Отключил ADSL2+, перезагрузил модем.
Код:
Jan 1 00:00:12 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:12 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:12 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:12 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3
Jan 1 00:00:12 user warn kernel: Config Internal PHY Through MDIO
Jan 1 00:00:12 user info kernel: BCM63xx_ENET: 100 MB Full-Duplex (auto-neg)
Jan 1 00:00:12 user warn kernel: eth0: MAC Address: 00:19:5B:C0:A9:1F
Jan 1 00:00:12 user crit kernel: eth0 Link UP.
Jan 1 00:00:12 user warn kernel: BcmAdsl_Initialize=0xC00673B8, g_pFnNotifyCallback=0xC007E4E4
Jan 1 00:00:12 user warn kernel: pSdramPHY=0xA07FFFF8, 0x1B7768 0xDEADBEEF
Jan 1 00:00:12 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA07FA744
Jan 1 00:00:12 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:12 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:12 user warn kernel: ip_conntrack version 2.1 (61 buckets, 0 max) - 368 bytes per conntrack
Jan 1 00:00:12 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:12 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:12 user warn kernel: ip_conntrack_h323: init
Jan 1 00:00:12 user warn kernel: ip_nat_h323: initialize the module!
Jan 1 00:00:12 user crit kernel: ADSL G.994 training
Jan 1 00:00:12 user crit kernel: ADSL G.992 started
Jan 1 00:00:12 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:12 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:12 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:12 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:12 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:12 user debug syslog: bftpd
Jan 1 00:00:12 user debug syslog: tftpd
Jan 1 00:00:12 user debug syslog: kill -16 199
Jan 1 00:00:13 user debug syslog: pppd
Jan 1 00:00:13 user debug syslog: ifconfig nas_8_35 mtu 1492
Jan 1 00:00:14 daemon notice pppd[249]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:17 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:17 user crit kernel: ADSL link up, interleaved, us=1184, ds=12448
Jan 1 00:00:17 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:18 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:19 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:00:19 daemon crit pppd[249]: PPP server detected.
Jan 1 00:00:22 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:00:22 daemon crit pppd[249]: PPP server detected.
Jan 1 00:00:22 daemon crit pppd[249]: PPP session established.
Jan 1 00:00:23 daemon crit pppd[249]: PPP LCP UP.
Jan 1 00:00:53 daemon err pppd[249]: User name and password authentication failed.
Jan 1 00:00:56 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:00:56 daemon crit pppd[249]: PPP server detected.
Jan 1 00:00:59 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:00:59 daemon crit pppd[249]: PPP server detected.
Jan 1 00:00:59 daemon crit pppd[249]: PPP session established.
Jan 1 00:01:12 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:01:12 daemon crit pppd[249]: PPP server detected.
Jan 1 00:01:15 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:01:15 daemon crit pppd[249]: PPP server detected.
Jan 1 00:01:15 daemon crit pppd[249]: PPP session established.
Jan 1 00:01:30 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:01:30 daemon crit pppd[249]: PPP server detected.
Jan 1 00:01:33 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:01:33 daemon crit pppd[249]: PPP server detected.
Jan 1 00:01:33 daemon crit pppd[249]: PPP session established.
Jan 1 00:01:45 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:01:45 daemon crit pppd[249]: PPP server detected.
Jan 1 00:01:48 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:01:48 daemon crit pppd[249]: PPP server detected.
Jan 1 00:01:51 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:01:51 daemon crit pppd[249]: PPP session established.
Jan 1 00:02:03 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:02:03 daemon crit pppd[249]: PPP server detected.
Jan 1 00:02:03 daemon crit pppd[249]: PPP session established.
Jan 1 00:02:15 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:02:16 daemon crit pppd[249]: PPP server detected.
Jan 1 00:02:16 daemon crit pppd[249]: PPP session established.
Jan 1 00:02:28 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:02:28 daemon crit pppd[249]: PPP server detected.
Jan 1 00:02:28 daemon crit pppd[249]: PPP session established.
Jan 1 00:02:40 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:02:40 daemon crit pppd[249]: PPP session established.
Jan 1 00:02:52 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:02:52 daemon crit pppd[249]: PPP server detected.
Jan 1 00:02:55 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:02:55 daemon crit pppd[249]: PPP server detected.
Jan 1 00:02:55 daemon crit pppd[249]: PPP session established.
Jan 1 00:03:07 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:03:07 daemon crit pppd[249]: PPP server detected.
Jan 1 00:03:07 daemon crit pppd[249]: PPP session established.
Jan 1 00:03:19 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:03:19 daemon crit pppd[249]: PPP server detected.
Jan 1 00:03:19 daemon crit pppd[249]: PPP session established.
Jan 1 00:03:31 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:03:31 daemon crit pppd[249]: PPP server detected.
Jan 1 00:03:34 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:03:35 daemon crit pppd[249]: PPP server detected.
Jan 1 00:03:35 daemon crit pppd[249]: PPP session established.
Jan 1 00:03:47 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:03:47 daemon crit pppd[249]: PPP server detected.
Jan 1 00:03:50 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:03:50 daemon crit pppd[249]: PPP server detected.
Jan 1 00:03:50 daemon crit pppd[249]: PPP session established.
Jan 1 00:04:02 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:04:02 daemon crit pppd[249]: PPP server detected.
Jan 1 00:04:05 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:04:05 daemon crit pppd[249]: PPP server detected.
Jan 1 00:04:05 daemon crit pppd[249]: PPP session established.
Jan 1 00:04:17 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:04:17 daemon crit pppd[249]: PPP server detected.
Код:
Mode: G.DMT
Type: Interleave
Line Coding: Trellis On
Status: No Defect
Link Power State: L0
Downstream Upstream
SNR Margin (dB): 9.1 7.0
Attenuation (dB): 16.0 9.5
Output Power (dBm): 12.2 19.8
Attainable Rate (Kbps): 12416 1340
Rate (Kbps): 12384 1152
K (number of bytes in DMT frame): 388 37
R (number of check bytes in RS code word): 0 0
S (RS code word size in DMT frame): 0.5 1
D (interleaver depth): 2 1
Delay (msec): 0 0
Super Frames: 12684 12682
Super Frame Errors: 1 0
RS Words: 1725150 0
RS Correctable Errors: 0 0
RS Uncorrectable Errors: 0 N/A
HEC Errors: 1 0
OCD Errors: 0 0
LCD Errors: 0 0
Total Cells: 6298956 0
Data Cells: 9000 0
Bit Errors: 0 0
Total ES: 1 0
Total SES: 0 0
Total UAS: 9 0
Перезагрузил еще раз - подключение прошло успешно.
Код:
Jan 1 00:00:12 user info kernel: PPP generic driver version 2.4.2
Jan 1 00:00:12 user info kernel: NET: Registered protocol family 24
Jan 1 00:00:12 user warn kernel: Using noop io scheduler
Jan 1 00:00:12 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 00:00:12 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 00:00:12 user warn kernel: bcm963xx_serial driver v2.0
Jan 1 00:00:12 user info kernel: NET: Registered protocol family 2
Jan 1 00:00:12 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
Jan 1 00:00:12 user info kernel: TCP: Hash tables configured (established 512 bind 1024)
Jan 1 00:00:12 user info kernel: NET: Registered protocol family 1
Jan 1 00:00:12 user info kernel: NET: Registered protocol family 17
Jan 1 00:00:12 user notice kernel: Ebtables v2.0 registered
Jan 1 00:00:12 user info kernel: NET: Registered protocol family 8
Jan 1 00:00:12 user info kernel: NET: Registered protocol family 20
Jan 1 00:00:12 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:12 user info kernel: Freeing unused kernel memory: 64k freed
Jan 1 00:00:12 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 00:00:12 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 00:00:12 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:12 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:12 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:12 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3
Jan 1 00:00:12 user warn kernel: Config Internal PHY Through MDIO
Jan 1 00:00:12 user info kernel: BCM63xx_ENET: 100 MB Full-Duplex (auto-neg)
Jan 1 00:00:12 user warn kernel: eth0: MAC Address: 00:19:5B:C0:A9:1F
Jan 1 00:00:12 user crit kernel: eth0 Link UP.
Jan 1 00:00:12 user warn kernel: BcmAdsl_Initialize=0xC00673B8, g_pFnNotifyCallback=0xC007E4E4
Jan 1 00:00:12 user warn kernel: pSdramPHY=0xA07FFFF8, 0x1B7768 0xDEADBEEF
Jan 1 00:00:12 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA07FA744
Jan 1 00:00:12 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:12 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:12 user warn kernel: ip_conntrack version 2.1 (61 buckets, 0 max) - 368 bytes per conntrack
Jan 1 00:00:12 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:12 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:12 user warn kernel: ip_conntrack_h323: init
Jan 1 00:00:12 user warn kernel: ip_nat_h323: initialize the module!
Jan 1 00:00:12 user crit kernel: ADSL G.994 training
Jan 1 00:00:12 user crit kernel: ADSL G.992 started
Jan 1 00:00:12 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:12 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:12 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:12 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:12 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:12 user debug syslog: tftpd
Jan 1 00:00:12 user debug syslog: kill -16 201
Jan 1 00:00:13 user debug syslog: pppd
Jan 1 00:00:14 user debug syslog: ifconfig nas_8_35 mtu 1492
Jan 1 00:00:14 daemon notice pppd[249]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:17 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:17 user crit kernel: ADSL link up, interleaved, us=1152, ds=12384
Jan 1 00:00:17 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:18 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:19 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:00:19 daemon crit pppd[249]: PPP server detected.
Jan 1 00:00:22 daemon notice pppd[249]: PPP: Start to connect ...
Jan 1 00:00:22 daemon crit pppd[249]: PPP server detected.
Jan 1 00:00:22 daemon crit pppd[249]: PPP session established.
Jan 1 00:00:23 daemon crit pppd[249]: PPP LCP UP.
Jan 1 00:00:23 daemon crit pppd[249]: Received valid IP address from server. Connection UP.
Jan 1 00:00:24 user debug syslog: route add default gw 85.173.64.1 2>/dev/null
Jan 1 00:00:24 user debug syslog: iptables -A FORWARD -o ppp_8_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:24 user debug syslog: iptables -A FORWARD -i ppp_8_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:24 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:24 user debug syslog: echo "512" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:24 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:24 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_8_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:24 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_8_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:24 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 83.239.131.8 2>/dev/null
Jan 1 00:00:24 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 83.239.131.8
Jan 1 00:00:24 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:24 user debug syslog: upnp -L br0 -W ppp_8_35_1 -D
Jan 1 00:00:24 user notice dnsprobe[527]: dnsprobe started!
Jan 1 00:00:25 user debug syslog: iptables -t filter -I OUTPUT -o ppp_8_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:00:26 user debug syslog: iptables -D INPUT -i ppp_8_35_1 -j DROP
Jan 1 00:00:26 user debug syslog: iptables -A INPUT -i ppp_8_35_1 -j DROP
Jan 1 00:00:28 user alert kernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=69.64.59.238 DST=83.239.188.79 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=3731 DF PROTO=TCP SPT=33695 DPT=113 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 00:00:31 user alert kernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=69.64.59.238 DST=83.239.188.79 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=3732 DF PROTO=TCP SPT=33695 DPT=113 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 00:00:37 user alert kernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=69.64.59.238 DST=83.239.188.79 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=3733 DF PROTO=TCP SPT=33695 DPT=113 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 00:00:38 user alert kernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=204.8.34.130 DST=83.239.188.79 LEN=64 TOS=0x00 PREC=0x00 TTL=57 ID=49701 DF PROTO=TCP SPT=51909 DPT=1098 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:38 user alert kernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=204.8.34.130 DST=83.239.188.79 LEN=64 TOS=0x00 PREC=0x00 TTL=57 ID=49702 DF PROTO=TCP SPT=51910 DPT=1200 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:04:41 user debug igmp[834]: iptables -t filter -I FORWARD 1 -i br0 -d 224.0.0.22 -j DROP 2>/dev/null
Jan 1 00:04:41 user debug igmp[836]: iptables -t filter -D FORWARD -i br0 -d 224.0.0.22 -j ACCEPT 2>/dev/null
В проблемном случае в логе отсутствут строки
Код:
Jan 1 00:00:23 daemon crit pppd[249]: PPP LCP UP.