Проблема воспроизвелась. Ещё немного о конфигурации: комп с windows xp коннектиться по ethernet, ноут с ubuntu - по вайфаю. Сначала был включён комп, а затем ноут - и вот она проблема...теперь днс не резолвятся нигде. Выполнил вышуказаную комманду в рабочем состоянии, а также при возникновении проблемы.
Всё работает:
Код:
Chain PREROUTING (policy ACCEPT 102 packets, 8822 bytes)
pkts bytes target prot opt in out source destination
113 7055 DNAT udp -- br0 any anywhere 192.168.1.1 udp dpt:domain to:82.209.240.241
0 0 REDIRECT udp -- br0 any anywhere anywhere udp dpt:5060 redir ports 5060
Chain POSTROUTING (policy ACCEPT 4 packets, 234 bytes)
pkts bytes target prot opt in out source destination
113 7055 MASQUERADE all -- any ppp_0_0_33_1 192.168.1.0/24 anywhere
40 2416 MASQUERADE all -- any ppp_0_0_33_2 192.168.1.0/24 anywhere
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Не работает:
Код:
Chain PREROUTING (policy ACCEPT 2529 packets, 213K bytes)
pkts bytes target prot opt in out source destination
0 0 REDIRECT udp -- br0 any anywhere anywhere udp dpt:5060 redir ports 5060
121 7481 DNAT udp -- br0 any anywhere 192.168.1.1 udp dpt:domain to:82.209.243.241
Chain POSTROUTING (policy ACCEPT 143 packets, 9007 bytes)
pkts bytes target prot opt in out source destination
123 7604 MASQUERADE all -- any ppp_0_0_33_1 192.168.1.0/24 anywhere
22 1056 MASQUERADE all -- any ppp_0_0_33_2 192.168.1.0/24 anywhere
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Лог когда не работает:
Код:
System Log
Date/Time Facility Severity Message
Jan 1 00:00:25 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:25 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:25 user crit kernel: ADSL G.994 training
Jan 1 00:00:25 user warn kernel: ip_ct_h323: init success
Jan 1 00:00:25 user warn kernel: ip_nat_h323: init success
Jan 1 00:00:25 user warn kernel: BRCM NAT Caching v1.0 Nov 20 2007 10:22:27
Jan 1 00:00:25 user warn kernel: BRCM NAT Cache: Hooking hit function @ c00a1088
Jan 1 00:00:25 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:25 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:25 user crit kernel: ADSL G.992 started
Jan 1 00:00:25 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:25 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:25 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:25 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:25 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:25 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:25 user info kernel: br0: port 2(wl0) entering learning state
Jan 1 00:00:25 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:25 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:25 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:25 user crit kernel: ADSL link up, interleaved, us=512, ds=2048
Jan 1 00:00:25 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:25 user info kernel: device nas_0_0_33 entered promiscuous mode
Jan 1 00:00:25 user info kernel: br0: port 3(nas_0_0_33) entering learning state
Jan 1 00:00:25 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:25 user info kernel: br0: port 3(nas_0_0_33) entering forwarding state
Jan 1 00:00:25 user info kernel: device eth0 left promiscuous mode
Jan 1 00:00:25 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:00:25 user info kernel: device wl0 left promiscuous mode
Jan 1 00:00:25 user info kernel: br0: port 2(wl0) entering disabled state
Jan 1 00:00:25 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:25 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:25 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:25 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:25 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:25 user info kernel: br0: port 2(wl0) entering learning state
Jan 1 00:00:25 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:25 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:26 user debug syslog: brctl addbr pppbr
Jan 1 00:00:26 user debug syslog: pppd maxfail 100 -c 0.0.33.1 -i nas_0_0_33 -u "1703002362001@guest" -p ************ -f 0 -m 003048d25125/1760 &
Jan 1 00:00:26 user debug syslog: pppd maxfail 100 -c 0.0.33.2 -i nas_0_0_33_1 -u "1703002362001@beltel.by" -p ************ -f 0 -m 003048d25125/116d &
Jan 1 00:00:27 daemon notice pppd[447]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:27 daemon notice pppd[451]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:28 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:29 daemon notice pppd[447]: PPP: Start to connect ...
Jan 1 00:00:30 daemon crit pppd[447]: PPP server detected.
Jan 1 00:00:30 daemon crit pppd[447]: PPP session established.
Jan 1 00:00:30 daemon notice pppd[451]: PPP: Start to connect ...
Jan 1 00:00:32 daemon crit pppd[451]: PPP server detected.
Jan 1 00:00:32 daemon crit pppd[451]: PPP session established.
Jan 1 00:00:33 daemon crit pppd[447]: PPP LCP UP.
Jan 1 00:00:33 daemon crit pppd[447]: Received valid IP address from server. Connection UP.
Jan 1 00:00:33 user debug syslog: route add default dev ppp_0_0_33_2 2>/dev/null
Jan 1 00:00:34 user debug syslog: route add -net 86.57.151.0 netmask 255.255.255.224 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:34 user debug syslog: route add -net 86.57.253.1 netmask 255.255.255.255 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:34 user debug syslog: route add -net 193.232.248.79 netmask 255.255.255.255 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:34 user debug syslog: route add -net 86.57.250.0 netmask 255.255.254.0 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:34 user debug syslog: route add -net 86.57.246.0 netmask 255.255.255.0 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:34 user debug syslog: route add -net 93.84.112.0 netmask 255.255.248.0 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:34 user debug syslog: route add -net 82.209.240.241 netmask 255.255.255.255 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:34 user debug syslog: route add -net 82.209.243.241 netmask 255.255.255.255 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:34 user debug syslog: iptables -A FORWARD -o ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:34 user debug syslog: iptables -A FORWARD -i ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:34 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:34 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:34 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:34 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_33_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:34 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:34 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 82.209.240.241 2>/dev/null
Jan 1 00:00:34 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 82.209.240.241
Jan 1 00:00:34 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:35 user notice dnsprobe[799]: dnsprobe started!
Jan 1 00:00:35 daemon crit pppd[451]: PPP LCP UP.
Jan 1 00:00:35 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=93.84.118.50 DST=1.8.233.3 LEN=60 TOS=0x00 PREC=0x00 TTL=59 ID=11109 DF PROTO=TCP SPT=49533 DPT=22511 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 00:00:35 daemon crit pppd[451]: Received valid IP address from server. Connection UP.
Jan 1 00:00:36 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=93.84.116.226 DST=1.8.233.3 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=9634 DF PROTO=TCP SPT=53012 DPT=22511 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:00:36 user debug syslog: iptables -I INPUT 1 -p icmp --icmp-type echo-request -i ppp_0_0_33_1 -j ACCEPT
Jan 1 00:00:37 user debug syslog: setkey -f /var/setkey.conf
Jan 1 00:00:40 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=93.84.117.163 DST=1.8.233.3 LEN=60 TOS=0x00 PREC=0x00 TTL=59 ID=57992 DF PROTO=TCP SPT=60481 DPT=22511 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 00:00:40 user debug syslog: ifconfig ppp_0_0_33_1 mtu 1492
Jan 1 00:00:41 user debug syslog: route add default dev ppp_0_0_33_2 2>/dev/null
Jan 1 00:00:41 user debug syslog: route add -net 86.57.151.0 netmask 255.255.255.224 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:41 user debug syslog: route add -net 86.57.253.1 netmask 255.255.255.255 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:41 user debug syslog: route add -net 193.232.248.79 netmask 255.255.255.255 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:41 user debug syslog: route add -net 86.57.250.0 netmask 255.255.254.0 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:41 user debug syslog: route add -net 86.57.246.0 netmask 255.255.255.0 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:42 user debug syslog: route add -net 93.84.112.0 netmask 255.255.248.0 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:42 user debug syslog: route add -net 82.209.240.241 netmask 255.255.255.255 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:42 user debug syslog: route add -net 82.209.243.241 netmask 255.255.255.255 metric 1 dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -A FORWARD -o ppp_0_0_33_2 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:42 user debug syslog: iptables -A FORWARD -i ppp_0_0_33_2 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:43 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_33_2 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:43 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_2 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:43 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Jan 1 00:00:43 daemon err user: Stored Parameter Attribute data is corrupt or missing
Jan 1 00:00:43 user debug syslog: upnp -L br0 -W ppp_0_0_33_2 -D
Jan 1 00:00:43 user debug syslog: iptables -t filter -I OUTPUT -o ppp_0_0_33_2 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:00:44 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=92.243.166.27 DST=93.84.158.10 LEN=48 TOS=0x00 PREC=0x00 TTL=250 ID=31886 DF PROTO=TCP SPT=21931 DPT=49100 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:44 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=93.84.114.179 DST=1.8.233.3 LEN=60 TOS=0x00 PREC=0x00 TTL=59 ID=31306 DF PROTO=TCP SPT=38530 DPT=22511 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 00:00:44 user debug syslog: iptables -I INPUT 1 -p icmp --icmp-type echo-request -i ppp_0_0_33_2 -j ACCEPT
Jan 1 00:00:44 user debug syslog: iptables -I INPUT 1 -i ppp_0_0_33_2 -p udp --dport 5060 -j ACCEPT 2>/dev/null
Jan 1 00:00:44 user debug syslog: iptables -I INPUT 1 -i ppp_0_0_33_2 -p udp --dport 7070:7079 -j ACCEPT 2>/dev/null
Jan 1 00:00:44 user debug syslog: iptables -t nat -A PREROUTING -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null
Jan 1 00:00:44 user debug syslog: siproxd --config /var/siproxd/siproxd.conf &
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=92.243.166.27 DST=93.84.158.10 LEN=48 TOS=0x00 PREC=0x00 TTL=250 ID=31957 DF PROTO=TCP SPT=21931 DPT=49100 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 28 18:52:07 user notice syslog: siproxd.c:192 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu starting up
Oct 28 18:52:07 user notice syslog: siproxd.c:218 INFO:daemonized, pid=998
Oct 28 18:52:07 user notice syslog: sock.c:65 INFO:bound to port 5060
Oct 28 18:52:07 user notice syslog: register.c:65 WARNING:registration file not found, starting with empty table
Oct 28 18:52:07 user notice syslog: siproxd.c:265 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu started
Oct 28 18:52:07 user debug syslog: setkey -f /var/setkey.conf
Oct 28 18:52:07 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_33_2 -p tcp --dport 30005
Oct 28 18:52:07 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_33_2 -p tcp --dport 30005
Oct 28 18:52:07 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_33_2 -p udp -s 192.168.1.1/24 --dport 30006
Oct 28 18:52:07 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_33_2 -p udp -s 192.168.1.1/24 --dport 30006
Oct 28 18:52:08 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=79.165.247.188 DST=93.84.158.10 LEN=48 TOS=0x00 PREC=0x00 TTL=251 ID=45513 DF PROTO=TCP SPT=59702 DPT=57458 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 28 18:52:08 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=80.94.234.204 DST=93.84.158.10 LEN=48 TOS=0x00 PREC=0x00 TTL=250 ID=22311 DF PROTO=TCP SPT=1047 DPT=57458 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 28 18:52:09 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=178.123.128.131 DST=93.84.158.10 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=19403 DF PROTO=TCP SPT=59159 DPT=57458 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 28 18:52:09 user debug syslog: ifconfig ppp_0_0_33_2 mtu 1492
Oct 28 18:52:10 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=178.66.241.248 DST=93.84.158.10 LEN=48 TOS=0x00 PREC=0x00 TTL=251 ID=13459 DF PROTO=TCP SPT=54693 DPT=57458 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 28 18:52:10 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=94.51.112.247 DST=93.84.158.10 LEN=48 TOS=0x00 PREC=0x00 TTL=251 ID=6838 DF PROTO=TCP SPT=4827 DPT=57458 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 28 18:52:17 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=178.124.130.55 DST=1.8.233.3 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=13564 DF PROTO=TCP SPT=4445 DPT=22511 WINDOW=64240 RES=0x00 SYN URGP=0
Oct 28 18:52:17 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=93.84.69.230 DST=1.8.233.3 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=57380 DF PROTO=TCP SPT=14101 DPT=22511 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 28 18:52:20 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=178.124.130.55 DST=1.8.233.3 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=15809 DF PROTO=TCP SPT=4445 DPT=22511 WINDOW=64240 RES=0x00 SYN URGP=0
Oct 28 18:52:20 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=93.84.69.230 DST=1.8.233.3 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=57557 DF PROTO=TCP SPT=14101 DPT=22511 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 28 18:52:24 user alert kernel: Intrusion -> IN=ppp_0_0_33_1 OUT= MAC= SRC=93.84.117.163 DST=1.8.233.3 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=8263 DF PROTO=TCP SPT=61041 DPT=22511 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 28 19:02:13 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=178.122.24.236 DST=93.84.158.10 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=61856 DF PROTO=TCP SPT=2076 DPT=57458 WINDOW=64380 RES=0x00 SYN URGP=0
Oct 28 19:12:01 user warn dnsprobe[799]: dns query failed
Oct 28 19:12:03 user warn dnsprobe[799]: dns query failed
Oct 28 19:12:05 user warn dnsprobe[799]: dns query failed
Oct 28 19:12:05 user notice dnsprobe[799]: Primary DNS server Is Down... Switching To Secondary DNS server
Oct 28 19:12:10 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=93.85.42.2 DST=93.84.158.10 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=59150 DF PROTO=TCP SPT=3251 DPT=57458 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 28 19:22:07 user warn dnsprobe[799]: dns query failed
Oct 28 19:22:09 user warn dnsprobe[799]: dns query failed
Oct 28 19:22:11 user warn dnsprobe[799]: dns query failed
Oct 28 19:22:14 user alert kernel: Intrusion -> IN=ppp_0_0_33_2 OUT= MAC= SRC=93.84.135.233 DST=93.84.158.10 LEN=64 TOS=0x00 PREC=0x00 TTL=45 ID=44974 DF PROTO=TCP SPT=4216 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0
Насколько я понял сначала даты в логе дефолтные, а после синхронизации с тайм сервером - актуальные. ДНС провайдера:
primary - 82.209.240.241
secondary - 82.209.243.241
выданный ip - 93.84.158.10