_tom писал(а):
Доброго времени суток! Хотел спросить когда будет доступна для скачивания обновленная прошивка для DSL-2640U/BRU/C2 c исправлениями проблем PPTP?
У меня следующая проблема:
Не работает инет через pptp клиента поверх интерфейса MER. Пингуется и vpn-сервер провайдера и шлюз, по логам вроде даже pptp поднимается - но в инет не идет. Прошивка 2.03 для С2
Вот System Log 
Date/Time Facility Severity Message 
Jan 1 00:00:25 syslog emerg BCM96345 started: BusyBox v1.00 (2010.08.04-05:46+0000) 
Jan 1 00:00:26 user warn kernel: PID hash table entries: 64 (order 6: 512 bytes) 
Jan 1 00:00:26 user warn kernel: Using 120.000 MHz high precision timer. 
Jan 1 00:00:26 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes) 
Jan 1 00:00:26 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes) 
Jan 1 00:00:26 user info kernel: Memory: 13828k/16000k available (1508k kernel code, 2152k reserved, 227k data, 72k init, 0k highmem) 
Jan 1 00:00:26 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80e00000 ... 0x80f00000> 
Jan 1 00:00:26 user warn kernel: Calibrating delay loop... 239.20 BogoMIPS 
Jan 1 00:00:26 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes) 
Jan 1 00:00:26 user warn kernel: Checking for 'wait' instruction... unavailable. 
Jan 1 00:00:26 user info kernel: NET: Registered protocol family 16 
Jan 1 00:00:26 user warn kernel: Total Flash size: 4096K with 1024 sectors 
Jan 1 00:00:26 user warn kernel: File system address: 0xbfc10100 
Jan 1 00:00:26 user warn kernel: Blk# BlkOff Blks MemLen Partition Name 
Jan 1 00:00:26 user warn kernel: 0 1408 1 1024 NVRAM 
Jan 1 00:00:26 user warn kernel: 1010 0 6 24576 Config 2 
Jan 1 00:00:26 user warn kernel: 1016 0 2 8192 Scratch PAD 
Jan 1 00:00:26 user warn kernel: 1018 0 6 24576 Config 1 
Jan 1 00:00:26 user warn kernel: Can't analyze prologue code at 801879d4 
Jan 1 00:00:26 user info kernel: Initializing Cryptographic API 
Jan 1 00:00:26 user info kernel: PPP generic driver version 2.4.2 
Jan 1 00:00:26 user info kernel: PPP Deflate Compression module registered 
Jan 1 00:00:26 user info kernel: PPP BSD Compression module registered 
Jan 1 00:00:26 user info kernel: MPPE/MPPC encryption/compression module registered 
Jan 1 00:00:26 user info kernel: NET: Registered protocol family 24 
Jan 1 00:00:26 user warn kernel: Using noop io scheduler 
Jan 1 00:00:26 user warn kernel: bcm963xx_mtd driver v1.0 
Jan 1 00:00:26 user warn kernel: brcmboard: brcm_board_init entry 
Jan 1 00:00:26 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $ 
Jan 1 00:00:26 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX 
Jan 1 00:00:26 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 Aug 4 2010 13:41:17 
Jan 1 00:00:26 user warn kernel: Config PHY Switch Through MDIO Pseudo PHY Interface 
Jan 1 00:00:26 user info kernel: BCM63xx_ENET: 100 MB Full-Duplex (auto-neg) 
Jan 1 00:00:26 user warn kernel: ethsw: found bcm5325e! 
Jan 1 00:00:26 user warn kernel: eth0: MAC Address: 1C:AF:F7:B3:7D:0D 
Jan 1 00:00:26 user warn kernel: eth0.2: MAC Address: 1C:AF:F7:B3:7D:0D 
Jan 1 00:00:26 user warn kernel: eth0.3: MAC Address: 1C:AF:F7:B3:7D:0D 
Jan 1 00:00:26 user warn kernel: eth0.4: MAC Address: 1C:AF:F7:B3:7D:0D 
Jan 1 00:00:26 user warn kernel: eth0.5: MAC Address: 1C:AF:F7:B3:7D:0D 
Jan 1 00:00:26 user info kernel: NET: Registered protocol family 2 
Jan 1 00:00:26 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes 
Jan 1 00:00:26 user info kernel: TCP: Hash tables configured (established 512 bind 1024) 
Jan 1 00:00:26 user info kernel: Initializing IPsec netlink socket 
Jan 1 00:00:26 user info kernel: NET: Registered protocol family 1 
Jan 1 00:00:26 user info kernel: NET: Registered protocol family 17 
Jan 1 00:00:26 user info kernel: NET: Registered protocol family 15 
Jan 1 00:00:26 user notice kernel: Ebtables v2.0 registered 
Jan 1 00:00:26 user info kernel: NET: Registered protocol family 8 
Jan 1 00:00:26 user info kernel: NET: Registered protocol family 20 
Jan 1 00:00:26 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear 
Jan 1 00:00:26 user info kernel: All bugs added by David S. Miller 
Jan 1 00:00:26 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly. 
Jan 1 00:00:26 user info kernel: Freeing unused kernel memory: 72k freed 
Jan 1 00:00:26 user crit kernel: eth0 Link UP. 
Jan 1 00:00:26 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5 
Jan 1 00:00:26 user warn kernel: atmapi: module license 'Proprietary' taints kernel. 
Jan 1 00:00:26 user warn kernel: adsl: adsl_init entry 
Jan 1 00:00:26 user warn kernel: blaadd: blaa_detect entry 
Jan 1 00:00:26 user info kernel: Broadcom BCMPROCFS v1.0 initialized 
Jan 1 00:00:26 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered 
Jan 1 00:00:26 user warn kernel: Trying to free free IRQ25 
Jan 1 00:00:26 user warn kernel: BcmAdsl_Initialize=0xC00663E8, g_pFnNotifyCallback=0xC0080FE4 
Jan 1 00:00:26 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000981 adsl2=0x00000000 
Jan 1 00:00:26 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x1B79E8 0xDEADBEEF 
Jan 1 00:00:26 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FEF96C 
Jan 1 00:00:26 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000981 adsl2=0x00000000 
Jan 1 00:00:26 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered 
Jan 1 00:00:26 user warn kernel: ATM proc init !!! 
Jan 1 00:00:26 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team 
Jan 1 00:00:26 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 384 bytes per conntrack 
Jan 1 00:00:26 user warn kernel: ip_conntrack_pptp version 2.1 loaded 
Jan 1 00:00:26 user warn kernel: ip_nat_pptp version 2.0 loaded 
Jan 1 00:00:26 user crit kernel: ADSL G.994 training 
Jan 1 00:00:26 user warn kernel: ip_ct_h323: init success 
Jan 1 00:00:26 user warn kernel: ip_nat_h323: init success 
Jan 1 00:00:26 user warn kernel: BRCM NAT Caching v1.0 Nov 20 2007 10:22:27 
Jan 1 00:00:26 user warn kernel: it function @ c0098088 
Jan 1 00:00:26 user warn kernel: ip_conntrack_rtsp v0.01 loading 
Jan 1 00:00:26 user warn kernel: ip_nat_rtsp v0.01 loading 
Jan 1 00:00:26 user info kernel: device eth0 entered promiscuous mode 
Jan 1 00:00:26 user info kernel: br0: port 1(eth0) entering learning state 
Jan 1 00:00:26 user info kernel: br0: topology change detected, propagating 
Jan 1 00:00:26 user info kernel: br0: port 1(eth0) entering forwarding state 
Jan 1 00:00:26 user info kernel: device wl0 entered promiscuous mode 
Jan 1 00:00:26 user info kernel: br0: port 2(wl0) entering learning state 
Jan 1 00:00:26 user info kernel: br0: topology change detected, propagating 
Jan 1 00:00:26 user info kernel: br0: port 2(wl0) entering forwarding state 
Jan 1 00:00:26 user info kernel: device eth0 left promiscuous mode 
Jan 1 00:00:26 user info kernel: br0: port 1(eth0) entering disabled state 
Jan 1 00:00:26 user info kernel: device wl0 left promiscuous mode 
Jan 1 00:00:26 user info kernel: br0: port 2(wl0) entering disabled state 
Jan 1 00:00:26 user info kernel: device eth0 entered promiscuous mode 
Jan 1 00:00:26 user info kernel: br0: port 1(eth0) entering learning state 
Jan 1 00:00:26 user info kernel: br0: topology change detected, propagating 
Jan 1 00:00:26 user info kernel: br0: port 1(eth0) entering forwarding state 
Jan 1 00:00:26 user info kernel: device wl0 entered promiscuous mode 
Jan 1 00:00:26 user info kernel: br0: port 2(wl0) entering learning state 
Jan 1 00:00:26 user info kernel: br0: topology change detected, propagating 
Jan 1 00:00:26 user info kernel: br0: port 2(wl0) entering forwarding state 
Jan 1 00:00:26 user debug syslog: brctl addbr pppbr 
Jan 1 00:00:28 user crit kernel: ADSL G.992 started 
Jan 1 00:00:30 user crit kernel: ADSL G.992 channel analysis 
Jan 1 00:00:35 user crit kernel: ADSL G.992 message exchange 
Jan 1 00:00:36 user crit kernel: ADSL link up, interleaved, us=512, ds=6144 
Jan 1 00:00:36 user warn kernel: ATM Soft SAR: ATM link connected. 
Jan 1 00:00:37 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 
Jan 1 00:00:38 user debug syslog: echo > /proc/net/ip_conntrack 
Jan 1 00:00:38 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max 
Jan 1 00:00:38 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null 
Jan 1 00:00:38 user debug syslog: iptables -t nat -D POSTROUTING -o nas_0_0_35 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null 
Jan 1 00:00:38 user debug syslog: iptables -t nat -A POSTROUTING -o nas_0_0_35 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 
Jan 1 00:00:38 user debug syslog: echo 3 > /proc/net/nat_mode 
Jan 1 00:00:38 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 89.107.200.38 2>/dev/null 
Jan 1 00:00:38 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 89.107.200.38 
Jan 1 00:00:38 user debug syslog: /bin/dnsprobe & 
Jan 1 00:00:38 user debug syslog: iptables -I INPUT 1 -i nas_0_0_35 -p udp --dport 5060 -j ACCEPT 2>/dev/null 
Jan 1 00:00:38 user notice dnsprobe[621]: dnsprobe started! 
Jan 1 00:00:38 user debug syslog: iptables -I INPUT 1 -i nas_0_0_35 -p udp --dport 7070:7079 -j ACCEPT 2>/dev/null 
Jan 1 00:00:39 user debug syslog: iptables -t nat -A PREROUTING -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null 
Jan 1 00:00:39 user debug syslog: siproxd --config /var/siproxd/siproxd.conf & 
Jan 1 00:00:39 user notice syslog: siproxd.c:192 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu starting up 
Jan 1 00:00:39 user notice syslog: siproxd.c:218 INFO:daemonized, pid=631 
Jan 1 00:00:39 user notice syslog: sock.c:65 INFO:bound to port 5060 
Jan 1 00:00:39 user notice syslog: register.c:65 WARNING:registration file not found, starting with empty table 
Jan 1 00:00:39 user notice syslog: siproxd.c:265 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu started 
Jan 1 00:00:40 user debug syslog: setkey -f /var/setkey.conf 
Jan 1 00:00:41 user debug syslog: mkdir /var/ppp/peers 
Jan 1 00:00:41 user debug syslog: cp /etc/ppp/chap-secrets1 /var/ppp/chap-secrets 
Jan 1 00:00:41 user debug syslog: cp /etc/ppp/options1 /var/ppp/options 
Jan 1 00:00:41 user debug syslog: cp /etc/ppp/pap-secrets1 /var/ppp/pap-secrets 
Jan 1 00:00:41 user debug syslog: cp /etc/ppp/peers/vpnusr1 /var/ppp/peers/vpnusr 
Jan 1 00:00:42 user debug syslog: pppdcall call vpnusr & 
Jan 1 00:00:43 daemon notice pppd[705]: pppd 2.4.4 started by admin, uid 0 
Jan 1 00:00:43 daemon info pppd[705]: Using interface ppp0 
Jan 1 00:00:43 daemon notice pppd[705]: Connect: ppp0 <--> /dev/ttyp0 
Jan 1 00:00:44 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD 
Jan 1 00:00:44 daemon err user: Stored Parameter Attribute data is corrupt or missing 
Jan 1 00:00:44 daemon warn pppd[705]: Warning - secret file /etc/ppp/pap-secrets has world and/or group access 
Jan 1 00:00:44 daemon notice pptp[723]: anon log[main:pptp.c:276]: The synchronous pptp option is NOT activated 
Jan 1 00:00:45 daemon notice pptp[726]: anon log[ctrlp_rep:pptp_ctrl.c:251]: Sent control packet type is 1 'Start-Control-Connection-Request' 
Jan 1 00:00:45 daemon notice pptp[726]: anon log[ctrlp_disp:pptp_ctrl.c:738]: Received Start Control Connection Reply 
Jan 1 00:00:45 daemon notice pptp[726]: anon log[ctrlp_disp:pptp_ctrl.c:772]: Client connection established. 
Jan 1 00:00:46 daemon notice pptp[726]: anon log[ctrlp_rep:pptp_ctrl.c:251]: Sent control packet type is 7 'Outgoing-Call-Request' 
Jan 1 00:00:46 daemon notice pptp[726]: anon log[ctrlp_disp:pptp_ctrl.c:857]: Received Outgoing Call Reply. 
Jan 1 00:00:46 daemon notice pptp[726]: anon log[ctrlp_disp:pptp_ctrl.c:896]: Outgoing call established (call ID 0, peer's call ID 7936). 
Jan 1 00:00:47 daemon warn pppd[705]: Warning - secret file /etc/ppp/chap-secrets has world and/or group access 
Jan 1 00:00:47 daemon warn pppd[705]: Warning - secret file /etc/ppp/pap-secrets has world and/or group access 
Jan 1 00:00:47 daemon warn pppd[705]: Warning - secret file /etc/ppp/chap-secrets has world and/or group access 
Jan 1 00:00:47 daemon info pppd[705]: CHAP authentication succeeded 
Jan 1 00:00:47 daemon notice pppd[705]: CHAP authentication succeeded 
Jan 1 00:00:47 daemon notice pppd[705]: Deflate (15) compression enabled 
Jan 1 00:00:47 daemon notice pppd[705]: local IP address 192.168.252.132 
Jan 1 00:00:47 daemon notice pppd[705]: remote IP address 192.168.254.254 
Jan 1 00:01:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:02:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:03:36 user debug syslog: rm /var/ppp/pptpaddr 
Jan 1 00:03:37 user debug syslog: rm /var/ppp/pptpgate 
Jan 1 00:03:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:04:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:05:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:06:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:07:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:08:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:09:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:10:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:676]: Echo Reply received. 
Jan 1 00:10:46 daemon notice pptp[726]: anon log[logecho:pptp_ctrl.c:678]: no more Echo Reply/Request packets will be reported. 
Для меня не понятны строчки, помеченные красным - это что за IP-адреса, подскажите? И всё-таки кто-нибудь победил 2640 с pptp или нет??
1. Поскольку функция PPTP-клиента была успешно протестирована в сегодняшней прошивке RU_2.04 для DSL-2540U/BRU/C2, в ближайшие дни фиксы будут портированы в другие модели модемов.
2. local IP address 192.168.252.132 - IP адрес клиента в VPN-туннеле (выданный VPN-сервером).
remote IP address 192.168.254.254 - IP адрес шлюза по умолчанию в VPN-туннеле