|
单臂路由模式
断网后截取的最后一段的日志
- Wed Jun 2 22:02:06 2021 auth.err sshd[16923]: error: Could not get shadow information for NOUSER
- Wed Jun 2 22:02:06 2021 auth.info sshd[16923]: Failed password for invalid user huawei from 202.61.246.239 port 56138 ssh2
- Wed Jun 2 22:02:06 2021 auth.info sshd[16923]: Received disconnect from 202.61.246.239 port 56138:11: Normal Shutdown, Thank you for playing [preauth]
- Wed Jun 2 22:02:06 2021 auth.info sshd[16923]: Disconnected from invalid user huawei 202.61.246.239 port 56138 [preauth]
- Wed Jun 2 22:02:10 2021 daemon.info pppd[10838]: LCP terminated by peer
- Wed Jun 2 22:02:10 2021 daemon.info pppd[10838]: Connect time 1027.6 minutes.
- Wed Jun 2 22:02:10 2021 daemon.info pppd[10838]: Sent 3143048716 bytes, received 678474883 bytes.
- Wed Jun 2 22:02:10 2021 user.err wsdd2[6974]: error: wsdd-mcast-v4: wsd_send_soap_msg: send
- Wed Jun 2 22:02:10 2021 daemon.notice netifd: Network device 'pppoe-wan' link is down
- Wed Jun 2 22:02:10 2021 daemon.err odhcp6c[14622]: Failed to send RS (No buffer space available)
- Wed Jun 2 22:02:10 2021 daemon.notice netifd: Network alias 'pppoe-wan' link is down
- Wed Jun 2 22:02:10 2021 daemon.notice netifd: Interface 'wan_6' has link connectivity loss
- Wed Jun 2 22:02:10 2021 daemon.err odhcp6c[14622]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
- Wed Jun 2 22:02:10 2021 daemon.notice netifd: Interface 'wan' has lost the connection
- Wed Jun 2 22:02:10 2021 daemon.notice netifd: wan_6 (14622): Command failed: Permission denied
- Wed Jun 2 22:02:10 2021 daemon.err odhcp6c[14622]: Failed to send DHCPV6 message to ff02::1:2 (Permission denied)
- Wed Jun 2 22:02:10 2021 daemon.notice netifd: Interface 'wan_6' is now down
- Wed Jun 2 22:02:10 2021 daemon.notice netifd: Interface 'wan_6' is disabled
- Wed Jun 2 22:02:10 2021 daemon.info avahi-daemon[3248]: Withdrawing address record for 240e:3a1:ea3:7c80::1 on br-lan.
- Wed Jun 2 22:02:11 2021 user.notice ddns-scripts[11913]: myddns_ipv4: PID '11913' terminated by 'SIGTERM' at 2021-06-02 22:02
- Wed Jun 2 22:02:13 2021 daemon.notice pppd[10838]: Connection terminated.
- Wed Jun 2 22:02:13 2021 daemon.info pppd[10838]: Connect time 1027.6 minutes.
- Wed Jun 2 22:02:13 2021 daemon.info pppd[10838]: Sent 3143048716 bytes, received 678475067 bytes.
- Wed Jun 2 22:02:13 2021 daemon.info pppd[10838]: Sent PADT
- Wed Jun 2 22:02:13 2021 daemon.notice pppd[10838]: Modem hangup
- Wed Jun 2 22:02:13 2021 daemon.info pppd[10838]: Exit.
- Wed Jun 2 22:02:13 2021 daemon.notice netifd: Interface 'wan' is now down
- Wed Jun 2 22:02:13 2021 daemon.info avahi-daemon[3248]: Interface eth0.100.IPv6 no longer relevant for mDNS.
- Wed Jun 2 22:02:13 2021 daemon.info avahi-daemon[3248]: Leaving mDNS multicast group on interface eth0.100.IPv6 with address fe80::fe7c:2ff:fe4c:4f44.
- Wed Jun 2 22:02:13 2021 daemon.info avahi-daemon[3248]: Withdrawing address record for fe80::fe7c:2ff:fe4c:4f44 on eth0.100.
- Wed Jun 2 22:02:13 2021 user.err wsdd2[6974]: error: wsdd-mcast-v4: wsd_send_soap_msg: send
- Wed Jun 2 22:02:14 2021 daemon.notice netifd: Interface 'wan' is disabled
- Wed Jun 2 22:02:14 2021 daemon.notice netifd: Interface 'wan' is enabled
- Wed Jun 2 22:02:14 2021 daemon.notice netifd: Interface 'wan' is setting up now
- Wed Jun 2 22:02:14 2021 daemon.info pppd[17497]: Plugin rp-pppoe.so loaded.
- Wed Jun 2 22:02:14 2021 daemon.info pppd[17497]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: pppd 2.4.8 started by root, uid 0
- Wed Jun 2 22:02:14 2021 daemon.info pppd[17497]: PPP session is 49505
- Wed Jun 2 22:02:14 2021 daemon.warn pppd[17497]: Connected to cc:1a:fa:e8:40:a9 via interface eth0.100
- Wed Jun 2 22:02:14 2021 kern.info kernel: [173046.296792] pppoe-wan: renamed from ppp0
- Wed Jun 2 22:02:14 2021 daemon.info pppd[17497]: Renamed interface ppp0 to pppoe-wan
- Wed Jun 2 22:02:14 2021 daemon.info pppd[17497]: Using interface pppoe-wan
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: Connect: pppoe-wan <--> eth0.100
- Wed Jun 2 22:02:14 2021 daemon.info pppd[17497]: syncppp not active
- Wed Jun 2 22:02:14 2021 daemon.info pppd[17497]: CHAP authentication succeeded: Authentication Successful,Welcome!
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: CHAP authentication succeeded
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: peer from calling number CC:1A:FA:E8:40:A9 authorized
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: local IP address 222.95.66.57
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: remote IP address 222.95.66.1
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: primary DNS address 218.2.2.2
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: secondary DNS address 218.4.4.4
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: local LL address fe80::fe7c:0261:eb4c:4f44
- Wed Jun 2 22:02:14 2021 user.err wsdd2[6974]: error: wsdd-mcast-v4: wsd_send_soap_msg: send
- Wed Jun 2 22:02:14 2021 daemon.notice pppd[17497]: remote LL address fe80::ce1a:faff:fee8:40a9
- Wed Jun 2 22:02:14 2021 daemon.notice netifd: Network device 'pppoe-wan' link is up
- Wed Jun 2 22:02:14 2021 daemon.notice netifd: Interface 'wan' is now up
- Wed Jun 2 22:02:15 2021 daemon.info avahi-daemon[3248]: Joining mDNS multicast group on interface eth0.100.IPv6 with address fe80::fe7c:2ff:fe4c:4f44.
- Wed Jun 2 22:02:15 2021 daemon.info avahi-daemon[3248]: New relevant interface eth0.100.IPv6 for mDNS.
- Wed Jun 2 22:02:15 2021 daemon.info avahi-daemon[3248]: Registering new address record for fe80::fe7c:2ff:fe4c:4f44 on eth0.100.*.
- Wed Jun 2 22:02:25 2021 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
- Wed Jun 2 22:02:26 2021 cron.err crond[17949]: crond (busybox 1.31.1) started, log level 5
- Wed Jun 2 22:02:26 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Jun 2 22:02:26 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Jun 2 22:02:26 2021 daemon.info dnsmasq[18039]: Connected to system UBus
- Wed Jun 2 22:02:26 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Jun 2 22:02:26 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Jun 2 22:02:27 2021 daemon.info dnsmasq[18181]: Connected to system UBus
- Wed Jun 2 22:02:27 2021 user.notice firewall: Reloading firewall due to ifupdate of wan (pppoe-wan)
- Wed Jun 2 22:02:27 2021 user.notice ddns-scripts[18300]: myddns_ipv4: PID '18300' started at 2021-06-02 22:02
- Wed Jun 2 22:02:28 2021 cron.err crond[18799]: crond (busybox 1.31.1) started, log level 5
- Wed Jun 2 22:02:29 2021 daemon.info dnsmasq[19574]: Connected to system UBus
- Wed Jun 2 22:03:14 2021 daemon.notice netifd: Network alias 'pppoe-wan' link is up
- Wed Jun 2 22:03:14 2021 daemon.notice netifd: Interface 'wan_6' is enabled
- Wed Jun 2 22:03:14 2021 daemon.notice netifd: Interface 'wan_6' has link connectivity
- Wed Jun 2 22:03:14 2021 daemon.notice netifd: Interface 'wan_6' is setting up now
- Wed Jun 2 22:03:18 2021 daemon.info avahi-daemon[3248]: Registering new address record for 240e:3a1:e82:7e30::1 on br-lan.*.
- Wed Jun 2 22:03:18 2021 daemon.notice netifd: Interface 'wan_6' is now up
- Wed Jun 2 22:03:29 2021 user.notice firewall: Reloading firewall due to ifup of wan_6 (pppoe-wan)
- Wed Jun 2 22:03:29 2021 kern.err kernel: [173121.467067] bpfilter: read fail -512
- Wed Jun 2 22:03:29 2021 kern.err kernel: [173121.467445] bpfilter: write fail -32
- Wed Jun 2 22:03:29 2021 kern.info kernel: [173121.470272] bpfilter: Loaded bpfilter_umh pid 21675
- Wed Jun 2 22:03:29 2021 user.warn kernel: [173121.470822] Started bpfilter
- Wed Jun 2 22:03:29 2021 cron.err crond[21744]: crond (busybox 1.31.1) started, log level 5
- Wed Jun 2 22:03:30 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Jun 2 22:03:30 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Jun 2 22:03:30 2021 daemon.info dnsmasq[21830]: Connected to system UBus
- Wed Jun 2 22:03:30 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Jun 2 22:03:30 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Jun 2 22:03:31 2021 daemon.info dnsmasq[21974]: Connected to system UBus
复制代码
最近几天被断网烦死。。。
|
|