System Log
Date/Time Facility Severity Message
Jan 1 00:00:35 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:35 user crit kernel: ADSL G.992 started
Jan 1 00:00:36 user debug syslog: echo > /var/snmpd.conf
Jan 1 00:00:38 user debug syslog: pppd -c 0.1.32.1 -i nas_0_1_32 -u
mekae_5937@dsl.ukrtel.net -p ******** -f 0 -k -m 00901a4201e1/07f7 &
Jan 1 00:00:38 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:39 daemon notice pppd[286]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:44 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:45 user crit kernel: ADSL link up, interleaved, us=924, ds=9824
Jan 1 00:00:45 user warn kernel: ADSL2/ADSL2+ connection
Jan 1 00:00:45 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:46 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:47 daemon notice pppd[286]: PPP: Start to connect ...
Jan 1 00:00:49 daemon crit pppd[286]: PPP server detected.
Jan 1 00:00:49 daemon crit pppd[286]: PPP session established.
Jan 1 00:00:50 daemon crit pppd[286]: PPP LCP UP.
Jan 1 00:00:50 daemon crit pppd[286]: Received valid IP address from server. Connection UP.
Jan 1 00:00:51 user debug syslog: route add default gw 195.5.5.185 2>/dev/null
Jan 1 00:00:51 user debug syslog: iptables -A FORWARD -o ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:51 user debug syslog: iptables -A FORWARD -i ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:51 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:51 user debug syslog: echo "600" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:51 user debug syslog: echo 2000 > /proc/sys/net/ipv4/netfilter/ip_conntrack_generic_timeout
Jan 1 00:00:51 user debug syslog: echo 600 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_established
Jan 1 00:00:51 user debug syslog: echo 1400 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_fin_wait
Jan 1 00:00:51 user debug syslog: echo 2000 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_time_wait
Jan 1 00:00:51 user debug syslog: echo 4096 > /proc/sys/net/ipv4/ipfrag_high_thresh
Jan 1 00:00:52 user debug syslog: echo 1024 > /proc/sys/net/ipv4/ipfrag_low_thresh
Jan 1 00:00:52 user debug syslog: echo 5 > /proc/sys/net/ipv4/ipfrag_time
Jan 1 00:00:52 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:52 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:52 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:52 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 82.207.66.242 2>/dev/null
Jan 1 00:00:52 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 82.207.66.242
Jan 1 00:00:52 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:52 user notice dnsprobe[446]: dnsprobe started!
Jan 1 00:00:54 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=95.133.9.211 DST=95.133.2.108 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=30122 DF PROTO=TCP SPT=3147 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jul 3 15:08:36 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=95.133.9.211 DST=95.133.2.108 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=30123 DF PROTO=TCP SPT=3147 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0