Форум русскоязычного сообщества Ubuntu


Следите за новостями русскоязычного сообщества Ubuntu в Twitter-ленте @ubuntu_ru_loco

Автор Тема: IPTables и GRE трафик. Не пускает PPTP через IPTables.  (Прочитано 540 раз)

0 Пользователей и 1 Гость просматривают эту тему.

Оффлайн Dark Smoke

  • Автор темы
  • Активист
  • *
  • Сообщений: 310
    • Просмотр профиля
    • Абонентское обслуживание и ремонт компьютеров в Днепропетровске
Добрый день
Сто пятьсот тем уже было, я все перечитал но что то ничего не получается. Объясните мне, пожалуйста, что не так. Не могу из локальной сети подключиться к VPN PPTP.

net.ipv4.ip_forward = 1

modprobe ip_gre
modprobe ip_nat_pptp

*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -i br0 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A INPUT -i ppp+ -j ACCEPT
-A FORWARD -j ACCEPT
-A FORWARD -p gre -j ACCEPT
-A FORWARD -i ppp+ -p tcp -m tcp --dport 1723 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o br0 -j ACCEPT
-A OUTPUT -o ppp+ -j ACCEPT
COMMIT
# Completed on Sat Aug  8 19:03:19 2020
# Generated by xtables-save v1.8.2 on Sat Aug  8 19:03:19 2020
*mangle
:PREROUTING ACCEPT [2389663:2223369265]
:INPUT ACCEPT [71252:5711760]
:FORWARD ACCEPT [2315173:2216543896]
:OUTPUT ACCEPT [69345:4850505]
:POSTROUTING ACCEPT [2384509:2221393609]
COMMIT
# Completed on Sat Aug  8 19:03:19 2020
# Generated by xtables-save v1.8.2 on Sat Aug  8 19:03:19 2020
*nat
:PREROUTING ACCEPT [32628:3689408]
:INPUT ACCEPT [15627:877847]
:POSTROUTING ACCEPT [141:8204]
:OUTPUT ACCEPT [1089:72631]
-A PREROUTING -p tcp -m tcp --dport 9998 -j DNAT --to-destination 192.168.1.241:22
-A PREROUTING -p tcp -m tcp --dport 8080 -j DNAT --to-destination 192.168.1.212:80
-A PREROUTING -p tcp -m tcp --dport 4114 -j DNAT --to-destination 192.168.1.214:3389
-A PREROUTING -p tcp -m tcp --dport 4113 -j DNAT --to-destination 192.168.1.213:3389
-A PREROUTING -p tcp -m tcp --dport 4142 -j DNAT --to-destination 192.168.1.211:3389
-A POSTROUTING -o ppp+ -j MASQUERADE
COMMIT

16:07:09.501747 IP 192.168.1.20.55186 > 93.170.1.178.1723: Flags [S], seq 4089111234, win 64240, options [mss 1460,sackOK,TS val 826564688 ecr 0,nop,wscale 7], length 0
16:07:09.520373 IP 93.170.1.178.1723 > 192.168.1.20.55186: Flags [S.], seq 1373936282, ack 4089111235, win 5792, options [mss 1460,sackOK,TS val 18308840 ecr 826564688,nop,wscale 1], length 0
16:07:09.521383 IP 192.168.1.20.55186 > 93.170.1.178.1723: Flags [.], ack 1, win 502, options [nop,nop,TS val 826564736 ecr 18308840], length 0
16:07:09.521849 IP 192.168.1.20.55186 > 93.170.1.178.1723: Flags [P.], seq 1:157, ack 1, win 502, options [nop,nop,TS val 826564737 ecr 18308840], length 156: pptp CTRL_MSGTYPE=SCCRQ PROTO_VER(1.0) FRAME_CAP(AS) BEARER_CAP(DA) MAX_CHAN(65535) FIRM_REV(1) HOSTNAME(local) VENDOR(cananian)
16:07:09.540375 IP 93.170.1.178.1723 > 192.168.1.20.55186: Flags [.], ack 157, win 2896, options [nop,nop,TS val 18308845 ecr 826564737], length 0
16:07:09.542899 IP 93.170.1.178.1723 > 192.168.1.20.55186: Flags [P.], seq 1:157, ack 157, win 2896, options [nop,nop,TS val 18308846 ecr 826564737], length 156: pptp CTRL_MSGTYPE=SCCRP PROTO_VER(1.0) RESULT_CODE(1) ERR_CODE(0) FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) HOSTNAME(local) VENDOR(linux)
16:07:09.730366 IP 192.168.1.20.55186 > 93.170.1.178.1723: Flags [.], ack 157, win 501, options [nop,nop,TS val 826564945 ecr 18308846], length 0
16:07:10.669862 IP 192.168.1.20.55186 > 93.170.1.178.1723: Flags [P.], seq 157:325, ack 157, win 501, options [nop,nop,TS val 826565737 ecr 18308846], length 168: pptp CTRL_MSGTYPE=OCRQ CALL_ID(39104) CALL_SER_NUM(0) MIN_BPS(2400) MAX_BPS(10000000) BEARER_TYPE(Any) FRAME_TYPE(E) RECV_WIN(3) PROC_DELAY(0) PHONE_NO_LEN(0) PHONE_NO() SUB_ADDR()
16:07:10.670362 IP 192.168.1.20.45270 > waw07s02-in-f14.1e100.net.http: Flags [.], ack 1, win 501, options [nop,nop,TS val 2015910691 ecr 2476600748], length 0
16:07:10.690336 IP 93.170.1.178.1723 > 192.168.1.20.55186: Flags [P.], seq 157:189, ack 325, win 2896, options [nop,nop,TS val 18309132 ecr 826565737], length 32: pptp CTRL_MSGTYPE=OCRP CALL_ID(7) PEER_CALL_ID(39104) RESULT_CODE(1) ERR_CODE(0) CAUSE_CODE(0) CONN_SPEED(10000000) RECV_WIN(3) PROC_DELAY(0) PHY_CHAN_ID(0)
16:07:10.690362 IP waw07s02-in-f14.1e100.net.http > 192.168.1.20.45270: Flags [.], ack 1, win 261, options [nop,nop,TS val 2476610995 ecr 2015798423], length 0
16:07:10.691399 IP 192.168.1.20.55186 > 93.170.1.178.1723: Flags [.], ack 189, win 501, options [nop,nop,TS val 826565906 ecr 18309132], length 0
16:07:10.692268 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 1, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:13.469248 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 2, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:13.590998 IP 192.168.1.20.45270 > waw07s02-in-f14.1e100.net.http: Flags [F.], seq 1, ack 1, win 501, options [nop,nop,TS val 2015913621 ecr 2476610995], length 0
16:07:13.611090 IP waw07s02-in-f14.1e100.net.http > 192.168.1.20.45270: Flags [F.], seq 1, ack 2, win 261, options [nop,nop,TS val 2476613916 ecr 2015913621], length 0
16:07:13.612105 IP 192.168.1.20.45270 > waw07s02-in-f14.1e100.net.http: Flags [.], ack 2, win 501, options [nop,nop,TS val 2015913642 ecr 2476613916], length 0
16:07:16.471249 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 3, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:19.475250 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 4, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:19.477729 IP 192.168.1.20.56572 > dns.google.domain: 40468+ [1au] PTR? 20.1.168.192.in-addr.arpa. (54)
16:07:19.499361 IP dns.google.domain > 192.168.1.20.56572: 40468 NXDomain 0/0/1 (54)
16:07:19.501829 IP 192.168.1.20.56572 > dns.google.domain: 40468+ PTR? 20.1.168.192.in-addr.arpa. (43)
16:07:19.523457 IP dns.google.domain > 192.168.1.20.56572: 40468 NXDomain 0/0/0 (43)
16:07:19.534002 IP 192.168.1.20.35950 > dns.google.domain: 64802+ [1au] PTR? e.f.a.b.7.6.e.f.f.f.5.6.e.e.a.b.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. (101)
16:07:19.571009 IP dns.google.domain > 192.168.1.20.35950: 64802 NXDomain 0/1/1 (165)
16:07:19.577153 IP 192.168.1.20.35950 > dns.google.domain: 64802+ PTR? e.f.a.b.7.6.e.f.f.f.5.6.e.e.a.b.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. (90)
16:07:19.613871 IP dns.google.domain > 192.168.1.20.35950: 64802 NXDomain 0/1/0 (154)
16:07:22.477854 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 5, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:25.477166 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 6, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:28.480473 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 7, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:31.485456 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 8, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:34.488352 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 9, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:34.801223 IP 192.168.1.20.ntp > pugot.canonical.com.ntp: NTPv4, Client, length 48
16:07:34.852220 IP pugot.canonical.com.ntp > 192.168.1.20.ntp: NTPv4, Server, length 48
16:07:35.800946 IP 192.168.1.20.ntp > golem.canonical.com.ntp: NTPv4, Client, length 48
16:07:35.851249 IP golem.canonical.com.ntp > 192.168.1.20.ntp: NTPv4, Server, length 48
16:07:37.491757 IP 192.168.1.20 > 93.170.1.178: GREv1, call 7, seq 10, length 36: LCP, Conf-Request (0x01), id 1, length 22
16:07:38.801238 IP 192.168.1.20.ntp > chilipepper.canonical.com.ntp: NTPv4, Client, length 48
16:07:38.848247 IP chilipepper.canonical.com.ntp > 192.168.1.20.ntp: NTPv4, Server, length 48
16:07:40.526548 IP 192.168.1.20.55186 > 93.170.1.178.1723: Flags [P.], seq 325:341, ack 189, win 501, options [nop,nop,TS val 826595737 ecr 18309132], length 16: pptp CTRL_MSGTYPE=CCRQ CALL_ID(39104)
16:07:40.529590 IP 192.168.1.20.55186 > 93.170.1.178.1723: Flags [F.], seq 341, ack 189, win 501, options [nop,nop,TS val 826595737 ecr 18309132], length 0
16:07:40.580446 IP 93.170.1.178.1723 > 192.168.1.20.55186: Flags [.], ack 342, win 2896, options [nop,nop,TS val 18316606 ecr 826595737], length 0
16:07:42.052741 IP 192.168.1.20.37611 > dns.google.domain: 42338+ [1au] AAAA? connectivity-check.ubuntu.com. (58)
16:07:42.072774 IP dns.google.domain > 192.168.1.20.37611: 42338 0/1/1 (119)
16:07:42.075372 IP 192.168.1.20.54936 > dns.google.domain: 12553+ [1au] AAAA? connectivity-check.ubuntu.com. (58)
16:07:42.097683 IP dns.google.domain > 192.168.1.20.54936: 12553 0/1/1 (119)
« Последнее редактирование: 08 Август 2020, 19:22:16 от Dark Smoke »

Онлайн AnrDaemon

  • Заслуженный пользователь
  • Старожил
  • *
  • Сообщений: 27660
    • Просмотр профиля
Re: IPTables и GRE трафик. Не пускает PPTP через IPTables.
« Ответ #1 : 09 Август 2020, 01:16:25 »
Должны быть запущены эти модули:

nf_nat_pptp
nf_conntrack_pptp
nf_conntrack_proto_gre
nf_nat_proto_gre

В /etc/modprobe.d/pptp-gre.conf
softdep nf_nat post: nf_nat_pptp
И tcpdump делайте вменяемый.
"( ( proto gre ) or ( tcp port 1723 ) ) and host xxxx"
Хотите получить помощь? Потрудитесь представить запрошенную информацию в полном объёме.

Прежде чем [Отправить], нажми [Просмотр] и прочти собственное сообщение. Сам-то понял, что написал?…

Оффлайн Dark Smoke

  • Автор темы
  • Активист
  • *
  • Сообщений: 310
    • Просмотр профиля
    • Абонентское обслуживание и ремонт компьютеров в Днепропетровске
Re: IPTables и GRE трафик. Не пускает PPTP через IPTables.
« Ответ #2 : 09 Август 2020, 11:16:08 »
Спасибо за рекомендации

$ modprobe nf_nat_pptp && modprobe nf_conntrack_pptp && modprobe nf_conntrack_proto_gre && modprobe nf_nat_proto_gre

$ tcpdump -i br0 "( ( proto gre ) or ( tcp port 1723 ) ) and host 192.168.1.20"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on br0, link-type EN10MB (Ethernet), capture size 262144 bytes
11:00:26.618465 IP 192.168.1.20.53876 > 93.170.1.178.1723: Flags [S], seq 3691445273, win 64240, options [mss 1460,sackOK,TS val 400293471 ecr 0,nop,wscale 7], length 0
11:00:26.639546 IP 93.170.1.178.1723 > 192.168.1.20.53876: Flags [S.], seq 3974759361, ack 3691445274, win 5792, options [mss 1460,sackOK,TS val 3675330 ecr 400293471,nop,wscale 1], length 0
11:00:26.640612 IP 192.168.1.20.53876 > 93.170.1.178.1723: Flags [.], ack 1, win 502, options [nop,nop,TS val 400293659 ecr 3675330], length 0
11:00:26.641234 IP 192.168.1.20.53876 > 93.170.1.178.1723: Flags [P.], seq 1:157, ack 1, win 502, options [nop,nop,TS val 400293660 ecr 3675330], length 156: pptp CTRL_MSGTYPE=SCCRQ PROTO_VER(1.0) FRAME_CAP(AS) BEARER_CAP(DA) MAX_CHAN(65535) FIRM_REV(1) HOSTNAME(local) VENDOR(cananian)
11:00:26.661746 IP 93.170.1.178.1723 > 192.168.1.20.53876: Flags [.], ack 157, win 2896, options [nop,nop,TS val 3675336 ecr 400293660], length 0
11:00:26.666138 IP 93.170.1.178.1723 > 192.168.1.20.53876: Flags [P.], seq 1:157, ack 157, win 2896, options [nop,nop,TS val 3675336 ecr 400293660], length 156: pptp CTRL_MSGTYPE=SCCRP PROTO_VER(1.0) RESULT_CODE(1) ERR_CODE(0) FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) HOSTNAME(local) VENDOR(linux)
11:00:26.855362 IP 192.168.1.20.53876 > 93.170.1.178.1723: Flags [.], ack 157, win 501, options [nop,nop,TS val 400293872 ecr 3675336], length 0
11:00:27.786734 IP 192.168.1.20.53876 > 93.170.1.178.1723: Flags [P.], seq 157:325, ack 157, win 501, options [nop,nop,TS val 400294660 ecr 3675336], length 168: pptp CTRL_MSGTYPE=OCRQ CALL_ID(21161) CALL_SER_NUM(0) MIN_BPS(2400) MAX_BPS(10000000) BEARER_TYPE(Any) FRAME_TYPE(E) RECV_WIN(3) PROC_DELAY(0) PHONE_NO_LEN(0) PHONE_NO() SUB_ADDR()
11:00:27.808589 IP 93.170.1.178.1723 > 192.168.1.20.53876: Flags [P.], seq 157:189, ack 325, win 2896, options [nop,nop,TS val 3675622 ecr 400294660], length 32: pptp CTRL_MSGTYPE=OCRP CALL_ID(5) PEER_CALL_ID(21161) RESULT_CODE(1) ERR_CODE(0) CAUSE_CODE(0) CONN_SPEED(10000000) RECV_WIN(3) PROC_DELAY(0) PHY_CHAN_ID(0)
11:00:27.810672 IP 192.168.1.20.53876 > 93.170.1.178.1723: Flags [.], ack 189, win 501, options [nop,nop,TS val 400294829 ecr 3675622], length 0
11:00:27.811086 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 1, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:30.440985 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 2, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:33.443124 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 3, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:36.441719 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 4, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:39.446345 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 5, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:42.450401 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 6, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:45.452293 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 7, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:48.459515 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 8, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:51.618381 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 9, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:54.457170 IP 192.168.1.20 > 93.170.1.178: GREv1, call 5, seq 10, length 36: LCP, Conf-Request (0x01), id 1, length 22
11:00:57.482754 IP 192.168.1.20.53876 > 93.170.1.178.1723: Flags [P.], seq 325:341, ack 189, win 501, options [nop,nop,TS val 400324502 ecr 3675622], length 16: pptp CTRL_MSGTYPE=CCRQ CALL_ID(21161)
11:00:57.483030 IP 192.168.1.20.53876 > 93.170.1.178.1723: Flags [F.], seq 341, ack 189, win 501, options [nop,nop,TS val 400324502 ecr 3675622], length 0
11:00:57.542327 IP 93.170.1.178.1723 > 192.168.1.20.53876: Flags [.], ack 342, win 2896, options [nop,nop,TS val 3683056 ecr 400324502], length 0
^C
23 packets captured
23 packets received by filter
0 packets dropped by kernel

$ cat  /etc/modprobe.d/pptp-gre.conf
softdep nf_nat post: nf_nat_pptp

Лог с моей машины которая хочет подключится к VPN серверу в интернете. По середине стоит сервер его то и пытаюсь настроить ((
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960707.7549] audit: op="connection-activate" uuid="bf48fc36-63ff-4165-b82c-b2e47a8248cc" name="Modena" pid=1691 uid=1000 result="success"
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960707.7638] vpn-connection[0x5618d9fd8370,bf48fc36-63ff-4165-b82c-b2e47a8248cc,"Modena",0]: Started the VPN service, PID 7126
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960707.7724] vpn-connection[0x5618d9fd8370,bf48fc36-63ff-4165-b82c-b2e47a8248cc,"Modena",0]: Saw the service appear; activating connection
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960707.8395] vpn-connection[0x5618d9fd8370,bf48fc36-63ff-4165-b82c-b2e47a8248cc,"Modena",0]: VPN connection: (ConnectInteractive) reply received
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960707.8438] vpn-connection[0x5618d9fd8370,bf48fc36-63ff-4165-b82c-b2e47a8248cc,"Modena",0]: VPN plugin: state changed: starting (3)
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 pppd[7136]: Plugin /usr/lib/pppd/2.4.7/nm-pptp-pppd-plugin.so loaded.
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[7136]: Plugin /usr/lib/pppd/2.4.7/nm-pptp-pppd-plugin.so loaded.
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 pppd[7136]: pppd 2.4.7 started by root, uid 0
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 pppd[7136]: Using interface ppp0
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[7136]: Using interface ppp0
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 pptp[7141]: nm-pptp-service-7126 log[main:pptp.c:353]: The synchronous pptp option is NOT activated
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960707.8554] manager: (ppp0): new Ppp device (/org/freedesktop/NetworkManager/Devices/10)
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 pppd[7136]: Connect: ppp0 <--> /dev/pts/3
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 systemd-udevd[7140]: ethtool: autonegotiation is unset or enabled, the speed and duplex are not writable.
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 NetworkManager[7136]: Connect: ppp0 <--> /dev/pts/3
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[ctrlp_rep:pptp_ctrl.c:258]: Sent control packet type is 1 'Start-Control-Connection-Request'
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[ctrlp_disp:pptp_ctrl.c:781]: Received Start Control Connection Reply
Aug  9 11:11:47 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[ctrlp_disp:pptp_ctrl.c:815]: Client connection established.
Aug  9 11:11:48 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[ctrlp_rep:pptp_ctrl.c:258]: Sent control packet type is 7 'Outgoing-Call-Request'
Aug  9 11:11:49 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[ctrlp_disp:pptp_ctrl.c:900]: Received Outgoing Call Reply.
Aug  9 11:11:49 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[ctrlp_disp:pptp_ctrl.c:938]: Outgoing call established (call ID 52947, peer's call ID 7).

Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pppd[7136]: LCP: timeout sending Config-Requests
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pppd[7136]: Connection terminated.
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[7136]: LCP: timeout sending Config-Requests
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[7136]: Connection terminated.
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <warn>  [1596960738.8843] vpn-connection[0x5618d9fd8370,bf48fc36-63ff-4165-b82c-b2e47a8248cc,"Modena",0]: VPN plugin: failed: connect-failed (1)
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960738.8844] vpn-connection[0x5618d9fd8370,bf48fc36-63ff-4165-b82c-b2e47a8248cc,"Modena",0]: VPN plugin: state changed: stopping (5)
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960738.8845] vpn-connection[0x5618d9fd8370,bf48fc36-63ff-4165-b82c-b2e47a8248cc,"Modena",0]: VPN plugin: state changed: stopped (6)
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 dbus-daemon[1493]: [session uid=1000 pid=1493] Activating service name='org.freedesktop.Notifications' requested by ':1.32' (uid=1000 pid=1691 comm="nm-applet " label="unconfined")
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[726]: <info>  [1596960738.8906] vpn-connection[0x5618d9fd8370,bf48fc36-63ff-4165-b82c-b2e47a8248cc,"Modena",0]: VPN service disappeared
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pppd[7136]: Terminating on signal 15
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[7136]: Terminating on signal 15
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[7136]: Child process /usr/sbin/pptp 93.170.1.178 --nolaunchpppd --loglevel 0 --logstring nm-pptp-service-7126 (pid 7139) terminated with signal 15
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 NetworkManager[7136]: Modem hangup
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pppd[7136]: Child process /usr/sbin/pptp 93.170.1.178 --nolaunchpppd --loglevel 0 --logstring nm-pptp-service-7126 (pid 7139) terminated with signal 15
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pppd[7136]: Modem hangup
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pppd[7136]: Exit.
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pptp[7141]: nm-pptp-service-7126 warn[decaps_hdlc:pptp_gre.c:226]: short read (-1): Input/output error
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pptp[7141]: nm-pptp-service-7126 warn[decaps_hdlc:pptp_gre.c:238]: pppd may have shutdown, see pppd log
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[callmgr_main:pptp_callmgr.c:245]: Closing connection (unhandled)
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[ctrlp_rep:pptp_ctrl.c:258]: Sent control packet type is 12 'Call-Clear-Request'
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 pptp[7153]: nm-pptp-service-7126 log[call_callback:pptp_callmgr.c:84]: Closing connection (call state)
Aug  9 11:12:18 darksmoke-HP-EliteBook-840-G1 dbus-daemon[1493]: [session uid=1000 pid=1493] Successfully activated service 'org.freedesktop.Notifications'

Онлайн AnrDaemon

  • Заслуженный пользователь
  • Старожил
  • *
  • Сообщений: 27660
    • Просмотр профиля
Re: IPTables и GRE трафик. Не пускает PPTP через IPTables.
« Ответ #3 : 09 Август 2020, 12:13:56 »
C сервера "ip a" покажите.
Хотите получить помощь? Потрудитесь представить запрошенную информацию в полном объёме.

Прежде чем [Отправить], нажми [Просмотр] и прочти собственное сообщение. Сам-то понял, что написал?…

Оффлайн Dark Smoke

  • Автор темы
  • Активист
  • *
  • Сообщений: 310
    • Просмотр профиля
    • Абонентское обслуживание и ремонт компьютеров в Днепропетровске
Re: IPTables и GRE трафик. Не пускает PPTP через IPTables.
« Ответ #4 : 09 Август 2020, 13:20:34 »
ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: enp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master br0 state UP group default qlen 1000
    link/ether 50:3e:aa:0f:5b:3a brd ff:ff:ff:ff:ff:ff
3: enp4s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
    link/ether 50:3e:aa:0f:b4:2e brd ff:ff:ff:ff:ff:ff
    inet6 fe80::523e:aaff:fe0f:b42e/64 scope link
       valid_lft forever preferred_lft forever
4: enp5s0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
    link/ether b0:6e:bf:30:d5:7e brd ff:ff:ff:ff:ff:ff
5: br0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether 50:3e:aa:0f:5b:3a brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.250/24 brd 192.168.1.255 scope global br0
       valid_lft forever preferred_lft forever
    inet6 fe80::523e:aaff:fe0f:5b3a/64 scope link
       valid_lft forever preferred_lft forever
7: vnet0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master br0 state UNKNOWN group default qlen 1000
    link/ether fe:54:00:17:05:8a brd ff:ff:ff:ff:ff:ff
    inet6 fe80::fc54:ff:fe17:58a/64 scope link
       valid_lft forever preferred_lft forever
8: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1492 qdisc pfifo_fast state UNKNOWN group default qlen 3
    link/ppp
    inet 46.98.192.98 peer 212.115.225.252/32 scope global ppp0
       valid_lft forever preferred_lft forever

# The loopback network interface
auto lo
iface lo inet loopback

# The primary network interface
allow-hotplug enp3s0
iface enp3s0 inet manual

auto br0
iface br0 inet static
    address 192.168.1.250
    netmask 255.255.255.0
    gateway 192.168.1.250
    broadcast 192.168.1.255
    bridge_ports enp3s0
    bridge_stp off
    bridge_fd 0
    bridge_maxwait 0
    dns-nameserver 8.8.8.8

auto dsl-provider
iface dsl-provider inet ppp
pre-up /bin/ip link set enp4s0 up # line maintained by pppoeconf
provider dsl-provider
post-up iptables-restore < /etc/iptables.rules100

auto enp4s0
iface enp4s0 inet manual

Онлайн AnrDaemon

  • Заслуженный пользователь
  • Старожил
  • *
  • Сообщений: 27660
    • Просмотр профиля
Re: IPTables и GRE трафик. Не пускает PPTP через IPTables.
« Ответ #5 : 09 Август 2020, 18:41:09 »
А ваш провайдер пропускает PPP трафик?
Хотите получить помощь? Потрудитесь представить запрошенную информацию в полном объёме.

Прежде чем [Отправить], нажми [Просмотр] и прочти собственное сообщение. Сам-то понял, что написал?…

Оффлайн Dark Smoke

  • Автор темы
  • Активист
  • *
  • Сообщений: 310
    • Просмотр профиля
    • Абонентское обслуживание и ремонт компьютеров в Днепропетровске
Re: IPTables и GRE трафик. Не пускает PPTP через IPTables.
« Ответ #6 : 09 Август 2020, 20:20:52 »
Да, пропускает, если я подключаю обычный роутер и на нем настраиваю интернет, то все работает хорошо, а через сервер не могу настроить :( где-то косяк, но найти где не могу.

Оффлайн Dark Smoke

  • Автор темы
  • Активист
  • *
  • Сообщений: 310
    • Просмотр профиля
    • Абонентское обслуживание и ремонт компьютеров в Днепропетровске
Re: IPTables и GRE трафик. Не пускает PPTP через IPTables.
« Ответ #7 : 11 Август 2020, 00:49:41 »
Мистика (

Оффлайн Dark Smoke

  • Автор темы
  • Активист
  • *
  • Сообщений: 310
    • Просмотр профиля
    • Абонентское обслуживание и ремонт компьютеров в Днепропетровске
Re: IPTables и GRE трафик. Не пускает PPTP через IPTables.
« Ответ #8 : 24 Август 2020, 09:58:02 »
Коллеги, а есть еще идеи в чем может быть дело?

 

Страница сгенерирована за 0.085 секунд. Запросов: 25.