Created
December 29, 2022 09:45
-
-
Save pazz/fd0a801d8cc64dfd8f21bef8ffabc12e to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Wed Dec 28 22:55:34 2022 daemon.err gl_monitor[3970]: Failed to connect to the switch. Use the "list" command to see which switches are available. | |
Wed Dec 28 22:55:34 2022 daemon.notice pppd[21681]: Modem hangup | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: VLAN 'eth0.2' link is down | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: Interface 'wan' has link connectivity loss | |
Wed Dec 28 22:55:34 2022 daemon.info pppd[21681]: Connect time 705.5 minutes. | |
Wed Dec 28 22:55:34 2022 daemon.info pppd[21681]: Sent 139661242 bytes, received 2987619434 bytes. | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: Network device 'pppoe-wan' link is down | |
Wed Dec 28 22:55:34 2022 daemon.debug pppd[21681]: Script /lib/netifd/ppp-down started (pid 2700) | |
Wed Dec 28 22:55:34 2022 daemon.notice pppd[21681]: Connection terminated. | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: VLAN 'eth0.2' link is up | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: Interface 'wan' has link connectivity | |
Wed Dec 28 22:55:34 2022 daemon.debug pppd[21681]: Send PPPOE Discovery V1T1 PADT session 0x3a5 length 28 | |
Wed Dec 28 22:55:34 2022 daemon.debug pppd[21681]: dst 14:7b:ac:b4:6d:e7 src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:55:34 2022 daemon.debug pppd[21681]: [host-uniq 00 00 54 b1] [AC-cookie d3 df 39 a1 96 14 89 3e a6 df 32 ae 0a e3 07 61] | |
Wed Dec 28 22:55:34 2022 daemon.err pppd[21681]: error sending pppoe packet: Network is down | |
Wed Dec 28 22:55:34 2022 daemon.info pppd[21681]: Sent PADT | |
Wed Dec 28 22:55:34 2022 daemon.debug pppd[21681]: Waiting for 1 child processes... | |
Wed Dec 28 22:55:34 2022 daemon.debug pppd[21681]: script /lib/netifd/ppp-down, pid 2700 | |
Wed Dec 28 22:55:34 2022 daemon.debug pppd[21681]: Script /lib/netifd/ppp-down finished (pid 2700), status = 0x1 | |
Wed Dec 28 22:55:34 2022 daemon.info pppd[21681]: Exit. | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: Interface 'wan' is now down | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: Interface 'wan' is disabled | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: Interface 'wan' is enabled | |
Wed Dec 28 22:55:34 2022 daemon.notice netifd: Interface 'wan' is setting up now | |
Wed Dec 28 22:55:35 2022 daemon.warn dnsmasq[11335]: no servers found in /tmp/resolv.conf.auto, will retry | |
Wed Dec 28 22:55:35 2022 daemon.err insmod: module is already loaded - slhc | |
Wed Dec 28 22:55:35 2022 daemon.err insmod: module is already loaded - ppp_generic | |
Wed Dec 28 22:55:35 2022 daemon.err insmod: module is already loaded - pppox | |
Wed Dec 28 22:55:35 2022 daemon.err insmod: module is already loaded - pppoe | |
Wed Dec 28 22:55:35 2022 daemon.info pppd[2826]: Plugin rp-pppoe.so loaded. | |
Wed Dec 28 22:55:35 2022 daemon.info pppd[2826]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7 | |
Wed Dec 28 22:55:35 2022 daemon.notice pppd[2826]: pppd 2.4.7 started by root, uid 0 | |
Wed Dec 28 22:55:36 2022 daemon.debug pppd[2826]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 | |
Wed Dec 28 22:55:36 2022 daemon.debug pppd[2826]: dst ff:ff:ff:ff:ff:ff src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:55:36 2022 daemon.debug pppd[2826]: [service-name] [host-uniq 00 00 0b 0a] | |
Wed Dec 28 22:55:41 2022 daemon.debug pppd[2826]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 | |
Wed Dec 28 22:55:41 2022 daemon.debug pppd[2826]: dst ff:ff:ff:ff:ff:ff src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:55:41 2022 daemon.debug pppd[2826]: [service-name] [host-uniq 00 00 0b 0a] | |
Wed Dec 28 22:55:46 2022 daemon.debug pppd[2826]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 | |
Wed Dec 28 22:55:46 2022 daemon.debug pppd[2826]: dst ff:ff:ff:ff:ff:ff src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:55:46 2022 daemon.debug pppd[2826]: [service-name] [host-uniq 00 00 0b 0a] | |
Wed Dec 28 22:55:51 2022 daemon.warn pppd[2826]: Timeout waiting for PADO packets | |
Wed Dec 28 22:55:51 2022 daemon.err pppd[2826]: Unable to complete PPPoE Discovery | |
Wed Dec 28 22:55:51 2022 daemon.info pppd[2826]: Exit. | |
Wed Dec 28 22:55:51 2022 daemon.notice netifd: Interface 'wan' is now down | |
Wed Dec 28 22:55:51 2022 daemon.notice netifd: Interface 'wan' is disabled | |
Wed Dec 28 22:55:51 2022 daemon.notice netifd: Interface 'wan' is enabled | |
Wed Dec 28 22:55:51 2022 daemon.notice netifd: Interface 'wan' is setting up now | |
Wed Dec 28 22:55:51 2022 daemon.err insmod: module is already loaded - slhc | |
Wed Dec 28 22:55:51 2022 daemon.err insmod: module is already loaded - ppp_generic | |
Wed Dec 28 22:55:51 2022 daemon.err insmod: module is already loaded - pppox | |
Wed Dec 28 22:55:51 2022 daemon.err insmod: module is already loaded - pppoe | |
Wed Dec 28 22:55:52 2022 daemon.info pppd[3633]: Plugin rp-pppoe.so loaded. | |
Wed Dec 28 22:55:52 2022 daemon.info pppd[3633]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7 | |
Wed Dec 28 22:55:52 2022 daemon.notice pppd[3633]: pppd 2.4.7 started by root, uid 0 | |
Wed Dec 28 22:55:52 2022 daemon.debug pppd[3633]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 | |
Wed Dec 28 22:55:52 2022 daemon.debug pppd[3633]: dst ff:ff:ff:ff:ff:ff src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:55:52 2022 daemon.debug pppd[3633]: [service-name] [host-uniq 00 00 0e 31] | |
Wed Dec 28 22:55:57 2022 daemon.debug pppd[3633]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 | |
Wed Dec 28 22:55:57 2022 daemon.debug pppd[3633]: dst ff:ff:ff:ff:ff:ff src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:55:57 2022 daemon.debug pppd[3633]: [service-name] [host-uniq 00 00 0e 31] | |
Wed Dec 28 22:56:02 2022 daemon.debug pppd[3633]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 | |
Wed Dec 28 22:56:02 2022 daemon.debug pppd[3633]: dst ff:ff:ff:ff:ff:ff src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:56:02 2022 daemon.debug pppd[3633]: [service-name] [host-uniq 00 00 0e 31] | |
Wed Dec 28 22:56:05 2022 daemon.debug pppd[3633]: Recv PPPOE Discovery V1T1 PADT session 0x3a5 length 0 | |
Wed Dec 28 22:56:05 2022 daemon.debug pppd[3633]: dst e4:95:6e:45:9e:ae src 14:7b:ac:b4:6d:e7 | |
Wed Dec 28 22:56:05 2022 daemon.debug pppd[3633]: | |
Wed Dec 28 22:56:07 2022 daemon.warn pppd[3633]: Timeout waiting for PADO packets | |
Wed Dec 28 22:56:07 2022 daemon.err pppd[3633]: Unable to complete PPPoE Discovery | |
Wed Dec 28 22:56:07 2022 daemon.info pppd[3633]: Exit. | |
Wed Dec 28 22:56:07 2022 daemon.notice netifd: Interface 'wan' is now down | |
Wed Dec 28 22:56:07 2022 daemon.notice netifd: Interface 'wan' is disabled | |
Wed Dec 28 22:56:07 2022 daemon.notice netifd: Interface 'wan' is enabled | |
Wed Dec 28 22:56:07 2022 daemon.notice netifd: Interface 'wan' is setting up now | |
Wed Dec 28 22:56:07 2022 daemon.err insmod: module is already loaded - slhc | |
Wed Dec 28 22:56:07 2022 daemon.err insmod: module is already loaded - ppp_generic | |
Wed Dec 28 22:56:07 2022 daemon.err insmod: module is already loaded - pppox | |
Wed Dec 28 22:56:07 2022 daemon.err insmod: module is already loaded - pppoe | |
Wed Dec 28 22:56:08 2022 daemon.info pppd[4182]: Plugin rp-pppoe.so loaded. | |
Wed Dec 28 22:56:08 2022 daemon.info pppd[4182]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7 | |
Wed Dec 28 22:56:08 2022 daemon.notice pppd[4182]: pppd 2.4.7 started by root, uid 0 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: dst ff:ff:ff:ff:ff:ff src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: [service-name] [host-uniq 00 00 10 56] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 48 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: dst e4:95:6e:45:9e:ae src 14:7b:ac:b4:6d:e7 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: [service-name] [AC-name acc-aln12.lv] [host-uniq 00 00 10 56] [AC-cookie d3 df 39 a1 96 14 89 3e a6 df 32 ae 0a e3 07 61] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: Send PPPOE Discovery V1T1 PADR session 0x0 length 32 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: dst 14:7b:ac:b4:6d:e7 src e4:95:6e:45:9e:ae | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: [service-name] [host-uniq 00 00 10 56] [AC-cookie d3 df 39 a1 96 14 89 3e a6 df 32 ae 0a e3 07 61] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: Recv PPPOE Discovery V1T1 PADS session 0x3a6 length 12 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: dst e4:95:6e:45:9e:ae src 14:7b:ac:b4:6d:e7 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: [service-name] [host-uniq 00 00 10 56] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: PADS: Service-Name: '' | |
Wed Dec 28 22:56:08 2022 daemon.info pppd[4182]: PPP session is 934 | |
Wed Dec 28 22:56:08 2022 daemon.warn pppd[4182]: Connected to 14:7b:ac:b4:6d:e7 via interface eth0.2 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: using channel 6 | |
Wed Dec 28 22:56:08 2022 kern.info kernel: [106273.978595] pppoe-wan: renamed from ppp0 | |
Wed Dec 28 22:56:08 2022 daemon.info pppd[4182]: Renamed interface ppp0 to pppoe-wan | |
Wed Dec 28 22:56:08 2022 daemon.info pppd[4182]: Using interface pppoe-wan | |
Wed Dec 28 22:56:08 2022 daemon.notice pppd[4182]: Connect: pppoe-wan <--> eth0.2 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0xddf484e7>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [LCP ConfReq id=0x28 <mru 1492> <auth chap MD5> <magic 0x183401d>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: sent [LCP ConfAck id=0x28 <mru 1492> <auth chap MD5> <magic 0x183401d>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0xddf484e7>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: sent [LCP EchoReq id=0x0 magic=0xddf484e7] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [CHAP Challenge id=0x1 <5842ac357ac1f2329de1e014ec0623e790da849d3f7437a74eec543b1e5333f5955fab8f229e423f012353eda87655b851595791>, name = "acc-aln12.lv"] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: sent [CHAP Response id=0x1 <e42d880b350a12abd474b507eb51877b>, name = "[email protected]"] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [LCP EchoRep id=0x0 magic=0x183401d] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [CHAP Success id=0x1 "BBEU47821804 115000000"] | |
Wed Dec 28 22:56:08 2022 daemon.info pppd[4182]: CHAP authentication succeeded: BBEU47821804 115000000 | |
Wed Dec 28 22:56:08 2022 daemon.notice pppd[4182]: CHAP authentication succeeded | |
Wed Dec 28 22:56:08 2022 daemon.notice pppd[4182]: peer from calling number 14:7B:AC:B4:6D:E7 authorized | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [IPCP ConfReq id=0x0 <addr 81.187.81.187>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: sent [IPCP ConfAck id=0x0 <addr 81.187.81.187>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [IPCP ConfNak id=0x1 <addr 81.187.229.141> <ms-dns1 217.169.20.21> <ms-dns2 217.169.20.20>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: sent [IPCP ConfReq id=0x2 <addr 81.187.229.141> <ms-dns1 217.169.20.21> <ms-dns2 217.169.20.20>] | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [IPCP ConfAck id=0x2 <addr 81.187.229.141> <ms-dns1 217.169.20.21> <ms-dns2 217.169.20.20>] | |
Wed Dec 28 22:56:08 2022 daemon.notice pppd[4182]: local IP address 81.187.229.141 | |
Wed Dec 28 22:56:08 2022 daemon.notice pppd[4182]: remote IP address 81.187.81.187 | |
Wed Dec 28 22:56:08 2022 daemon.notice pppd[4182]: primary DNS address 217.169.20.21 | |
Wed Dec 28 22:56:08 2022 daemon.notice pppd[4182]: secondary DNS address 217.169.20.20 | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: Script /lib/netifd/ppp-up started (pid 4220) | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: rcvd [IPV6CP ConfReq id=0x0 <addr fe80::0203:97ff:feba:0800>] | |
Wed Dec 28 22:56:08 2022 daemon.warn pppd[4182]: Unsupported protocol 'IPv6 Control Protocol' (0x8057) received | |
Wed Dec 28 22:56:08 2022 daemon.debug pppd[4182]: sent [LCP ProtRej id=0x2 80 57 01 00 00 0e 01 0a 02 03 97 ff fe ba 08 00] | |
Wed Dec 28 22:56:09 2022 daemon.notice netifd: Network device 'pppoe-wan' link is up | |
Wed Dec 28 22:56:09 2022 daemon.notice netifd: Interface 'wan' is now up | |
Wed Dec 28 22:56:09 2022 daemon.debug pppd[4182]: Script /lib/netifd/ppp-up finished (pid 4220), status = 0x1 | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: reading /tmp/resolv.conf.auto | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using local addresses only for domain test | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using local addresses only for domain onion | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using local addresses only for domain localhost | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using local addresses only for domain local | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using local addresses only for domain invalid | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using local addresses only for domain bind | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using standard nameservers for domain bbc.com | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using standard nameservers for domain bbci.co.uk | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using standard nameservers for domain bbc.co.uk | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using standard nameservers for domain mybbc-analytics.files.bbci.co.uk | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using standard nameservers for domain a1.api.bbc.co.uk | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using local addresses only for domain lan | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using nameserver 217.169.20.21#53 | |
Wed Dec 28 22:56:09 2022 daemon.info dnsmasq[11335]: using nameserver 217.169.20.20#53 | |
Wed Dec 28 22:56:15 2022 user.info mwan3rtmon[2697]: Detect rtchange event. | |
Wed Dec 28 22:56:16 2022 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment