusyBox v1.17.4
Feb 14 08:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:16 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:16 kernel: Machine: Northstar Prototype
Feb 14 08:00:16 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 08:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:16 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:16 kernel: Virtual kernel memory layout:
Feb 14 08:00:16 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:16 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:16 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:16 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:16 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:16 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 08:00:16 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:16 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:16 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:16 kernel: * Invalid signature of oopsbuf: E1-45-A1-28-49-C0-E1-B8 (len 2967688019)
Feb 14 08:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:16 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:16 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:  128MB
Feb 14 08:00:16 kernel: Block size:  128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:  16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 1
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 nat: apply redirect rules
Feb 14 08:00:17 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:17 kernel: pflash: found no supported devices
Feb 14 08:00:17 kernel: bcmsflash: found no supported devices
Feb 14 08:00:17 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:17 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:17 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:17 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:17 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:17 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:17 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:17 kernel: Register interface [wl1.1]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:20 dnsmasq[360]: warning: no upstream servers configured
Feb 14 08:00:20 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:20 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:21 lldpd[407]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:21 lldpd[407]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:22 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:23 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:23 AAE: AAE Service is started
Feb 14 08:00:23 jffs2: valid logs(1)
Feb 14 08:00:23 disk monitor: be idle
Feb 14 08:00:23 hour monitor: daemon is starting
Feb 14 08:00:23 Mastiff: init
Feb 14 08:00:23 miniupnpd[457]: version 1.9 started
Feb 14 08:00:23 miniupnpd[457]: HTTP listening on port 49363
Feb 14 08:00:23 miniupnpd[457]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:24 wan: [wan0_hwaddr] == [B0:6E:BF:DC:62:70]
Feb 14 08:00:24 pppd[487]: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:27 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:27 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:28 kernel: SCSI subsystem initialized
Feb 14 08:00:36 rc_service: zcip 586:notify_rc start_firewall
Feb 14 08:00:36 zcip client: configured 169.254.72.55
Feb 14 08:00:36 miniupnpd[457]: shutting down MiniUPnPd
Feb 14 08:00:36 nat: apply nat rules (/tmp/nat_rules__eth0)
Feb 14 08:00:37 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:37 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:37 miniupnpd[629]: version 1.9 started
Feb 14 08:00:37 miniupnpd[629]: HTTP listening on port 39976
Feb 14 08:00:37 miniupnpd[629]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:39 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:39 pppd[487]: Connect: ppp0 <--> eth0
Feb 14 08:00:39 pppd[487]: PAP authentication succeeded
Feb 14 08:00:39 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:40 pppd[487]: local  IP address 14.134.10.226
Feb 14 08:00:40 pppd[487]: remote IP address 14.134.8.1
Feb 14 08:00:40 pppd[487]: primary   DNS address 118.118.118.11
Feb 14 08:00:40 pppd[487]: secondary DNS address 202.100.96.68
Feb 14 08:00:40 rc_service: ip-up 642:notify_rc start_firewall
Feb 14 08:00:41 miniupnpd[629]: shutting down MiniUPnPd
Feb 14 08:00:41 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:41 wan: finish adding multi routes
Feb 14 08:00:41 rc_service: ip-up 642:notify_rc stop_upnp
Feb 14 08:00:41 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:41 WAN Connection: WAN was restored.
Feb 14 08:00:41 ntp: start NTP update
Feb 14 08:00:42 miniupnpd[688]: version 1.9 started
Feb 14 08:00:42 miniupnpd[688]: HTTP listening on port 55984
Feb 14 08:00:42 miniupnpd[688]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:42 rc_service: ip-up 642:notify_rc start_upnp
Feb 14 08:00:42 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:42 miniupnpd[688]: shutting down MiniUPnPd
Feb 14 08:00:43 miniupnpd[691]: version 1.9 started
Feb 14 08:00:43 miniupnpd[691]: HTTP listening on port 37594
Feb 14 08:00:43 miniupnpd[691]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:44 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb 14 08:00:45 ntp: start NTP update
Feb  7 19:03:27 rc_service: ntp 667:notify_rc restart_upnp
Feb  7 19:03:27 miniupnpd[691]: shutting down MiniUPnPd
Feb  7 19:03:27 rc_service: ntp 667:notify_rc restart_diskmon
Feb  7 19:03:27 disk_monitor: Finish
Feb  7 19:03:27 miniupnpd[699]: version 1.9 started
Feb  7 19:03:27 miniupnpd[699]: HTTP listening on port 43288
Feb  7 19:03:27 miniupnpd[699]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:03:28 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 19:03:28 ddns update: ez-ipupdate: starting...
Feb  7 19:03:28 disk monitor: be idle
Feb  7 19:03:32 watchdog: start ddns.
Feb  7 19:03:32 rc_service: watchdog 385:notify_rc restart_ddns
Feb  7 19:03:32 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 19:03:33 ddns update: ez-ipupdate: starting...
Feb  7 19:03:41 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  7 19:03:41 kernel: UDB Core Version: 0.2.14 r3529123
Feb  7 19:03:41 kernel: sizeof forward pkt param = 192
Feb  7 19:03:43 crond[367]: time disparity of 516183 minutes detected
Feb  7 19:03:46 rc_service: ip-up 642:notify_rc start_firewall
Feb  7 19:03:47 miniupnpd[699]: shutting down MiniUPnPd
Feb  7 19:03:47 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 19:03:47 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  7 19:03:47 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  7 19:03:47 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  7 19:03:47 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  7 19:03:48 miniupnpd[928]: version 1.9 started
Feb  7 19:03:48 miniupnpd[928]: HTTP listening on port 50567
Feb  7 19:03:48 miniupnpd[928]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:04:02 watchdog: start ddns.
Feb  7 19:04:02 rc_service: watchdog 385:notify_rc start_ddns
Feb  7 19:04:02 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 19:04:02 ddns update: ez-ipupdate: starting...
Feb  7 19:04:03 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  7 19:04:03 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 11:04:02 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  7 19:04:03 ddns update: retval= 0, ddns_return_code (,200)
Feb  7 19:04:03 ddns update: asusddns_update: 0
Feb  7 19:04:03 ddns: ddns update ok
Feb  7 19:05:01 rc_service: service 1229:notify_rc restart_letsencrypt
Feb  7 19:05:05 hour monitor: ntp sync fail, will retry after 120 sec
Feb  7 19:05:11 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  7 19:05:11 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  7 19:05:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... v6qElfg/3375327968: bad response
Feb  7 19:05:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... MxDvWJYcWjEGbreGDo: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/73r9I0PHZk7unVNKi-CBuBHHHf8E5tL4rNKev6qElfg/3375327968", "token": "9oVAs6TDWuGS8KwA9PrzZiBShMxDvWJYcWjEGbreGDo", "keyAuthorization": "9oVAs6TDWuGS8K
Feb  7 19:09:24 pppd[487]: Connection terminated.
Feb  7 19:09:24 pppd[487]: Modem hangup
Feb  7 19:09:25 WAN Connection: Fail to connect with some issues.
Feb  7 19:09:25 DualWAN: skip single wan wan_led_control - WANRED off
Feb  7 19:09:26 nat: apply redirect rules
Feb  7 19:09:34 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  7 19:09:34 pppd[487]: Connect: ppp0 <--> eth0
Feb  7 19:09:34 pppd[487]: PAP authentication succeeded
Feb  7 19:09:34 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  7 19:09:34 pppd[487]: local  IP address 14.134.8.18
Feb  7 19:09:34 pppd[487]: remote IP address 14.134.8.1
Feb  7 19:09:34 pppd[487]: primary   DNS address 118.118.118.11
Feb  7 19:09:34 pppd[487]: secondary DNS address 202.100.96.68
Feb  7 19:09:34 rc_service: ip-up 1405:notify_rc start_firewall
Feb  7 19:09:35 miniupnpd[928]: shutting down MiniUPnPd
Feb  7 19:09:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 19:09:35 wan: finish adding multi routes
Feb  7 19:09:35 ntp: start NTP update
Feb  7 19:09:35 rc_service: ip-up 1405:notify_rc stop_upnp
Feb  7 19:09:35 rc_service: waitting "start_firewall" via ip-up ...
Feb  7 19:09:35 miniupnpd[1443]: version 1.9 started
Feb  7 19:09:35 miniupnpd[1443]: HTTP listening on port 39756
Feb  7 19:09:35 miniupnpd[1443]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:09:36 rc_service: ip-up 1405:notify_rc start_upnp
Feb  7 19:09:36 rc_service: waitting "stop_upnp" via ip-up ...
Feb  7 19:09:36 miniupnpd[1443]: shutting down MiniUPnPd
Feb  7 19:09:37 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 19:09:37 ddns update: ez-ipupdate: starting...
Feb  7 19:09:37 miniupnpd[1446]: version 1.9 started
Feb  7 19:09:37 miniupnpd[1446]: HTTP listening on port 44498
Feb  7 19:09:37 miniupnpd[1446]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:09:39 WAN Connection: WAN was restored.
Feb  7 19:09:42 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  7 19:09:43 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 11:09:41 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  7 19:09:43 ddns update: retval= 0, ddns_return_code (,200)
Feb  7 19:09:43 ddns update: asusddns_update: 0
Feb  7 19:09:43 ddns: ddns update ok
Feb  7 19:09:53 rc_service: ip-up 1405:notify_rc start_firewall
Feb  7 19:09:54 miniupnpd[1446]: shutting down MiniUPnPd
Feb  7 19:09:54 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 19:09:54 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  7 19:09:54 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  7 19:09:54 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  7 19:09:54 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  7 19:09:55 miniupnpd[1542]: version 1.9 started
Feb  7 19:09:55 miniupnpd[1542]: HTTP listening on port 54874
Feb  7 19:09:55 miniupnpd[1542]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 19:10:01 rc_service: service 1565:notify_rc restart_letsencrypt
Feb  7 19:10:11 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 19:10:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... VF7nkIM/3375374659: bad response
Feb  7 19:10:40 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... h99k-79ARFCWA76X4s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/LmS4jCntmGe_8Rx7KIhv_54ni8utoiVvEy7IVF7nkIM/3375374659", "token": "t6-yxN2xu5Iiwl5To_vJt24A5h99k-79ARFCWA76X4s", "keyAuthorization": "t6-yxN2xu5Iiwl
Feb  7 19:11:26 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  7 19:15:01 rc_service: service 1763:notify_rc restart_letsencrypt
Feb  7 19:15:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 27XOwOM/3375424395: bad response
Feb  7 19:15:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... pN_4xcrEmlGsef0PrY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/KnfbDSizir0-QXYBFLxYLGXEvPoEttI8N0jr27XOwOM/3375424395", "token": "gjT-_YhVglJUxs4ZGnQBowhqrpN_4xcrEmlGsef0PrY", "keyAuthorization": "gjT-_YhVglJUxs
Feb  7 19:20:01 rc_service: service 1957:notify_rc restart_letsencrypt
Feb  7 19:20:42 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 0CfJ0hg/3375470525: bad response
Feb  7 19:20:42 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 1Zvppnh8-hgQFDI96c: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/edLLFpMybWoFZ8m4n_3zXW6-qsiKrdI4zKv00CfJ0hg/3375470525", "token": "K6xyCxqa4w8IZX5Qym5mrjLIY1Zvppnh8-hgQFDI96c", "keyAuthorization": "K6xyCxqa4w8IZX
Feb  7 19:25:01 rc_service: service 2131:notify_rc restart_letsencrypt
Feb  7 19:25:40 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... VtWftIw/3375515545: bad response
Feb  7 19:25:40 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... ZtoV4jR3KoH6EEZtb4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/BqtNSYWjy36HMyMlGE1o5rtp8gbgSo54HnCDVtWftIw/3375515545", "token": "0LRbCp3GmLPCcyLscMrS1X0K7ZtoV4jR3KoH6EEZtb4", "keyAuthorization": "0LRbCp3GmLPCcy
Feb  7 19:30:01 rc_service: service 2335:notify_rc restart_letsencrypt
Feb  7 19:30:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:30:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:35:01 rc_service: service 2522:notify_rc restart_letsencrypt
Feb  7 19:35:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:35:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:40:01 rc_service: service 2730:notify_rc restart_letsencrypt
Feb  7 19:40:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:40:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:45:01 rc_service: service 2906:notify_rc restart_letsencrypt
Feb  7 19:45:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:45:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:50:01 rc_service: service 3099:notify_rc restart_letsencrypt
Feb  7 19:50:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:50:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 19:55:01 rc_service: service 3299:notify_rc restart_letsencrypt
Feb  7 19:55:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 19:55:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:00:01 rc_service: service 3522:notify_rc restart_letsencrypt
Feb  7 20:00:26 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:00:26 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:05:01 rc_service: service 3723:notify_rc restart_letsencrypt
Feb  7 20:05:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... nJ8rQwE/3375900419: bad response
Feb  7 20:05:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... iHSdQouy9PDVnDgbjY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/vLiU6Kn-oz4eg0kjcCNXwThdEOyFM6W8zemGnJ8rQwE/3375900419", "token": "0wsSI3mYk6EfI6OD3dVxwYFfriHSdQouy9PDVnDgbjY", "keyAuthorization": "0wsSI3mYk6EfI6
Feb  7 20:10:01 rc_service: service 3933:notify_rc restart_letsencrypt
Feb  7 20:10:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:10:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:15:01 rc_service: service 4114:notify_rc restart_letsencrypt
Feb  7 20:15:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... x9XEfIo/3375992845: bad response
Feb  7 20:15:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... Y6oVugV2gWPfCHioVM: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/PAFEOOpQCI0Hy6T-r8kMoyTzAK93h6WUIrh7x9XEfIo/3375992845", "token": "m2-Mkvpcq-R_4VwR1MiDB_FRUY6oVugV2gWPfCHioVM", "keyAuthorization": "m2-Mkvpcq-R_4V
Feb  7 20:20:01 rc_service: service 4319:notify_rc restart_letsencrypt
Feb  7 20:20:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... WCUhwJY/3376041045: bad response
Feb  7 20:20:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... uHdBZcBR-gJgQJLvoY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/iN5WFvIm_ka-NtU2DDXz3MwQfWeDPwq56dILWCUhwJY/3376041045", "token": "4dkooKUhFTKSjOyBUpltxdYbfuHdBZcBR-gJgQJLvoY", "keyAuthorization": "4dkooKUhFTKSjO
Feb  7 20:25:01 rc_service: service 4531:notify_rc restart_letsencrypt
Feb  7 20:25:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... QxdRhFw/3376088779: bad response
Feb  7 20:25:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... WdMBmjYrbhgPDjOIHs: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/z7hAy5p6ADGuYnrXJby8f6xT8-HlKfLT9oq8QxdRhFw/3376088779", "token": "REZ04fmJnLCoGhOliu-61dX49WdMBmjYrbhgPDjOIHs", "keyAuthorization": "REZ04fmJnLCoGh
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:26:47 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 20:30:01 rc_service: service 4725:notify_rc restart_letsencrypt
Feb  7 20:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... fC0AsJA/3376133444: bad response
Feb  7 20:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... N-36LR6oyO9iIsiuvg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/qwTqKJ5ksgB2bU9iA1yeTcx970VQ_MXsFXtsfC0AsJA/3376133444", "token": "8qjJ0U8XoJmQkCQaDvPiCYX01N-36LR6oyO9iIsiuvg", "keyAuthorization": "8qjJ0U8XoJmQkC
Feb  7 20:35:01 rc_service: service 4910:notify_rc restart_letsencrypt
Feb  7 20:35:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:35:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:40:01 rc_service: service 5091:notify_rc restart_letsencrypt
Feb  7 20:40:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:40:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:45:01 rc_service: service 5282:notify_rc restart_letsencrypt
Feb  7 20:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:50:01 rc_service: service 5460:notify_rc restart_letsencrypt
Feb  7 20:50:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:50:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 20:55:01 rc_service: service 5650:notify_rc restart_letsencrypt
Feb  7 20:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 20:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:00:01 rc_service: service 5836:notify_rc restart_letsencrypt
Feb  7 21:00:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:00:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:05:01 rc_service: service 6039:notify_rc restart_letsencrypt
Feb  7 21:05:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:05:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:10:01 rc_service: service 6222:notify_rc restart_letsencrypt
Feb  7 21:10:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 6cs7imE/3376500311: bad response
Feb  7 21:10:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... -39_yrD0wMn2QC6YNc: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/SEJkba2KTqx0lEPethz8PwJXuvn0JRP-pji_6cs7imE/3376500311", "token": "vumoNpqWuaKUMwbJ49PCyTLDe-39_yrD0wMn2QC6YNc", "keyAuthorization": "vumoNpqWuaKUMw
Feb  7 21:15:01 rc_service: service 6404:notify_rc restart_letsencrypt
Feb  7 21:15:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:15:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:20:01 rc_service: service 6582:notify_rc restart_letsencrypt
Feb  7 21:20:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... fFfsu-k/3376567739: bad response
Feb  7 21:20:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... eevDhYtmmBFbIUTDD4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/H46dOXkaBwX_Epyoqik2AgHgb70uUAsI-uhVfFfsu-k/3376567739", "token": "GXiHbfSCB-C1t5qhVTeY7jabDeevDhYtmmBFbIUTDD4", "keyAuthorization": "GXiHbfSCB-C1t5
Feb  7 21:25:01 rc_service: service 6750:notify_rc restart_letsencrypt
Feb  7 21:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... HBnAhY0/3376602714: bad response
Feb  7 21:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... RgnODh6QEKEeDADeWY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/LB_v6C8NG7X9Foccpinhb6V1598K5fI5KlAlHBnAhY0/3376602714", "token": "jchSUI3-t7IxNRu1Oj-Ul8xTfRgnODh6QEKEeDADeWY", "keyAuthorization": "jchSUI3-t7IxNR
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:26:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 21:30:01 rc_service: service 6952:notify_rc restart_letsencrypt
Feb  7 21:30:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... Ga1-vYs/3376638209: bad response
Feb  7 21:30:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 6uqm5abBlAwNVn1nTQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/fKYDO7yQG7z7w7kFN_1GPS3nz3xzzh8KN5dpGa1-vYs/3376638209", "token": "ZfGlx8-NOXWy6F8fQFYlCAKrJ6uqm5abBlAwNVn1nTQ", "keyAuthorization": "ZfGlx8-NOXWy6F
Feb  7 21:35:01 rc_service: service 7156:notify_rc restart_letsencrypt
Feb  7 21:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... LNMOt5M/3376672847: bad response
Feb  7 21:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... tN-cI1mqzYStoVs3s0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/WBW1TXIcGGV4ctISYSoOofogY48oXCsmGy3ELNMOt5M/3376672847", "token": "WgSniVgEVPFtk0m1Zhs9EQfS3tN-cI1mqzYStoVs3s0", "keyAuthorization": "WgSniVgEVPFtk0
Feb  7 21:40:01 rc_service: service 7344:notify_rc restart_letsencrypt
Feb  7 21:40:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:40:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:45:01 rc_service: service 7525:notify_rc restart_letsencrypt
Feb  7 21:45:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:45:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:50:01 rc_service: service 7699:notify_rc restart_letsencrypt
Feb  7 21:50:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:50:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 21:55:01 rc_service: service 7879:notify_rc restart_letsencrypt
Feb  7 21:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 21:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 22:00:01 rc_service: service 8049:notify_rc restart_letsencrypt
Feb  7 22:00:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 22:00:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 22:05:01 rc_service: service 8221:notify_rc restart_letsencrypt
Feb  7 22:05:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 22:05:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 22:10:01 rc_service: service 8388:notify_rc restart_letsencrypt
Feb  7 22:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  7 22:10:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  7 22:15:01 rc_service: service 8556:notify_rc restart_letsencrypt
Feb  7 22:15:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... n4jORDU/3376947249: bad response
Feb  7 22:15:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... IwDsFOEx-qiop0Uo6k: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/0YJcZQU8EJfv1QvDqWn2TZk3Q_iweenFcCdSn4jORDU/3376947249", "token": "kzbD_kArREN1G-uC0MwadJuDMIwDsFOEx-qiop0Uo6k", "keyAuthorization": "kzbD_kArREN1G-
Feb  7 22:18:51 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  7 22:20:01 rc_service: service 8746:notify_rc restart_letsencrypt
Feb  7 22:20:44 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... otak5B8/3376979122: bad response
Feb  7 22:20:44 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... apVeAFMtSsc-ilOaMQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/_Y-13Ji7sLolSLutBpgs5SkzRo5UPhe2s93cotak5B8/3376979122", "token": "X_vm3oTtjj_ApcjVg5B3oBv0ZapVeAFMtSsc-ilOaMQ", "keyAuthorization": "X_vm3oTtjj_Apc
Feb  7 22:25:01 rc_service: service 8929:notify_rc restart_letsencrypt
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:26:55 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 22:27:06 roamast: wl1.1: add client [68:db:ca:db:43:b5] to monitor list
Feb  7 22:58:01 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  7 23:03:28 disk_monitor: Got SIGALRM...
Feb  7 23:22:06 WAN Connection: Fail to connect with some issues.
Feb  7 23:22:06 DualWAN: skip single wan wan_led_control - WANRED off
Feb  7 23:22:07 nat: apply redirect rules
Feb  7 23:22:08 pppd[487]: Connection terminated.
Feb  7 23:22:08 pppd[487]: Modem hangup
Feb  7 23:22:18 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  7 23:22:18 pppd[487]: Connect: ppp0 <--> eth0
Feb  7 23:22:18 pppd[487]: PAP authentication succeeded
Feb  7 23:22:18 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  7 23:22:18 pppd[487]: local  IP address 36.103.150.104
Feb  7 23:22:18 pppd[487]: remote IP address 36.103.148.1
Feb  7 23:22:18 pppd[487]: primary   DNS address 118.118.118.11
Feb  7 23:22:18 pppd[487]: secondary DNS address 202.100.96.68
Feb  7 23:22:18 rc_service: ip-up 10431:notify_rc start_firewall
Feb  7 23:22:19 wan: finish adding multi routes
Feb  7 23:22:19 rc_service: ip-up 10431:notify_rc stop_upnp
Feb  7 23:22:19 rc_service: waitting "start_firewall" via ip-up ...
Feb  7 23:22:19 ntp: start NTP update
Feb  7 23:22:20 miniupnpd[1542]: shutting down MiniUPnPd
Feb  7 23:22:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 23:22:21 miniupnpd[10473]: version 1.9 started
Feb  7 23:22:21 rc_service: ip-up 10431:notify_rc start_upnp
Feb  7 23:22:21 rc_service: waitting "stop_upnp" via ip-up ...
Feb  7 23:22:22 WAN Connection: WAN was restored.
Feb  7 23:22:23 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  7 23:22:23 ddns update: ez-ipupdate: starting...
Feb  7 23:22:24 miniupnpd[10479]: version 1.9 started
Feb  7 23:22:24 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  7 23:22:24 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 15:22:22 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  7 23:22:24 ddns update: retval= 0, ddns_return_code (,200)
Feb  7 23:22:24 ddns update: asusddns_update: 0
Feb  7 23:22:24 miniupnpd[10479]: HTTP listening on port 56655
Feb  7 23:22:24 miniupnpd[10479]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 23:22:25 ddns: ddns update ok
Feb  7 23:22:40 rc_service: ip-up 10431:notify_rc start_firewall
Feb  7 23:22:40 miniupnpd[10479]: shutting down MiniUPnPd
Feb  7 23:22:40 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  7 23:22:40 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  7 23:22:41 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  7 23:22:41 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  7 23:22:41 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  7 23:22:41 miniupnpd[10581]: version 1.9 started
Feb  7 23:22:41 miniupnpd[10581]: HTTP listening on port 46090
Feb  7 23:22:41 miniupnpd[10581]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  7 23:27:00 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 00:27:04 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:27:09 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 01:30:54 pppd[487]: Connection terminated.
Feb  8 01:30:54 pppd[487]: Modem hangup
Feb  8 01:30:55 WAN Connection: Fail to connect with some issues.
Feb  8 01:30:55 DualWAN: skip single wan wan_led_control - WANRED off
Feb  8 01:30:55 nat: apply redirect rules
Feb  8 01:31:04 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  8 01:31:04 pppd[487]: Connect: ppp0 <--> eth0
Feb  8 01:31:05 pppd[487]: PAP authentication succeeded
Feb  8 01:31:05 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  8 01:31:05 pppd[487]: local  IP address 222.75.136.117
Feb  8 01:31:05 pppd[487]: remote IP address 222.75.136.1
Feb  8 01:31:05 pppd[487]: primary   DNS address 118.118.118.11
Feb  8 01:31:05 pppd[487]: secondary DNS address 202.100.96.68
Feb  8 01:31:05 rc_service: ip-up 13992:notify_rc start_firewall
Feb  8 01:31:06 wan: finish adding multi routes
Feb  8 01:31:06 rc_service: ip-up 13992:notify_rc stop_upnp
Feb  8 01:31:06 rc_service: waitting "start_firewall" via ip-up ...
Feb  8 01:31:06 ntp: start NTP update
Feb  8 01:31:06 wan: finish adding multi routes
Feb  8 01:31:07 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 01:31:07 miniupnpd[14050]: version 1.9 started
Feb  8 01:31:08 rc_service: ip-up 13992:notify_rc start_upnp
Feb  8 01:31:08 rc_service: waitting "stop_upnp" via ip-up ...
Feb  8 01:31:08 miniupnpd[14050]: HTTP listening on port 33796
Feb  8 01:31:08 miniupnpd[14050]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 01:31:08 miniupnpd[14050]: shutting down MiniUPnPd
Feb  8 01:31:09 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 01:31:09 ddns update: ez-ipupdate: starting...
Feb  8 01:31:09 miniupnpd[14053]: version 1.9 started
Feb  8 01:31:09 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 01:31:11 WAN Connection: WAN was restored.
Feb  8 01:31:11 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 17:31:11 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 01:31:11 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 01:31:11 ddns update: asusddns_update: 0
Feb  8 01:31:12 ntp: start NTP update
Feb  8 01:31:12 ddns: ddns update ok
Feb  8 01:31:12 miniupnpd[14053]: HTTP listening on port 51743
Feb  8 01:31:12 miniupnpd[14053]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 01:31:25 rc_service: ip-up 13992:notify_rc start_firewall
Feb  8 01:31:26 miniupnpd[14053]: shutting down MiniUPnPd
Feb  8 01:31:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 01:31:26 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  8 01:31:26 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  8 01:31:26 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  8 01:31:26 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  8 01:31:27 miniupnpd[14166]: version 1.9 started
Feb  8 01:31:27 miniupnpd[14166]: HTTP listening on port 47802
Feb  8 01:31:27 miniupnpd[14166]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 02:27:13 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 03:27:17 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 04:27:22 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:15:06 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  8 05:25:17 WAN Connection: Fail to connect with some issues.
Feb  8 05:25:17 pppd[487]: Connection terminated.
Feb  8 05:25:17 DualWAN: skip single wan wan_led_control - WANRED off
Feb  8 05:25:17 pppd[487]: Modem hangup
Feb  8 05:25:18 nat: apply redirect rules
Feb  8 05:25:28 pppd[487]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  8 05:25:28 pppd[487]: Connect: ppp0 <--> eth0
Feb  8 05:25:28 pppd[487]: PAP authentication succeeded
Feb  8 05:25:28 pppd[487]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  8 05:25:28 pppd[487]: local  IP address 222.75.138.149
Feb  8 05:25:28 pppd[487]: remote IP address 222.75.136.1
Feb  8 05:25:28 pppd[487]: primary   DNS address 118.118.118.11
Feb  8 05:25:28 pppd[487]: secondary DNS address 202.100.96.68
Feb  8 05:25:28 rc_service: ip-up 19961:notify_rc start_firewall
Feb  8 05:25:29 wan: finish adding multi routes
Feb  8 05:25:29 rc_service: ip-up 19961:notify_rc stop_upnp
Feb  8 05:25:29 rc_service: waitting "start_firewall" via ip-up ...
Feb  8 05:25:29 ntp: start NTP update
Feb  8 05:25:30 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 05:25:30 miniupnpd[20002]: version 1.9 started
Feb  8 05:25:31 rc_service: ip-up 19961:notify_rc start_upnp
Feb  8 05:25:31 rc_service: waitting "stop_upnp" via ip-up ...
Feb  8 05:25:33 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 05:25:33 WAN Connection: WAN was restored.
Feb  8 05:25:33 ddns update: ez-ipupdate: starting...
Feb  8 05:25:33 miniupnpd[20008]: version 1.9 started
Feb  8 05:25:33 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 05:25:33 miniupnpd[20008]: HTTP listening on port 44435
Feb  8 05:25:33 miniupnpd[20008]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 05:25:34 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Wed, 07 Feb 2018 21:25:33 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 05:25:34 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 05:25:34 ddns update: asusddns_update: 0
Feb  8 05:25:35 ddns: ddns update ok
Feb  8 05:25:49 rc_service: ip-up 19961:notify_rc start_firewall
Feb  8 05:25:50 miniupnpd[20008]: shutting down MiniUPnPd
Feb  8 05:25:50 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 05:25:50 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  8 05:25:50 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  8 05:25:50 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  8 05:25:50 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  8 05:25:50 miniupnpd[20114]: version 1.9 started
Feb  8 05:25:51 miniupnpd[20114]: HTTP listening on port 49710
Feb  8 05:25:51 miniupnpd[20114]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:27:26 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 05:49:16 roamast: eth2: add client [bc:e6:3f:71:f3:b4] to monitor list
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 06:27:31 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 07:27:35 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 08:27:38 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 09:27:42 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 10:27:46 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 11:27:51 kernel: ERR... udb_ioctl_op_dc_get_ips_rt_event: hooknum for vp must be 1 or 3
Feb  8 12:05:56 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb 14 08:00:16 syslogd started: BusyBox v1.17.4
Feb 14 08:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-01-31 17:58:44 CST)
Feb 14 08:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Wed Jan 31 18:03:29 CST 2018
Feb 14 08:00:16 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
Feb 14 08:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
Feb 14 08:00:16 kernel: Machine: Northstar Prototype
Feb 14 08:00:16 kernel: Ignoring unrecognised tag 0x00000000
Feb 14 08:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
Feb 14 08:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 130048
Feb 14 08:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
Feb 14 08:00:16 kernel: Memory: 514912k/514912k available, 9376k reserved, 0K highmem
Feb 14 08:00:16 kernel: Virtual kernel memory layout:
Feb 14 08:00:16 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
Feb 14 08:00:16 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
Feb 14 08:00:16 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
Feb 14 08:00:16 kernel:     vmalloc : 0xa0800000 - 0xf0000000   (1272 MB)
Feb 14 08:00:16 kernel:     lowmem  : 0x80000000 - 0xa0000000   ( 512 MB)
Feb 14 08:00:16 kernel:     modules : 0x7f000000 - 0x80000000   (  16 MB)
Feb 14 08:00:16 kernel:       .init : 0x80008000 - 0x80050000   ( 288 kB)
Feb 14 08:00:16 kernel:       .text : 0x80050000 - 0x8040c000   (3824 kB)
Feb 14 08:00:16 kernel:       .data : 0x80426000 - 0x8044b2c0   ( 149 kB)
Feb 14 08:00:16 kernel: * Invalid signature of oopsbuf: ED-45-A1-28-4B-C0-F1-B8 (len 2967688019)
Feb 14 08:00:16 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06, pc=0x8000f9d8 lr=0x8000f9cc ignored.
Feb 14 08:00:16 kernel: Mount-cache hash table entries: 512
Feb 14 08:00:16 kernel: CPU1: Booted secondary processor
Feb 14 08:00:16 kernel: Found a Zentel/Esmt NAND flash:
Feb 14 08:00:16 kernel: Total size:  128MB
Feb 14 08:00:16 kernel: Block size:  128KB
Feb 14 08:00:16 kernel: Page Size:   2048B
Feb 14 08:00:16 kernel: OOB Size:    64B
Feb 14 08:00:16 kernel: Sector size: 512B
Feb 14 08:00:16 kernel: Spare size:  16B
Feb 14 08:00:16 kernel: ECC level:   8 (8-bit)
Feb 14 08:00:16 kernel: Device ID: 0xc8 0xd1 0x80 0x95 0x42 0x7f
Feb 14 08:00:16 kernel: ACP (Accelerator Coherence Port) enabled
Feb 14 08:00:16 kernel: bio: create slab <bio-0> at 0
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: no core
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:16 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 kernel: PCI: Fixing up bus 0
Feb 14 08:00:17 kernel: PCI: Fixing up bus 1
Feb 14 08:00:17 nat: apply redirect rules
Feb 14 08:00:17 kernel: VFS: Disk quotas dquot_6.5.2
Feb 14 08:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
Feb 14 08:00:17 kernel: pflash: found no supported devices
Feb 14 08:00:17 kernel: bcmsflash: found no supported devices
Feb 14 08:00:17 kernel: Boot partition size = 524288(0x80000)
Feb 14 08:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
Feb 14 08:00:17 kernel: nflash: squash filesystem with lzma found at block 29
Feb 14 08:00:17 kernel: Creating 4 MTD partitions on "nflash":
Feb 14 08:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
Feb 14 08:00:17 kernel: 0x000000080000-0x000000200000 : "nvram"
Feb 14 08:00:17 kernel: 0x000000200000-0x000004000000 : "linux"
Feb 14 08:00:17 kernel: 0x0000003bfe84-0x000004000000 : "rootfs"
Feb 14 08:00:17 kernel: === PPTP init ===
Feb 14 08:00:17 kernel: Registering the dns_resolver key type
Feb 14 08:00:17 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
Feb 14 08:00:17 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
Feb 14 08:00:17 kernel: Available 7 bytes at (off,len):
Feb 14 08:00:17 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
Feb 14 08:00:17 kernel: Options: NO_AUTOINCR,NO_READRDY,
Feb 14 08:00:17 kernel: Creating 1 MTD partitions on "brcmnand":
Feb 14 08:00:17 kernel: 0x000004000000-0x000008000000 : "brcmnand"
Feb 14 08:00:17 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Feb 14 08:00:17 kernel: rtl8365mb: module license 'Proprietary' taints kernel.
Feb 14 08:00:17 kernel: Disabling lock debugging due to kernel taint
Feb 14 08:00:17 kernel: rtl8365mbrtl8365mb initialized(0)(retry:1)
Feb 14 08:00:17 kernel: rtk port_phyEnableAll ok
Feb 14 08:00:17 kernel: register rtl8365mb done (link down at first)
Feb 14 08:00:17 kernel: et_module_init: passivemode set to 0x0
Feb 14 08:00:17 kernel: et_module_init: txworkq set to 0x0
Feb 14 08:00:17 kernel: et_module_init: et_txq_thresh set to 0xce4
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_timeout set to 0x3e8
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_framecnt set to 0x20
Feb 14 08:00:17 kernel: et_module_init: et_rxlazy_dyn_thresh set to 0
Feb 14 08:00:17 kernel: ERROR fwder_init: fwd_cpumap nvram not present, using default
Feb 14 08:00:17 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.164.303 (r666427)
Feb 14 08:00:17 kernel: dpsta_init: msglevel set to 0x1
Feb 14 08:00:17 kernel: dpsta_init: fail to get ifnames!
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0001:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7a started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth1]  MAC: b0:6e:bf:dc:62:70
Feb 14 08:00:17 kernel: PCI_PROBE:  bus 1, slot 0,vendor 14E4, device 4365(good PCI location)
Feb 14 08:00:17 kernel: PCI: Enabling device 0002:01:00.0 (0140 -> 0142)
Feb 14 08:00:17 kernel: dhd_attach(): thread:dhd_watchdog_thread:7e started
Feb 14 08:00:17 kernel: Dongle Host Driver, version 1.363.2 (r665954)
Feb 14 08:00:17 kernel: Compiled in drivers/net/wireless/bcmdhd on Jan 31 2018 at 18:04:52
Feb 14 08:00:17 kernel: Register interface [eth2]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:17 kernel: reset usb phy..
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X
Feb 14 08:00:17 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry
Feb 14 08:00:17 kernel: usb usb1: No SuperSpeed endpoint companion for config 1  interface 0 altsetting 0 ep 129: using minimum values
Feb 14 08:00:18 kernel: Register interface [wl1.1]  MAC: b0:6e:bf:dc:62:74
Feb 14 08:00:20 dnsmasq[360]: warning: no upstream servers configured
Feb 14 08:00:20 kernel: rtk port_phyEnableAll (on) ok
Feb 14 08:00:20 RT-AC88U: start httpd
Feb 14 08:00:20 syslog: Generating SSL certificate...
Feb 14 08:00:21 lldpd[403]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
Feb 14 08:00:21 lldpd[403]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
Feb 14 08:00:22 WAN Connection: Fail to connect with some issues.
Feb 14 08:00:23 NAT Tunnel: AAE Service is stopped
Feb 14 08:00:23 AAE: AAE Service is started
Feb 14 08:00:23 disk monitor: be idle
Feb 14 08:00:23 jffs2: valid logs(1)
Feb 14 08:00:23 hour monitor: daemon is starting
Feb 14 08:00:23 miniupnpd[447]: version 1.9 started
Feb 14 08:00:23 miniupnpd[447]: HTTP listening on port 44203
Feb 14 08:00:23 miniupnpd[447]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:23 Mastiff: init
Feb 14 08:00:24 wan: [wan0_hwaddr] == [B0:6E:BF:DC:62:70]
Feb 14 08:00:24 pppd[494]: pppd 2.4.7 started by adminyyg, uid 0
Feb 14 08:00:24 pppd[494]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb 14 08:00:24 pppd[494]: Connect: ppp0 <--> eth0
Feb 14 08:00:29 syslog: module ledtrig-usbdev not found in modules.dep
Feb 14 08:00:29 syslog: module leds-usb not found in modules.dep
Feb 14 08:00:29 kernel: SCSI subsystem initialized
Feb 14 08:00:31 pppd[494]: PAP authentication succeeded
Feb 14 08:00:31 pppd[494]: peer from calling number 00:22:93:66:E0:1F authorized
Feb 14 08:00:32 pppd[494]: local  IP address 14.135.47.158
Feb 14 08:00:32 pppd[494]: remote IP address 14.135.44.1
Feb 14 08:00:32 pppd[494]: primary   DNS address 118.118.118.11
Feb 14 08:00:32 pppd[494]: secondary DNS address 202.100.96.68
Feb 14 08:00:32 rc_service: ip-up 599:notify_rc start_firewall
Feb 14 08:00:33 miniupnpd[447]: shutting down MiniUPnPd
Feb 14 08:00:33 wan: finish adding multi routes
Feb 14 08:00:33 rc_service: ip-up 599:notify_rc stop_upnp
Feb 14 08:00:33 rc_service: waitting "start_firewall" via ip-up ...
Feb 14 08:00:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:34 kernel: nf_conntrack_rtsp v0.6.21 loading
Feb 14 08:00:34 kernel: nf_nat_rtsp v0.6.21 loading
Feb 14 08:00:34 miniupnpd[673]: version 1.9 started
Feb 14 08:00:34 miniupnpd[673]: HTTP listening on port 59552
Feb 14 08:00:34 miniupnpd[673]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:35 rc_service: ip-up 599:notify_rc start_upnp
Feb 14 08:00:35 rc_service: waitting "stop_upnp" via ip-up ...
Feb 14 08:00:35 miniupnpd[673]: shutting down MiniUPnPd
Feb 14 08:00:36 miniupnpd[676]: version 1.9 started
Feb 14 08:00:36 miniupnpd[676]: HTTP listening on port 34339
Feb 14 08:00:36 miniupnpd[676]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:36 rc_service: zcip 674:notify_rc start_firewall
Feb 14 08:00:36 zcip client: configured 169.254.72.55
Feb 14 08:00:37 miniupnpd[676]: shutting down MiniUPnPd
Feb 14 08:00:37 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb 14 08:00:37 WAN Connection: WAN was restored.
Feb 14 08:00:38 miniupnpd[700]: version 1.9 started
Feb 14 08:00:38 miniupnpd[700]: HTTP listening on port 42534
Feb 14 08:00:38 miniupnpd[700]: Listening for NAT-PMP/PCP traffic on port 5351
Feb 14 08:00:39 ntp: start NTP update
Feb  8 12:11:45 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 12:11:45 rc_service: ntp 634:notify_rc restart_upnp
Feb  8 12:11:45 miniupnpd[700]: shutting down MiniUPnPd
Feb  8 12:11:46 rc_service: ntp 634:notify_rc restart_diskmon
Feb  8 12:11:46 disk_monitor: Finish
Feb  8 12:11:46 miniupnpd[709]: version 1.9 started
Feb  8 12:11:46 miniupnpd[709]: HTTP listening on port 36592
Feb  8 12:11:46 miniupnpd[709]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 12:11:46 ddns update: ez-ipupdate: starting...
Feb  8 12:11:47 disk monitor: be idle
Feb  8 12:11:49 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 12:11:50 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  8 12:11:50 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 04:11:49 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 12:11:50 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 12:11:50 ddns update: asusddns_update: 0
Feb  8 12:11:50 ddns: ddns update ok
Feb  8 12:11:56 watchdog: start ddns.
Feb  8 12:11:56 rc_service: watchdog 385:notify_rc restart_ddns
Feb  8 12:11:56 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 12:11:57 ddns update: ez-ipupdate: starting...
Feb  8 12:11:57 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 12:11:57 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 04:11:56 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 12:11:57 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 12:11:57 ddns update: asusddns_update: 0
Feb  8 12:11:58 ddns: ddns update ok
Feb  8 12:11:59 kernel: SHN Release Version: 2.0.1 3529123_patch
Feb  8 12:11:59 kernel: UDB Core Version: 0.2.14 r3529123
Feb  8 12:12:00 kernel: sizeof forward pkt param = 192
Feb  8 12:12:05 rc_service: ip-up 599:notify_rc start_firewall
Feb  8 12:12:05 miniupnpd[709]: shutting down MiniUPnPd
Feb  8 12:12:05 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 12:12:05 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  8 12:12:05 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  8 12:12:06 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  8 12:12:06 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  8 12:12:06 miniupnpd[927]: version 1.9 started
Feb  8 12:12:06 miniupnpd[927]: HTTP listening on port 48445
Feb  8 12:12:06 miniupnpd[927]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 12:12:07 crond[367]: time disparity of 517211 minutes detected
Feb  8 12:13:28 hour monitor: ntp sync fail, will retry after 120 sec
Feb  8 12:15:01 rc_service: service 1274:notify_rc restart_letsencrypt
Feb  8 12:15:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... wHYEmJI/3383577670: bad response
Feb  8 12:15:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... NjCAX38P5FfuvZkc7M: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/OO44Vb-2J7fKMtjXV5BujFR3IkWDyGPGCwqQwHYEmJI/3383577670", "token": "X89Yhgh7l4WrRfj8D8Rc8R7NXNjCAX38P5FfuvZkc7M", "keyAuthorization": "X89Yhgh7l4WrRf
Feb  8 12:16:35 roamast: wl1.1: add client [78:88:6d:aa:cf:c8] to monitor list
Feb  8 12:20:01 rc_service: service 1493:notify_rc restart_letsencrypt
Feb  8 12:20:46 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... Z9d57DE/3383612929: bad response
Feb  8 12:20:46 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... TYQbB1HROrKm742OnU: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/kyNTsCQepj-Jj6Zx-XA2mjqBVGyf49PyNY4pZ9d57DE/3383612929", "token": "cHrgk8lrt3LDqQGyb50G-MXHgTYQbB1HROrKm742OnU", "keyAuthorization": "cHrgk8lrt3LDqQ
Feb  8 12:25:01 rc_service: service 1676:notify_rc restart_letsencrypt
Feb  8 12:25:43 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... ArdTsnk/3383649057: bad response
Feb  8 12:25:43 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... NGPpfoKv12WdM_xRnM: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/XUC7hyGZmBVdAq_7IgTRCEm07dooqsD3OsX5ArdTsnk/3383649057", "token": "SGiLa8WGGRqgVCPSeAO9pf7z8NGPpfoKv12WdM_xRnM", "keyAuthorization": "SGiLa8WGGRqgVC
Feb  8 12:30:01 rc_service: service 1888:notify_rc restart_letsencrypt
Feb  8 12:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... is1xOGM/3383684402: bad response
Feb  8 12:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... QqBXg8dvXIJ5ohqSaY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/J7f73FC_ZdwK8z23WQQ54FJKQ9Qe_9923HCZis1xOGM/3383684402", "token": "gJyzUhDEjwchdVbmUi5r7nKGXQqBXg8dvXIJ5ohqSaY", "keyAuthorization": "gJyzUhDEjwchdV
Feb  8 12:35:01 rc_service: service 2070:notify_rc restart_letsencrypt
Feb  8 12:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... L9XkODo/3383720390: bad response
Feb  8 12:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... w4U89eiK5ttp_zxbfg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/8OE9ZRIQSk9gHCeV4XHfB1WvcgtnOtwY6YIsL9XkODo/3383720390", "token": "w2wu9M4qcrLm816G1NpE6uDnew4U89eiK5ttp_zxbfg", "keyAuthorization": "w2wu9M4qcrLm81
Feb  8 12:40:01 rc_service: service 2250:notify_rc restart_letsencrypt
Feb  8 12:40:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 12:40:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 12:45:01 rc_service: service 2416:notify_rc restart_letsencrypt
Feb  8 12:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 12:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 12:50:01 rc_service: service 2586:notify_rc restart_letsencrypt
Feb  8 12:50:23 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 12:50:23 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 12:55:01 rc_service: service 2760:notify_rc restart_letsencrypt
Feb  8 12:55:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 12:55:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:00:01 rc_service: service 2949:notify_rc restart_letsencrypt
Feb  8 13:00:28 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:00:28 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:00:47 disk_monitor: Got SIGALRM...
Feb  8 13:05:01 rc_service: service 3136:notify_rc restart_letsencrypt
Feb  8 13:05:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:05:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:10:01 rc_service: service 3318:notify_rc restart_letsencrypt
Feb  8 13:10:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:15:01 rc_service: service 3499:notify_rc restart_letsencrypt
Feb  8 13:15:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:15:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:20:01 rc_service: service 3665:notify_rc restart_letsencrypt
Feb  8 13:20:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... AgYNbyI/3384071976: bad response
Feb  8 13:20:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... TRmViHQIUKylkwr58s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/OzkwOpnbd4QLa15eEGwvL8qQh-mwGs9Zo5Y9AgYNbyI/3384071976", "token": "KuJUuEXJC-DinxDYqSpraC_l_TRmViHQIUKylkwr58s", "keyAuthorization": "KuJUuEXJC-Dinx
Feb  8 13:25:01 rc_service: service 3874:notify_rc restart_letsencrypt
Feb  8 13:25:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... FTpxy3s/3384109591: bad response
Feb  8 13:25:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... OjSarNEfcotgTejHN0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/PB78BDPisYAGo0TSq69auD89fx7LcKQqXC59FTpxy3s/3384109591", "token": "T5_Bcz7MxvyFGRQYQmbvvcH0qOjSarNEfcotgTejHN0", "keyAuthorization": "T5_Bcz7MxvyFGR
Feb  8 13:30:01 rc_service: service 4061:notify_rc restart_letsencrypt
Feb  8 13:30:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... yjkHmYk/3384150409: bad response
Feb  8 13:30:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... KsHm_fJjP5q96axkVQ: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/JHfiBfiDC9tbCirV_MP8HpVanKpxFgrFKKSbyjkHmYk/3384150409", "token": "9w-OWYMk0xTvH3RjWwrDFKaK-KsHm_fJjP5q96axkVQ", "keyAuthorization": "9w-OWYMk0xTvH3
Feb  8 13:35:01 rc_service: service 4229:notify_rc restart_letsencrypt
Feb  8 13:35:34 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... wD30k-4/3384185149: bad response
Feb  8 13:35:34 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 6CptjbdiSExJ6jzxro: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/cvyLtS_4zj_GDbIOv4h8g17bSBkA6dIMYMj_wD30k-4/3384185149", "token": "2TKeOTZdPjyv4fO0GYvX89bY_6CptjbdiSExJ6jzxro", "keyAuthorization": "2TKeOTZdPjyv4f
Feb  8 13:40:01 rc_service: service 4398:notify_rc restart_letsencrypt
Feb  8 13:40:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... Im1MM8k/3384218650: bad response
Feb  8 13:40:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... n7ahawItEaleabUVVk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/h_misnPPv6AeKkyLgX2HcrW3-c2mp87P-cejIm1MM8k/3384218650", "token": "QyGrRhMZQmjY1jfXyn8R6JYUin7ahawItEaleabUVVk", "keyAuthorization": "QyGrRhMZQmjY1j
Feb  8 13:45:01 rc_service: service 4565:notify_rc restart_letsencrypt
Feb  8 13:45:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:45:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:50:01 rc_service: service 4771:notify_rc restart_letsencrypt
Feb  8 13:50:20 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:50:20 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 13:55:01 rc_service: service 4938:notify_rc restart_letsencrypt
Feb  8 13:55:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 13:55:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:00:01 rc_service: service 5148:notify_rc restart_letsencrypt
Feb  8 14:00:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:00:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:05:01 rc_service: service 5344:notify_rc restart_letsencrypt
Feb  8 14:05:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:05:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:10:01 rc_service: service 5521:notify_rc restart_letsencrypt
Feb  8 14:10:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:15:01 rc_service: service 5712:notify_rc restart_letsencrypt
Feb  8 14:15:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:15:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:20:01 rc_service: service 5888:notify_rc restart_letsencrypt
Feb  8 14:20:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... _o8oLUI/3384500451: bad response
Feb  8 14:20:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... _DnNDxqsX8psUC66HY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ycSeAgKWC7ZF9XOc3_kfr_Yr8HK2moalNYes_o8oLUI/3384500451", "token": "dp5-M1Vob6pZXkCoqC0nwYF82_DnNDxqsX8psUC66HY", "keyAuthorization": "dp5-M1Vob6pZXk
Feb  8 14:25:01 rc_service: service 6066:notify_rc restart_letsencrypt
Feb  8 14:25:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... D7jL3x0/3384533049: bad response
Feb  8 14:25:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... ZjQRngudND8bayf3RY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/xrINmHwr5FIgkvSD4e8pkwbUfWSrw6dpPAwjD7jL3x0/3384533049", "token": "DnkZp4UdkPlZd1eS3TNYExOORZjQRngudND8bayf3RY", "keyAuthorization": "DnkZp4UdkPlZd1
Feb  8 14:30:01 rc_service: service 6250:notify_rc restart_letsencrypt
Feb  8 14:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:35:01 rc_service: service 6417:notify_rc restart_letsencrypt
Feb  8 14:35:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... wyCAKJw/3384600291: bad response
Feb  8 14:35:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... MGAZ4YLFqyDJbc23RI: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/XNEL5NgGMDraxVq1EpfVu7zOPFMpoDSd9bhnwyCAKJw/3384600291", "token": "4BfTLjBk_xie21Aoe1kSzApp4MGAZ4YLFqyDJbc23RI", "keyAuthorization": "4BfTLjBk_xie21
Feb  8 14:40:01 rc_service: service 6585:notify_rc restart_letsencrypt
Feb  8 14:40:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... rfad_hs/3384632001: bad response
Feb  8 14:40:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... tqapuXa4z0NJmlFWXE: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/_HLfSx5GeeNMqnk0rml7bEMJPcAf7MiFxI_Vrfad_hs/3384632001", "token": "pCJwq0_v48ymEIC3ZCZc0pCwUtqapuXa4z0NJmlFWXE", "keyAuthorization": "pCJwq0_v48ymEI
Feb  8 14:45:01 rc_service: service 6770:notify_rc restart_letsencrypt
Feb  8 14:45:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 7TRYiWs/3384664577: bad response
Feb  8 14:45:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... Wbatp8uKTBkcDMQ3v0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/3E68s5jU1A0wKGjNqF-0FQH4aGQ4gqHtPBTb7TRYiWs/3384664577", "token": "AyvPk_zyMYrHQtz9Mex6C1afrWbatp8uKTBkcDMQ3v0", "keyAuthorization": "AyvPk_zyMYrHQt
Feb  8 14:50:01 rc_service: service 6940:notify_rc restart_letsencrypt
Feb  8 14:50:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:50:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 14:55:01 rc_service: service 7113:notify_rc restart_letsencrypt
Feb  8 14:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 14:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:00:01 rc_service: service 7307:notify_rc restart_letsencrypt
Feb  8 15:00:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:00:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:05:01 rc_service: service 7501:notify_rc restart_letsencrypt
Feb  8 15:05:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:05:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:10:01 rc_service: service 7693:notify_rc restart_letsencrypt
Feb  8 15:10:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:10:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:15:01 rc_service: service 7894:notify_rc restart_letsencrypt
Feb  8 15:15:23 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:15:23 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:20:01 rc_service: service 8062:notify_rc restart_letsencrypt
Feb  8 15:20:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... zf6af6E/3384911090: bad response
Feb  8 15:20:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 4tlULvLn-t8CGFUK8s: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ga3tbEnenmZ4ryVrr4qWvSiaTb4tNReRNcWXzf6af6E/3384911090", "token": "mVsadjvKcEgRqhlcuUB85ur054tlULvLn-t8CGFUK8s", "keyAuthorization": "mVsadjvKcEgRqh
Feb  8 15:25:01 rc_service: service 8230:notify_rc restart_letsencrypt
Feb  8 15:25:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:25:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:30:01 rc_service: service 8434:notify_rc restart_letsencrypt
Feb  8 15:30:44 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... -2yPV0E/3384978743: bad response
Feb  8 15:30:44 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... tHsyq9NTRyc-2RzwJA: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ipTnKhGoI_2Ew_pcj7qv6Djzi5R_tpp8B5tO-2yPV0E/3384978743", "token": "7hd0Uhff2crd5i9IZZXeDvNQ0tHsyq9NTRyc-2RzwJA", "keyAuthorization": "7hd0Uhff2crd5i
Feb  8 15:35:01 rc_service: service 8602:notify_rc restart_letsencrypt
Feb  8 15:35:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:35:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 15:40:01 rc_service: service 8769:notify_rc restart_letsencrypt
Feb  8 15:40:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... oDfa3mQ/3385040555: bad response
Feb  8 15:40:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... yuSLuoy1WerEqxMjM4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/mzAxq5cvTkrrWAiUKDMYZvRGMTB7xIEJpV9NoDfa3mQ/3385040555", "token": "Oq5W81hnIeUdl_5lzlOqoTsZhyuSLuoy1WerEqxMjM4", "keyAuthorization": "Oq5W81hnIeUdl_
Feb  8 15:45:01 rc_service: service 8956:notify_rc restart_letsencrypt
Feb  8 15:45:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 7Td4o3M/3385071899: bad response
Feb  8 15:45:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... umoVlAcZU3dNs1HKDA: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/mSj5vcLtElIuyp9sqmff-ZR9F2R6slsNmFMZ7Td4o3M/3385071899", "token": "1ExjRHZGHbHmySgVUsp2HtK20umoVlAcZU3dNs1HKDA", "keyAuthorization": "1ExjRHZGHbHmyS
Feb  8 15:50:01 rc_service: service 9124:notify_rc restart_letsencrypt
Feb  8 15:50:35 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... jkuVOCE/3385105213: bad response
Feb  8 15:50:35 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... dqNpggze6Z8eQ-Wsbg: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ywYd8GaxaepXGs3WP90_4BszkwN-3eInFG3PjkuVOCE/3385105213", "token": "FxBBuronfC9b9f7B1TvOopkTidqNpggze6Z8eQ-Wsbg", "keyAuthorization": "FxBBuronfC9b9f
Feb  8 15:55:01 rc_service: service 9292:notify_rc restart_letsencrypt
Feb  8 15:55:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 15:55:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:00:01 rc_service: service 9460:notify_rc restart_letsencrypt
Feb  8 16:00:24 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:00:24 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:05:01 rc_service: service 9642:notify_rc restart_letsencrypt
Feb  8 16:05:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:05:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:10:01 rc_service: service 9809:notify_rc restart_letsencrypt
Feb  8 16:10:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:10:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:15:01 rc_service: service 9980:notify_rc restart_letsencrypt
Feb  8 16:15:26 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:15:26 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:20:01 rc_service: service 10146:notify_rc restart_letsencrypt
Feb  8 16:20:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... Tpf4Q4k/3385317740: bad response
Feb  8 16:20:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... r3AozwaI47kEXZG_n0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/c-b-x0Y8EosGCYKyhg3ny4eaT24Tm7TFHsARTpf4Q4k/3385317740", "token": "lnizwvKdUurola9u97nPm4NVRr3AozwaI47kEXZG_n0", "keyAuthorization": "lnizwvKdUurola
Feb  8 16:23:10 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  8 16:25:01 rc_service: service 10322:notify_rc restart_letsencrypt
Feb  8 16:25:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:25:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:30:01 rc_service: service 10520:notify_rc restart_letsencrypt
Feb  8 16:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 16:35:01 rc_service: service 10705:notify_rc restart_letsencrypt
Feb  8 16:35:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... rQ6_O7k/3385414914: bad response
Feb  8 16:35:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... oL57f6yetm81imlZHc: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/nLXpjgoH6LTay-u2-OWajRhdTQOe_-vOxAkWrQ6_O7k/3385414914", "token": "Kpuf5rnq5MZw37Hb7RSGl6ZlPoL57f6yetm81imlZHc", "keyAuthorization": "Kpuf5rnq5MZw37
Feb  8 16:40:01 rc_service: service 10892:notify_rc restart_letsencrypt
Feb  8 16:40:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... UxzFWtQ/3385446715: bad response
Feb  8 16:40:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 6temxlAzp6r1vjbbxk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/2FTfSFGQCfl_THk8_vknbnw_ClylApfg0khwUxzFWtQ/3385446715", "token": "qvQHW6rEXwE54nPnOMnrG0IT16temxlAzp6r1vjbbxk", "keyAuthorization": "qvQHW6rEXwE54n
Feb  8 16:45:01 rc_service: service 11084:notify_rc restart_letsencrypt
Feb  8 16:45:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... RQvcj6I/3385479483: bad response
Feb  8 16:45:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... vKczlGkDoxK_Ho-Sj0: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/vAjkPuH3NTrbMHHD8UKvhOEFmExvvLGigshJRQvcj6I/3385479483", "token": "zn6rZ7UDgaZ2DQNUgPbpT5WI1vKczlGkDoxK_Ho-Sj0", "keyAuthorization": "zn6rZ7UDgaZ2DQ
Feb  8 16:46:20 roamast: wl1.1: add client [60:f1:89:f2:29:f1] to monitor list
Feb  8 16:50:01 rc_service: service 11271:notify_rc restart_letsencrypt
Feb  8 16:50:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... qE5kxyE/3385511430: bad response
Feb  8 16:50:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... Inl9V7SRdWoD75-Xa4: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/jt89gw563ar5VMDoK7QZV5FkyDLxTvHzpTAxqE5kxyE/3385511430", "token": "18W6rb5rnkbVhDQ4WtrxulMLWInl9V7SRdWoD75-Xa4", "keyAuthorization": "18W6rb5rnkbVhD
Feb  8 16:55:01 rc_service: service 11438:notify_rc restart_letsencrypt
Feb  8 16:55:39 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 16:55:39 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:00:01 rc_service: service 11647:notify_rc restart_letsencrypt
Feb  8 17:00:25 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:00:25 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:05:01 rc_service: service 11850:notify_rc restart_letsencrypt
Feb  8 17:05:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:05:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:10:01 rc_service: service 12035:notify_rc restart_letsencrypt
Feb  8 17:10:18 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:10:18 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:15:01 rc_service: service 12216:notify_rc restart_letsencrypt
Feb  8 17:15:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:15:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:20:01 rc_service: service 12395:notify_rc restart_letsencrypt
Feb  8 17:20:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:20:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:25:01 rc_service: service 12580:notify_rc restart_letsencrypt
Feb  8 17:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... ce_kImc/3385741748: bad response
Feb  8 17:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 2QMv9INpTHXE6Dv8bI: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/QZX03y264_Ig6Bnt0bWbnrqFYx5i8NEUZ1uCce_kImc/3385741748", "token": "LSnoMIyrax7QRHR427bWVqLYK2QMv9INpTHXE6Dv8bI", "keyAuthorization": "LSnoMIyrax7QRH
Feb  8 17:30:01 rc_service: service 12756:notify_rc restart_letsencrypt
Feb  8 17:30:17 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:30:17 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:35:01 rc_service: service 12944:notify_rc restart_letsencrypt
Feb  8 17:35:38 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... 0SBnPfY/3385803748: bad response
Feb  8 17:35:38 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... Qo7UZR3nTZsaRn5hio: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ZKW5PFaDa4fL2jKfGTDIN18uZqIT_XjxXSrJ0SBnPfY/3385803748", "token": "1lGwkM-EL8awiD31o0K6ZIwcqQo7UZR3nTZsaRn5hio", "keyAuthorization": "1lGwkM-EL8awiD
Feb  8 17:40:01 rc_service: service 13134:notify_rc restart_letsencrypt
Feb  8 17:40:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 17:40:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 17:45:01 rc_service: service 13301:notify_rc restart_letsencrypt
Feb  8 17:45:36 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... lK0t8JM/3385869175: bad response
Feb  8 17:45:36 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... CK3l5y7z-DWCPZZVg8: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/H4xujkY-MjzzBHvqSGghqn4OiAVlDB6xAZOPlK0t8JM/3385869175", "token": "mUTYzD6wrSkfx1nrgtcltghq1CK3l5y7z-DWCPZZVg8", "keyAuthorization": "mUTYzD6wrSkfx1
Feb  8 17:50:01 rc_service: service 13489:notify_rc restart_letsencrypt
Feb  8 17:50:30 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... kppocSY/3385903226: bad response
Feb  8 17:50:30 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... yhh6rezIN318KLk-7A: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/KRKA4AtJTvr0tT1JVnmc1KhxnyIM29Or7ERUkppocSY/3385903226", "token": "pxG3bNWzVLFNDlDqRF-naws5tyhh6rezIN318KLk-7A", "keyAuthorization": "pxG3bNWzVLFNDl
Feb  8 17:55:01 rc_service: service 13657:notify_rc restart_letsencrypt
Feb  8 17:55:31 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... _kZcLfo/3385937381: bad response
Feb  8 17:55:31 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 9JGDKJfHbRc_zLjfeY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/7-6zo4WpDhpxYJq1wpiA3YS57GOWb20cMY-q_kZcLfo/3385937381", "token": "U8L4ZbJJFTxNE90a1gzZVIfwv9JGDKJfHbRc_zLjfeY", "keyAuthorization": "U8L4ZbJJFTxNE9
Feb  8 18:00:01 rc_service: service 13826:notify_rc restart_letsencrypt
Feb  8 18:00:19 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:00:19 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:05:01 rc_service: service 14009:notify_rc restart_letsencrypt
Feb  8 18:05:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:05:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:10:01 rc_service: service 14183:notify_rc restart_letsencrypt
Feb  8 18:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:10:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:15:01 rc_service: service 14356:notify_rc restart_letsencrypt
Feb  8 18:15:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:15:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:20:01 rc_service: service 14578:notify_rc restart_letsencrypt
Feb  8 18:20:16 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:20:16 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:25:01 rc_service: service 14747:notify_rc restart_letsencrypt
Feb  8 18:25:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... CqTXSXU/3386138192: bad response
Feb  8 18:25:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... e5E63I6Gm7XVMgGGtU: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/F1WWtPm7f9bP4aEBvJ0sqCUiwVyNjXxbkhk7CqTXSXU/3386138192", "token": "4QfdVWHn3FwsC5hC6j8O1PP5Ee5E63I6Gm7XVMgGGtU", "keyAuthorization": "4QfdVWHn3FwsC5
Feb  8 18:30:01 rc_service: service 14926:notify_rc restart_letsencrypt
Feb  8 18:30:15 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:30:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:35:01 rc_service: service 15102:notify_rc restart_letsencrypt
Feb  8 18:35:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 18:35:14 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 18:40:01 rc_service: service 15289:notify_rc restart_letsencrypt
Feb  8 18:40:32 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... E96S2pY/3386232266: bad response
Feb  8 18:40:32 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... a5fIJRv6AGzJsh5Tfs: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5aljgoqi-hfcIuYhtqRAXfuq5jK7VNA5RkVDE96S2pY/3386232266", "token": "-vgKyVzyDjXkMpfap-NOUOlqLa5fIJRv6AGzJsh5Tfs", "keyAuthorization": "-vgKyVzyDjXkMp
Feb  8 18:45:01 rc_service: service 15476:notify_rc restart_letsencrypt
Feb  8 18:45:41 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... GYMfWIU/3386264278: bad response
Feb  8 18:45:41 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... l11dIlGf9KQCdWxFnk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/urBMb2MvrxuXipL-Cl0E1rYU6V9l-BdelBLgGYMfWIU/3386264278", "token": "mD0mBmTtdCxUxJlKJKEwBOkqkl11dIlGf9KQCdWxFnk", "keyAuthorization": "mD0mBmTtdCxUxJ
Feb  8 18:50:01 rc_service: service 15651:notify_rc restart_letsencrypt
Feb  8 18:50:33 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... V5rP2Aw/3386295384: bad response
Feb  8 18:50:33 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... fxs95cNjkntxp9-cnk: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/ycLXABEIXOSp0Ynjzo44l63ob-z5YK5tj741V5rP2Aw/3386295384", "token": "GHjF-BVldeXIlHMXoGD1Zf9ulfxs95cNjkntxp9-cnk", "keyAuthorization": "GHjF-BVldeXIlH
Feb  8 18:55:01 rc_service: service 15846:notify_rc restart_letsencrypt
Feb  8 18:55:37 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt ... w7zz5-E/3386325652: bad response
Feb  8 18:55:37 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "http-01", "status": "invalid", "error": { "type": "urn:acme:error:connection", "detail": "Fetching http://ldyyg.asuscomm.com/.well- ... 1LweDDnSc7TElHmODY: Timeout", "status": 400 }, "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/J99bdDjrfZVsZzVTgqqpvRjgHXPnhxGY5fqhw7zz5-E/3386325652", "token": "GBOQj_Mv4rZgDg8R_7fHjv-T71LweDDnSc7TElHmODY", "keyAuthorization": "GBOQj_Mv4rZgDg
Feb  8 19:00:01 rc_service: service 16020:notify_rc restart_letsencrypt
Feb  8 19:00:27 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 19:00:27 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 19:03:40 roamast: eth1: add client [c4:17:fe:05:57:74] to monitor list
Feb  8 19:05:01 rc_service: service 16215:notify_rc restart_letsencrypt
Feb  8 19:05:13 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 19:05:13 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)
Feb  8 19:08:18 rc_service: httpd 381:notify_rc restart_wan_if 0
Feb  8 19:08:18 pppd[494]: Connection terminated.
Feb  8 19:08:21 wan: [wan0_hwaddr] == [B0:6E:BF:DC:62:70]
Feb  8 19:08:21 pppd[16410]: pppd 2.4.7 started by adminyyg, uid 0
Feb  8 19:08:21 pppd[16410]: Connected to 00:22:93:66:e0:1f via interface eth0
Feb  8 19:08:21 pppd[16410]: Connect: ppp0 <--> eth0
Feb  8 19:08:21 pppd[16410]: PAP authentication succeeded
Feb  8 19:08:21 pppd[16410]: peer from calling number 00:22:93:66:E0:1F authorized
Feb  8 19:08:22 pppd[16410]: local  IP address 222.75.230.51
Feb  8 19:08:22 pppd[16410]: remote IP address 222.75.228.1
Feb  8 19:08:22 pppd[16410]: primary   DNS address 118.118.118.11
Feb  8 19:08:22 pppd[16410]: secondary DNS address 202.100.96.68
Feb  8 19:08:22 rc_service: ip-up 16415:notify_rc start_firewall
Feb  8 19:08:22 miniupnpd[927]: shutting down MiniUPnPd
Feb  8 19:08:22 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 19:08:22 wan: finish adding multi routes
Feb  8 19:08:22 rc_service: ip-up 16415:notify_rc stop_upnp
Feb  8 19:08:22 rc_service: waitting "start_firewall" via ip-up ...
Feb  8 19:08:22 ntp: start NTP update
Feb  8 19:08:23 miniupnpd[16453]: version 1.9 started
Feb  8 19:08:23 miniupnpd[16453]: HTTP listening on port 41115
Feb  8 19:08:23 miniupnpd[16453]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 19:08:23 rc_service: ip-up 16415:notify_rc start_upnp
Feb  8 19:08:23 rc_service: waitting "stop_upnp" via ip-up ...
Feb  8 19:08:23 miniupnpd[16453]: shutting down MiniUPnPd
Feb  8 19:08:24 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
Feb  8 19:08:24 miniupnpd[16457]: version 1.9 started
Feb  8 19:08:25 ddns update: ez-ipupdate: starting...
Feb  8 19:08:25 miniupnpd[16457]: HTTP listening on port 52833
Feb  8 19:08:25 miniupnpd[16457]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 19:08:25 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Feb  8 19:08:25 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 08 Feb 2018 11:08:24 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Feb  8 19:08:25 ddns update: retval= 0, ddns_return_code (,200)
Feb  8 19:08:25 ddns update: asusddns_update: 0
Feb  8 19:08:26 ddns: ddns update ok
Feb  8 19:08:32 rc_service: zcip 16474:notify_rc start_firewall
Feb  8 19:08:32 zcip client: configured 169.254.72.55
Feb  8 19:08:33 miniupnpd[16457]: shutting down MiniUPnPd
Feb  8 19:08:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 19:08:33 miniupnpd[16496]: version 1.9 started
Feb  8 19:08:34 miniupnpd[16496]: HTTP listening on port 45410
Feb  8 19:08:34 miniupnpd[16496]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 19:08:41 rc_service: ip-up 16415:notify_rc start_firewall
Feb  8 19:08:41 miniupnpd[16496]: shutting down MiniUPnPd
Feb  8 19:08:41 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
Feb  8 19:08:42 kernel: HTB: quantum of class 10001 is big. Consider r2q change.
Feb  8 19:08:42 kernel: HTB: quantum of class 20001 is big. Consider r2q change.
Feb  8 19:08:42 kernel: HTB: quantum of class 10009 is big. Consider r2q change.
Feb  8 19:08:42 kernel: HTB: quantum of class 20009 is big. Consider r2q change.
Feb  8 19:08:42 miniupnpd[16580]: version 1.9 started
Feb  8 19:08:42 miniupnpd[16580]: HTTP listening on port 39265
Feb  8 19:08:42 miniupnpd[16580]: Listening for NAT-PMP/PCP traffic on port 5351
Feb  8 19:10:02 rc_service: service 16637:notify_rc restart_letsencrypt
Feb  8 19:10:14 kernel: /usr/sbin/acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad HTTP: 429
Feb  8 19:10:15 kernel: /usr/sbin/acme-client: transfer buffer: [{ "type": "urn:acme:error:rateLimited", "detail": "Error creating new authz :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/", "status": 429 }] (189 bytes)

19

主题

55

回帖

246

积分

中级会员

Rank: 3Rank: 3

积分
246
 楼主| 发表于 2018-2-8 19:23:14 | 显示全部楼层
Master 发表于 2018-2-8 13:43
把你的系统日志和设定档传上来

设定档怎么传啊?

3

主题

28

回帖

73

积分

注册会员

Rank: 2

积分
73
发表于 2018-2-9 05:38:07 来自手机 | 显示全部楼层
这日志也够长的了,滑动半天,同是AC88U一直都不敢升级固件,买来就7743固件A6版

19

主题

55

回帖

246

积分

中级会员

Rank: 3Rank: 3

积分
246
 楼主| 发表于 2018-2-9 08:25:39 | 显示全部楼层
Bg2018 发表于 2018-2-9 05:38
这日志也够长的了,滑动半天,同是AC88U一直都不敢升级固件,买来就7743固件A6版 ...

如果稳定的话最好别升级。顺便问一下,A6版的5G信号如何,A5版5G信号不稳定,一会有,一会没有,挺烦人。

639

主题

6305

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
17269

RT-AC88URT-AX68U

发表于 2018-2-9 09:44:08 | 显示全部楼层
ldyyg 发表于 2018-2-8 19:23
设定档怎么传啊?

先在“恢复/导出/上传设置”页面,点“保存”按钮,然后将导出的设定档打包传上来就可以了。
看了你的系统日志,你有开双拨功能是不是?先关掉双拨,观察一下。
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

快速回复 返回列表 搜索 官方QQ群
×

秒后自动关闭

小黑屋|手机版|Archiver|华硕网络产品技术交流平台 ( 苏ICP备16010857号-1 )苏公网安备 32050502000499号

GMT+8, 2024-10-7 03:27 , Processed in 0.148438 second(s), 31 queries .

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表