From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on sa.int.altlinux.org X-Spam-Level: X-Spam-Status: No, score=0.2 required=5.0 tests=BAYES_00, SPF_PASS, SUBJ_RE_NUM autolearn=no version=3.2.5 From: =?koi8-r?Q?=F7=CC=C1=C4=C9=CD=C9=D2_=F3=C1=CC=CF=CD=C1=D4=C9=CE?= To: shigorin@gmail.com, ALT Linux sysadmin discuss Mime-Version: 1.0 X-Mailer: mPOP Web-Mail 2.19 X-Originating-IP: 192.168.1.2 via proxy [77.247.90.85] Date: Mon, 30 Nov 2009 22:23:07 +0300 References: <20091130182303.GP32681@osdn.org.ua> In-Reply-To: <20091130182303.GP32681@osdn.org.ua> Content-Type: text/plain; charset=koi8-r Content-Transfer-Encoding: 8bit Message-Id: X-Spam: Not detected X-Mras: Ok Subject: Re: [Sysadmins] =?koi8-r?b?68/X3sXHIDUuMCAtINPU0sHOzs8g0sHCz9TBxdQg?= =?koi8-r?b?TkFUIN7F0sXaIHBwcG9l?= X-BeenThere: sysadmins@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: =?koi8-r?Q?=F7=CC=C1=C4=C9=CD=C9=D2_=F3=C1=CC=CF=CD=C1=D4=C9=CE?= , ALT Linux sysadmin discuss List-Id: ALT Linux sysadmin discuss List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Nov 2009 19:23:21 -0000 Archived-At: List-Archive: > Что-то насчёт хопов и tcpdump на этом pppoe... > tcpdump выводит что-то такое. Я понимаю, что пакеты ходят, но понять чем это може помочь мне пока не могу. Это я на ya.ru пытаюсь подключиться 192.168.1.2 локальная машина 91.144.134.30 внешний IP сервера Может кто-что в этом уидет? root@comp-Dual-Core--ec75a3 squid]# tcpdump -n -i ppp1 -l | tee tmp.log tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on ppp1, link-type LINUX_SLL (Linux cooked), capture size 96 bytes 00:17:34.563830 IP 91.144.134.30.54754 > 91.144.134.3.domain: 25478+ [1au] A? ya.ru. (34) 00:17:34.564759 IP 91.144.134.3.domain > 91.144.134.30.54754: 25478 3/2/1 A 77.88.21.8, A[|domain] 00:17:34.565833 IP 91.144.134.30.41113 > 93.158.134.8.http: S 3177273342:3177273342(0) win 5240 00:17:34.605322 IP 93.158.134.8.http > 192.168.1.2.41113: S 1970114950:1970114950(0) ack 3177273343 win 8192 00:17:34.605511 IP 91.144.134.30.41113 > 93.158.134.8.http: . ack 1970114951 win 41 00:17:34.605678 IP 91.144.134.30.41113 > 93.158.134.8.http: . 0:48(48) ack 1 win 41 00:17:34.605711 IP 91.144.134.30.41113 > 93.158.134.8.http: . 48:96(48) ack 1 win 41 00:17:34.644471 IP 93.158.134.8.http > 192.168.1.2.41113: . ack 97 win 1014 00:17:34.644611 IP 192.168.1.2.41113 > 93.158.134.8.http: R 3177273439:3177273439(0) win 0 00:17:37.604735 IP 91.144.134.30.41113 > 93.158.134.8.http: . 0:48(48) ack 1 win 41 00:17:37.643433 IP 93.158.134.8.http > 192.168.1.2.41113: . ack 97 win 1014 00:17:37.643567 IP 192.168.1.2.41113 > 93.158.134.8.http: R 3177273439:3177273439(0) win 0 00:17:43.606482 IP 91.144.134.30.41113 > 93.158.134.8.http: . 0:48(48) ack 1 win 41 00:17:43.645402 IP 93.158.134.8.http > 192.168.1.2.41113: . ack 97 win 1014 00:17:43.645548 IP 192.168.1.2.41113 > 93.158.134.8.http: R 3177273439:3177273439(0) win 0 00:17:55.608012 IP 91.144.134.30.41113 > 93.158.134.8.http: . 0:48(48) ack 1 win 41 00:17:55.647201 IP 93.158.134.8.http > 192.168.1.2.41113: . ack 97 win 1014 00:17:55.647335 IP 192.168.1.2.41113 > 93.158.134.8.http: R 3177273439:3177273439(0) win 0 00:18:04.164445 IP 91.144.134.30.35550 > 83.229.210.18.ntp: NTPv4, Client, length 48 00:18:04.201999 IP 83.229.210.18.ntp > 91.144.134.30.35550: NTPv4, Server, length 48 00:18:19.603062 IP 91.144.134.30.41113 > 93.158.134.8.http: . 0:48(48) ack 1 win 41 00:18:19.642490 IP 93.158.134.8.http > 192.168.1.2.41113: . ack 97 win 1014 00:18:19.642616 IP 192.168.1.2.41113 > 93.158.134.8.http: R 3177273439:3177273439(0) win 0 00:18:21.174598 IP 91.144.134.30 > 93.186.231.219: ICMP echo request, id 29218, seq 18945, length 29 00:18:21.227923 IP 93.186.231.219 > 91.144.134.30: ICMP echo reply, id 29218, seq 18945, length 29 00:18:23.020912 IP 91.144.134.30 > 217.106.234.202: ICMP echo request, id 29218, seq 19201, length 32 00:18:23.061512 IP 217.106.234.202 > 91.144.134.30: ICMP echo reply, id 29218, seq 19201, length 32 00:18:31.243438 IP 91.144.134.30 > 74.201.144.26: ICMP echo request, id 29218, seq 19457, length 41 00:18:31.413034 IP 74.201.144.26 > 91.144.134.30: ICMP echo reply, id 29218, seq 19457, length 41