Jump to content

dsolo

Forum Members
  • Posts

    10
  • Joined

  • Last visited

Posts posted by dsolo

  1. @DennoN

    Временно очистил все файлы. Оставил только AS32934.
    Я так понимаю, что IP адреса он не получает:
     

    Скрытый текст

    ~ # ./Bird4Static/scripts/add-bird4_routes.sh -d

    ########### Sat Feb 17 19:58:41 MSK 2024 STEP_2: add init files ###########


    ########### Sat Feb 17 19:58:41 MSK 2024 STEP_1: wait dns ###########


    ########### Sat Feb 17 19:58:41 MSK 2024 STEP_3: diff antifilter.list ###########


    ########### Sat Feb 17 19:58:41 MSK 2024 STEP_3: diff bird4-base-vpn.list ###########


    ########### Sat Feb 17 19:58:41 MSK 2024 STEP_4: ipr func file antifilter.list ###########

    iprange: Loading from stdin
    iprange: NON-OPTIMIZED stdin at line 5, entry 4, last was 1.255.53.122 (33502586) - 1.255.53.122 (33502586), new is 1.32.194.0 (18924032) - 1.32.194.255 (18924287)
    iprange: Loaded non-optimized stdin
    iprange: Optimizing combined ipset
    iprange: Printing combined ipset with 23163 ranges, 4241164 unique IPs

    24281 printed CIDRs, break down by prefix:
            - prefix /16 counts 2 entries
            - prefix /17 counts 2 entries
            - prefix /18 counts 8 entries
            - prefix /19 counts 33 entries
            - prefix /20 counts 83 entries
            - prefix /21 counts 131 entries
            - prefix /22 counts 660 entries
            - prefix /23 counts 3066 entries
            - prefix /24 counts 2291 entries
            - prefix /25 counts 1007 entries
            - prefix /26 counts 579 entries
            - prefix /27 counts 440 entries
            - prefix /28 counts 273 entries
            - prefix /29 counts 266 entries
            - prefix /30 counts 210 entries
            - prefix /31 counts 166 entries
            - prefix /32 counts 15064 entries

    totals: 24881 lines read, 23163 distinct IP ranges found, 17 CIDR prefixes, 24281 CIDRs printed, 4241164 unique IPs
    completed in 0.37367 seconds (read 0.21666 + think 0.00000 + speak 0.15701)

    ########### Sat Feb 17 19:58:42 MSK 2024 STEP_3: diff bird4-force-isp.list ###########


    ########### Sat Feb 17 19:58:42 MSK 2024 STEP_4: ipr func file user-isp.list ###########

    iprange: Loading from stdin
    iprange: Printing combined ipset with 0 ranges, 0 unique IPs

    0 printed CIDRs, break down by prefix:

    totals: 0 lines read, 0 distinct IP ranges found, 0 CIDR prefixes, 0 CIDRs printed, 0 unique IPs
    completed in 0.01031 seconds (read 0.00979 + think 0.00008 + speak 0.00044)

    ########### Sat Feb 17 19:58:42 MSK 2024 STEP_3: diff bird4-force-vpn1.list ###########


    ########### Sat Feb 17 19:58:42 MSK 2024 STEP_4: ipr func file user-vpn.list ###########

    iprange: Loading from stdin

    ########### Sat Feb 17 19:58:42 MSK 2024 STEP_X: get as from file user-vpn.list ###########


    AS32934
    iprange: Printing combined ipset with 0 ranges, 0 unique IPs

    0 printed CIDRs, break down by prefix:

    totals: 0 lines read, 0 distinct IP ranges found, 0 CIDR prefixes, 0 CIDRs printed, 0 unique IPs
    completed in 0.08168 seconds (read 0.08139 + think 0.00000 + speak 0.00028)

    ########### Sat Feb 17 19:58:42 MSK 2024 STEP_5: restart bird ###########

    ~ #
     

     

    AS из твоего поста аналогично:
     

    Скрытый текст


    ~ # ./Bird4Static/scripts/add-bird4_routes.sh -d

    ########### Sat Feb 17 20:00:52 MSK 2024 STEP_2: add init files ###########


    ########### Sat Feb 17 20:00:52 MSK 2024 STEP_1: wait dns ###########


    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_3: diff antifilter.list ###########


    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_3: diff bird4-base-vpn.list ###########


    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_4: ipr func file antifilter.list ###########

    iprange: Loading from stdin
    iprange: NON-OPTIMIZED stdin at line 5, entry 4, last was 1.255.53.122 (33502586) - 1.255.53.122 (33502586), new is 1.32.194.0 (18924032) - 1.32.194.255 (18924287)
    iprange: Loaded non-optimized stdin
    iprange: Optimizing combined ipset
    iprange: Printing combined ipset with 23163 ranges, 4241164 unique IPs

    24281 printed CIDRs, break down by prefix:
            - prefix /16 counts 2 entries
            - prefix /17 counts 2 entries
            - prefix /18 counts 8 entries
            - prefix /19 counts 33 entries
            - prefix /20 counts 83 entries
            - prefix /21 counts 131 entries
            - prefix /22 counts 660 entries
            - prefix /23 counts 3066 entries
            - prefix /24 counts 2291 entries
            - prefix /25 counts 1007 entries
            - prefix /26 counts 579 entries
            - prefix /27 counts 440 entries
            - prefix /28 counts 273 entries
            - prefix /29 counts 266 entries
            - prefix /30 counts 210 entries
            - prefix /31 counts 166 entries
            - prefix /32 counts 15064 entries

    totals: 24881 lines read, 23163 distinct IP ranges found, 17 CIDR prefixes, 24281 CIDRs printed, 4241164 unique IPs
    completed in 0.36976 seconds (read 0.22431 + think 0.00000 + speak 0.14545)

    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_3: diff bird4-force-isp.list ###########


    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_4: ipr func file user-isp.list ###########

    iprange: Loading from stdin
    iprange: Printing combined ipset with 0 ranges, 0 unique IPs

    0 printed CIDRs, break down by prefix:

    totals: 0 lines read, 0 distinct IP ranges found, 0 CIDR prefixes, 0 CIDRs printed, 0 unique IPs
    completed in 0.01294 seconds (read 0.01270 + think 0.00000 + speak 0.00024)

    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_3: diff bird4-force-vpn1.list ###########


    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_4: ipr func file user-vpn.list ###########

    iprange: Loading from stdin

    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_X: get as from file user-vpn.list ###########


    AS13414
    iprange: Printing combined ipset with 0 ranges, 0 unique IPs

    0 printed CIDRs, break down by prefix:

    totals: 0 lines read, 0 distinct IP ranges found, 0 CIDR prefixes, 0 CIDRs printed, 0 unique IPs
    completed in 0.08156 seconds (read 0.08143 + think 0.00000 + speak 0.00013)

    ########### Sat Feb 17 20:00:53 MSK 2024 STEP_5: restart bird ###########
     


    Проблема решена.
    Спасибо из debug режима понял, что ни для какой AS не возвращаются записи. не работал curl (Error 48). К счастью решилось обновлением всех пакетов.

    • Upvote 2
  2. @DennoN

    Добрый день. Вчера от нечего делать обновился на последнюю версию.

    Ситуация следующая:
    Instagram не загружает контент по этому адресу: scontent-ams4-1.cdninstagram.com
    Трассировка показывает следующий IP: 157.240.201.63
    В файле user-vpn.list указаны AS Facebook:
    AS32934
    AS54115
    AS63293
    AS149642
    Скрипт получает подсети по этому адресу: https://stat.ripe.net/data/announced-prefixes/data.json?resource=AS32934
    Требуемая подсеть есть в списке.
    Только если укажу в файле явно 157.240.201.0/24, то начинает грузить контент из Instagram.

    Сломался функционал получения IP из AS?
    Хотя при этом AS Cloudflare нормально заворачивается: AS13335.

  3. 10 часов назад, Chelovek3000 сказал:

    Всем привет, поясните плез как только до своего списка сайтов через vpn ходить?

    Я вносил сюда - /opt/root/Bird4Static/lists/user-vpn.list

    Перезапускал - /opt/root/Bird4Static/scripts/add-bird4_routes.sh

    Отлетал(

     image.png

    Похоже на то, что у тебя вообще не работает обход. Ты сюда ходил: https://github.com/DennoN-RUS/Bird4Static ?
    Там под 7 пунктом ответ на твой вопрос.

  4. 2 минуты назад, DennoN сказал:

    а разве по пути /opt/etc/ndm/ifstatechanged.d/ этого файла нет? Это файл был в версиях до 3

    В первой он просто копировался в эту папку,  во второй это был симлинк с файла addtable.sh который в папке Bird4Static/scripts

    Можно там его ещё поискать

    Везде поискал. Нет ни файла, ни упоминания его где-либо. Что за магия, не понимаю.

  5. Июн 23 19:49:55
    ndm
    Io::File: unable to open "/opt/etc/ndm/ifstatechanged.d/010-add_antizapret_route.sh": no such file or directory.
    Июн 23 19:49:55
    ndm
    Opkg::Manager: unable to open file: /opt/etc/ndm/ifstatechanged.d/010-add_antizapret_route.sh.


    В консоль постоянно сыпется вот это. Явно артефакт от прошлых версий. Как можно починить это?
    Что интересно, если сделать grep -r "010-add_antizapret_route.sh", то он нигде не находит упоминание этого файла.

  6. В связи с новыми событиями возможно ли добавить поддержку ASN в файл с исключениями? Чтобы не вводить все IP.

    Например список для FB + Instagram выглядел бы просто так:

    AS32934
    AS54115
    AS63293
    AS149642

    Вместо двух сотен подсетей.

    • Upvote 2
  7. В файле add-bird4_routes.sh закомментировал ещё строку "curl -sf $URL0 | sed 's/^/route /' | sed  's/$/ via "'$VPN'";/' >> $ROUTE"б, теперь скрипт запускается. Но всё равно после первого подключения к VPN всё ломается.
    Перестаёт подключаться к VPN. Я даже не могу объяснить это. Переключаю ползунок рядом с VPN в "Другие подключения", всё ок, написано "Готов". Потом спустя время вижу "Ошибка подключения" и в журнале циклично пытается подключиться. Привожу копипаст одного цикла.
     

    Spoiler
    Фев 21 02:18:34
     
    ndm
    Core::Syslog: the system log has been cleared.
    Фев 21 02:18:35
     
    bndstrg
    band steering: send BTM request to 32:a3:28:83:e8:e4 for roam to 2.4GHz band (Low RSSI: -78)
    Фев 21 02:18:35
     
    bndstrg
    band steering: WNM client 32:a3:28:83:e8:e4 rejected 2.4GHz band (code: 6)
    Фев 21 02:18:38
     
    pppd_L2TP0
    control init failed
    Фев 21 02:18:38
     
    pppd_L2TP0
    Couldn't get channel number: Bad file descriptor
    Фев 21 02:18:38
     
    pppd_L2TP0
    Exit.
    Фев 21 02:18:38
     
    ndm
    Service: "L2TP0": unexpectedly stopped.
    Фев 21 02:18:38
     
    ndm
    Network::Interface::Base: "L2TP0": interface is up.
    Фев 21 02:18:38
     
    ndm
    Network::Interface::Ppp: "L2TP0": disabled connection.
    Фев 21 02:18:38
     
    ndm
    IpSec::Manager: "L2TP0": IP secure connection and keys was deleted.
    Фев 21 02:18:38
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": remote endpoint is resolved to "95.182.123.183".
    Фев 21 02:18:38
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": connecting via ISP (GigabitEthernet1).
    Фев 21 02:18:38
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": local endpoint is resolved to "95.31.196.5".
    Фев 21 02:18:38
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": added host route to 95.182.123.183 via 95.31.196.6 (GigabitEthernet1).
    Фев 21 02:18:38
     
    ndm
    Network::Interface::L2tp: "L2TP0": using port 41286 as local.
    Фев 21 02:18:38
     
    ndm
    Network::Interface::L2tp: "L2TP0": updating IP secure configuration.
    Фев 21 02:18:38
     
    ndm
    IpSec::Manager: "L2TP0": IP secure connection was added.
    Фев 21 02:18:40
     
    ndm
    IpSec::Manager: create IPsec reconfiguration transaction...
    Фев 21 02:18:40
     
    ndm
    IpSec::Manager: add config for crypto map "VPNL2TPServer".
    Фев 21 02:18:40
     
    ndm
    IpSec::Manager: add config for crypto map "L2TP0".
    Фев 21 02:18:40
     
    ndm
    IpSec::Manager: IPsec reconfiguration transaction was created.
    Фев 21 02:18:41
     
    ndm
    IpSec::Configurator: start applying IPsec configuration.
    Фев 21 02:18:41
     
    ndm
    IpSec::Configurator: IPsec configuration applying is done.
    Фев 21 02:18:41
     
    ndm
    IpSec::Configurator: start reloading IKE keys task.
    Фев 21 02:18:41
     
    ndm
    Network::Interface::L2tp: "L2TP0": IPsec layer is down, shutdown L2TP layer.
    Фев 21 02:18:41
     
    ndm
    Network::Interface::Ppp: "L2TP0": disabled connection.
    Фев 21 02:18:41
     
    ipsec
    03[CFG] rereading secrets
    Фев 21 02:18:41
     
    ipsec
    03[CFG] loading secrets
    Фев 21 02:18:41
     
    ipsec
    03[CFG] loaded IKE secret for %any
    Фев 21 02:18:41
     
    ipsec
    03[CFG] loaded IKE secret for cmap:L2TP0
    Фев 21 02:18:41
     
    ipsec
    03[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    Фев 21 02:18:41
     
    ndm
    IpSec::Configurator: reloading IKE keys task done.
    Фев 21 02:18:41
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": remote endpoint is resolved to "95.182.123.183".
    Фев 21 02:18:41
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": connecting via ISP (GigabitEthernet1).
    Фев 21 02:18:41
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": local endpoint is resolved to "95.31.196.5".
    Фев 21 02:18:41
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": added host route to 95.182.123.183 via 95.31.196.6 (GigabitEthernet1).
    Фев 21 02:18:41
     
    ndm
    Network::Interface::L2tp: "L2TP0": using port 41216 as local.
    Фев 21 02:18:41
     
    ndm
    Network::Interface::L2tp: "L2TP0": updating IP secure configuration.
    Фев 21 02:18:41
     
    ndm
    IpSec::Manager: "L2TP0": IP secure connection and keys was deleted.
    Фев 21 02:18:41
     
    ndm
    IpSec::Manager: "L2TP0": IP secure connection was added.
    Фев 21 02:18:41
     
    ndm
    IpSec::Configurator: start reloading IPsec config task.
    Фев 21 02:18:41
     
    ipsec
    13[CFG] received stroke: delete connection 'VPNL2TPServer'
    Фев 21 02:18:41
     
    ipsec
    13[CFG] deleted connection 'VPNL2TPServer'
    Фев 21 02:18:41
     
    ipsec
    05[CFG] received stroke: delete connection 'L2TP0'
    Фев 21 02:18:41
     
    ipsec
    05[CFG] deleted connection 'L2TP0'
    Фев 21 02:18:41
     
    ipsec
    00[DMN] signal of type SIGHUP received. Reloading configuration
    Фев 21 02:18:41
     
    ipsec
    06[CFG] received stroke: add connection 'VPNL2TPServer'
    Фев 21 02:18:41
     
    ipsec
    00[CFG] loaded 0 entries for attr plugin configuration
    Фев 21 02:18:41
     
    ipsec
    06[CFG] added configuration 'VPNL2TPServer'
    Фев 21 02:18:41
     
    ipsec
    11[CFG] received stroke: add connection 'L2TP0'
    Фев 21 02:18:41
     
    ipsec
    00[CFG] loaded 1 RADIUS server configuration
    Фев 21 02:18:41
     
    ipsec
    11[CFG] added configuration 'L2TP0'
    Фев 21 02:18:41
     
    ndm
    IpSec::IpSecNetfilter: start reloading netfilter configuration...
    Фев 21 02:18:41
     
    ndm
    IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    Фев 21 02:18:41
     
    ndm
    IpSec::Configurator: reloading IPsec config task done.
    Фев 21 02:18:43
     
    ndm
    IpSec::Configurator: "L2TP0": crypto map shutdown started.
    Фев 21 02:18:43
     
    ipsec
    12[CFG] received stroke: unroute 'L2TP0'
    Фев 21 02:18:43
     
    ipsec
    03[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    Фев 21 02:18:43
     
    ipsec
    03[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    Фев 21 02:18:43
     
    ipsec
    03[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    Фев 21 02:18:43
     
    ipsec
    03[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    Фев 21 02:18:43
     
    ndm
    IpSec::Manager: create IPsec reconfiguration transaction...
    Фев 21 02:18:43
     
    ipsec
    13[CFG] received stroke: terminate 'L2TP0{*}'
    Фев 21 02:18:43
     
    ipsec
    16[IKE] closing CHILD_SA L2TP0{2} with SPIs c21801e1_i (0 bytes) 5af2ad6f_o (435 bytes) and TS 95.31.196.5/32[udp/41289] === 95.182.123.183/32[udp/l2tp]
    Фев 21 02:18:43
     
    ipsec
    07[CFG] received stroke: terminate 'L2TP0[*]'
    Фев 21 02:18:43
     
    ndm
    IpSec::Configurator: "L2TP0": crypto map shutdown complete.
    Фев 21 02:18:43
     
    ndm
    IpSec::CryptoMapInfo: "L2TP0": crypto map active IKE SA: 0, active CHILD SA: 0.
    Фев 21 02:18:43
     
    ndm
    IpSec::Manager: add config for crypto map "VPNL2TPServer".
    Фев 21 02:18:43
     
    ndm
    IpSec::Manager: add config for crypto map "L2TP0".
    Фев 21 02:18:43
     
    ndm
    IpSec::Manager: IPsec reconfiguration transaction was created.
    Фев 21 02:18:43
     
    ndm
    IpSec::CryptoMapInfo: "L2TP0": crypto map active IKE SA: 0, active CHILD SA: 0.
    Фев 21 02:18:43
     
    ndm
    IpSec::Configurator: start applying IPsec configuration.
    Фев 21 02:18:43
     
    ndm
    IpSec::Configurator: IPsec configuration applying is done.
    Фев 21 02:18:43
     
    ndm
    IpSec::Configurator: start reloading IKE keys task.
    Фев 21 02:18:43
     
    ipsec
    08[CFG] rereading secrets
    Фев 21 02:18:43
     
    ipsec
    08[CFG] loading secrets
    Фев 21 02:18:43
     
    ipsec
    08[CFG] loaded IKE secret for %any
    Фев 21 02:18:43
     
    ipsec
    08[CFG] loaded IKE secret for cmap:L2TP0
    Фев 21 02:18:43
     
    ipsec
    08[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    Фев 21 02:18:43
     
    ndm
    IpSec::Configurator: reloading IKE keys task done.
    Фев 21 02:18:43
     
    ndm
    IpSec::CryptoMapInfo: "L2TP0": crypto map active IKE SA: 0, active CHILD SA: 0.
    Фев 21 02:18:43
     
    ipsec
    16[IKE] sending DELETE for ESP CHILD_SA with SPI c21801e1
    Фев 21 02:18:43
     
    ipsec
    11[IKE] deleting IKE_SA L2TP0[2] between 95.31.196.5[95.31.196.5]...95.182.123.183[95.182.123.183]
    Фев 21 02:18:43
     
    ipsec
    11[IKE] sending DELETE for IKE_SA L2TP0[2]
    Фев 21 02:18:43
     
    ndm
    IpSec::Configurator: start reloading IPsec config task.
    Фев 21 02:18:43
     
    ipsec
    12[CFG] received stroke: delete connection 'VPNL2TPServer'
    Фев 21 02:18:43
     
    ipsec
    12[CFG] deleted connection 'VPNL2TPServer'
    Фев 21 02:18:43
     
    ipsec
    10[CFG] received stroke: delete connection 'L2TP0'
    Фев 21 02:18:43
     
    ipsec
    10[CFG] deleted connection 'L2TP0'
    Фев 21 02:18:43
     
    ipsec
    00[DMN] signal of type SIGHUP received. Reloading configuration
    Фев 21 02:18:43
     
    ipsec
    13[CFG] received stroke: add connection 'VPNL2TPServer'
    Фев 21 02:18:43
     
    ipsec
    00[CFG] loaded 0 entries for attr plugin configuration
    Фев 21 02:18:43
     
    ipsec
    00[CFG] loaded 1 RADIUS server configuration
    Фев 21 02:18:43
     
    ipsec
    13[CFG] added configuration 'VPNL2TPServer'
    Фев 21 02:18:43
     
    ipsec
    03[CFG] received stroke: add connection 'L2TP0'
    Фев 21 02:18:43
     
    ndm
    IpSec::IpSecNetfilter: start reloading netfilter configuration...
    Фев 21 02:18:43
     
    ipsec
    03[CFG] added configuration 'L2TP0'
    Фев 21 02:18:43
     
    ndm
    IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    Фев 21 02:18:43
     
    ndm
    IpSec::Configurator: reloading IPsec config task done.
    Фев 21 02:18:43
     
    ndm
    IpSec::CryptoMapInfo: "L2TP0": crypto map active IKE SA: 0, active CHILD SA: 0.
    Фев 21 02:18:45
     
    ndm
    IpSec::Configurator: "L2TP0": crypto map shutdown started.
    Фев 21 02:18:45
     
    ipsec
    08[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    Фев 21 02:18:45
     
    ipsec
    08[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    Фев 21 02:18:45
     
    ipsec
    08[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    Фев 21 02:18:45
     
    ipsec
    08[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    Фев 21 02:18:45
     
    ipsec
    16[CFG] received stroke: unroute 'L2TP0'
    Фев 21 02:18:45
     
    ipsec
    14[CFG] received stroke: terminate 'L2TP0{*}'
    Фев 21 02:18:45
     
    ipsec
    14[CFG] no CHILD_SA named 'L2TP0' found
    Фев 21 02:18:45
     
    ipsec
    07[CFG] received stroke: terminate 'L2TP0[*]'
    Фев 21 02:18:45
     
    ipsec
    07[CFG] no IKE_SA named 'L2TP0' found
    Фев 21 02:18:45
     
    ndm
    IpSec::Configurator: "L2TP0": crypto map shutdown complete.
    Фев 21 02:18:46
     
    ipsec
    10[CFG] received stroke: initiate 'L2TP0'
    Фев 21 02:18:46
     
    ipsec
    05[IKE] sending DPD vendor ID
    Фев 21 02:18:46
     
    ndm
    IpSec::Configurator: "L2TP0": crypto map initialized.
    Фев 21 02:18:46
     
    ipsec
    05[IKE] sending FRAGMENTATION vendor ID
    Фев 21 02:18:46
     
    ipsec
    05[IKE] sending NAT-T (RFC 3947) vendor ID
    Фев 21 02:18:46
     
    ipsec
    05[IKE] sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
    Фев 21 02:18:46
     
    ipsec
    05[IKE] initiating Main Mode IKE_SA L2TP0[3] to 95.182.123.183
    Фев 21 02:18:46
     
    ipsec
    06[IKE] received NAT-T (RFC 3947) vendor ID
    Фев 21 02:18:46
     
    ipsec
    06[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
    Фев 21 02:18:46
     
    ipsec
    06[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
    Фев 21 02:18:46
     
    ipsec
    06[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
    Фев 21 02:18:46
     
    ipsec
    06[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID
    Фев 21 02:18:46
     
    ipsec
    06[IKE] received DPD vendor ID
    Фев 21 02:18:46
     
    ipsec
    06[CFG] received proposals: IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
    Фев 21 02:18:46
     
    ipsec
    06[CFG] configured proposals: IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
    Фев 21 02:18:46
     
    ipsec
    06[CFG] selected proposal: IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
    Фев 21 02:18:46
     
    ipsec
    13[IKE] found linked key for crypto map 'L2TP0'
    Фев 21 02:18:46
     
    ipsec
    13[IKE] local host is behind NAT, sending keep alives
    Фев 21 02:18:46
     
    ipsec
    16[IKE] IKE_SA L2TP0[3] established between 95.31.196.5[95.31.196.5]...95.182.123.183[95.182.123.183]
    Фев 21 02:18:46
     
    ipsec
    16[IKE] scheduling reauthentication in 28770s
    Фев 21 02:18:46
     
    ipsec
    16[IKE] maximum IKE_SA lifetime 28790s
    Фев 21 02:18:47
     
    ndm
    IpSec::CryptoMapInfo: "L2TP0": crypto map active IKE SA: 1, active CHILD SA: 0.
    Фев 21 02:18:47
     
    ipsec
    08[IKE] no matching CHILD_SA config found for 95.182.123.183/32[udp/l2tp] === 95.31.196.5/32[udp/41289]
    Фев 21 02:18:47
     
    ipsec
    03[CFG] received proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
    Фев 21 02:18:47
     
    ipsec
    03[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ
    Фев 21 02:18:47
     
    ipsec
    03[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
    Фев 21 02:18:47
     
    ipsec
    03[IKE] CHILD_SA L2TP0{3} established with SPIs cac9ac1a_i 0bddf96a_o and TS 95.31.196.5/32[udp/41216] === 95.182.123.183/32[udp/l2tp]
    Фев 21 02:18:47
     
    ndm
    IpSec::Configurator: crypto map "L2TP0" is up.
    Фев 21 02:18:47
     
    ndm
    IpSec::CryptoMapInfo: "L2TP0": crypto map active IKE SA: 1, active CHILD SA: 1.
    Фев 21 02:18:47
     
    ndm
    Network::Interface::L2tp: "L2TP0": IPsec layer is up, do start L2TP layer.
    Фев 21 02:18:47
     
    ndm
    Network::Interface::Ppp: "L2TP0": enabled connection via any interface.
    Фев 21 02:18:47
     
    ndm
    IpSec::IpSecNetfilter: start reloading netfilter configuration...
    Фев 21 02:18:47
     
    ndm
    IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    Фев 21 02:18:48
     
    ipsec
    09[IKE] received retransmit of request with ID 2474906703, but no response to retransmit
    Фев 21 02:18:49
     
    l2tp[2031]
    Plugin pppol2tp.so loaded.
    Фев 21 02:18:49
     
    l2tp[2031]
    pppd 2.4.4-4 started by root, uid 0
    Фев 21 02:18:49
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": added host route to 95.182.123.183 via 95.31.196.6 (GigabitEthernet1).
    Фев 21 02:18:49
     
    pppd_L2TP0
    l2tp_control v2.02
    Фев 21 02:18:49
     
    pppd_L2TP0
    remote host: 95.182.123.183:1701
    Фев 21 02:18:49
     
    pppd_L2TP0
    local bind: 95.31.196.5:41216
    Фев 21 02:18:50
     
    ipsec
    09[IKE] received retransmit of request with ID 2474906703, but no response to retransmit
    Фев 21 02:18:51
     
    pppd_L2TP0
    l2tp: timeout of sccrp, retry sccrq, try: 1
    Фев 21 02:18:52
     
    ipsec
    07[IKE] received retransmit of request with ID 2474906703, but no response to retransmit
    Фев 21 02:18:53
     
    pppd_L2TP0
    l2tp: timeout of sccrp, retry sccrq, try: 2
    Фев 21 02:18:55
     
    pppd_L2TP0
    l2tp: timeout of sccrp, retry sccrq, try: 3
    Фев 21 02:18:57
     
    pppd_L2TP0
    l2tp: timeout of sccrp, retry sccrq, try: 4
    Фев 21 02:18:57
     
    ipsec
    14[IKE] received DELETE for ESP CHILD_SA with SPI b9da6b32
    Фев 21 02:18:57
     
    ipsec
    14[IKE] CHILD_SA not found, ignored
    Фев 21 02:18:59
     
    pppd_L2TP0
    l2tp: timeout of sccrp, retry sccrq, try: 5
    Фев 21 02:18:59
     
    pppd_L2TP0
    l2tp: sccrq failed, fatal
    Фев 21 02:18:59
     
    pppd_L2TP0
    l2tp: shutting down control connection
    Фев 21 02:19:01
     
    pppd_L2TP0
    l2tp: shutdown completed

     

  8. Вероятно мой сервер попал в список "заблокированных", как ранее писали ложные срабатывания возможны за счёт того, что список формируется не по 1 IP в строке, а как бы масками.

    Перезагружаю роутер с выключенным VPN. Подключаюсь по SSH к своему VPN-серверу, всё ок, В "Другие подключения" включаю VPN. После этого больше не могу подключиться по SSH к своему серверу.

    Добавил в белый список IP и домен своего сервера. Не помогает.

    Spoiler
    Фев 21 01:50:47
     
    ndm
    Network::Interface::Base: "L2TP0": interface is up.
    Фев 21 01:50:47
     
    ndm
    IpSec::Manager: service enabled.
    Фев 21 01:50:47
     
    ndm
    Core::ConfigurationSaver: saving configuration...
    Фев 21 01:50:47
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": interface state is changed, reconnecting.
    Фев 21 01:50:47
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": remote endpoint is resolved to "95.182.123.183".
    Фев 21 01:50:47
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": connecting via ISP (GigabitEthernet1).
    Фев 21 01:50:47
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": local endpoint is resolved to "95.31.196.5".
    Фев 21 01:50:47
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": added host route to 95.182.123.183 via 95.31.196.6 (GigabitEthernet1).
    Фев 21 01:50:47
     
    ndm
    Network::Interface::L2tp: "L2TP0": using port 41271 as local.
    Фев 21 01:50:47
     
    ndm
    Network::Interface::L2tp: "L2TP0": updating IP secure configuration.
    Фев 21 01:50:47
     
    ndm
    IpSec::Manager: "L2TP0": IP secure connection was added.
    Фев 21 01:50:47
     
    ndm
    IpSec::IpSecNetfilter: start reloading netfilter configuration...
    Фев 21 01:50:47
     
    ndm
    IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    Фев 21 01:50:49
     
    ndm
    IpSec::Manager: create IPsec reconfiguration transaction...
    Фев 21 01:50:49
     
    ndm
    IpSec::Manager: add config for crypto map "VPNL2TPServer".
    Фев 21 01:50:49
     
    ndm
    IpSec::Manager: add config for crypto map "L2TP0".
    Фев 21 01:50:49
     
    ndm
    IpSec::Manager: IPsec reconfiguration transaction was created.
    Фев 21 01:50:49
     
    ndm
    IpSec::Configurator: start applying IPsec configuration.
    Фев 21 01:50:49
     
    ndm
    IpSec::Configurator: IPsec configuration applying is done.
    Фев 21 01:50:49
     
    ndm
    IpSec::Configurator: start reloading IKE keys task.
    Фев 21 01:50:49
     
    ipsec
    11[CFG] rereading secrets
    Фев 21 01:50:49
     
    ipsec
    11[CFG] loading secrets
    Фев 21 01:50:49
     
    ipsec
    11[CFG] loaded IKE secret for %any
    Фев 21 01:50:49
     
    ipsec
    11[CFG] loaded IKE secret for cmap:L2TP0
    Фев 21 01:50:49
     
    ipsec
    11[CFG] rereading ca certificates from '/tmp/ipsec/ipsec.d/cacerts'
    Фев 21 01:50:49
     
    ndm
    IpSec::Configurator: reloading IKE keys task done.
    Фев 21 01:50:49
     
    ndm
    IpSec::Configurator: start reloading IPsec config task.
    Фев 21 01:50:49
     
    ipsec
    14[CFG] received stroke: delete connection 'VPNL2TPServer'
    Фев 21 01:50:49
     
    ipsec
    14[CFG] deleted connection 'VPNL2TPServer'
    Фев 21 01:50:49
     
    ipsec
    00[DMN] signal of type SIGHUP received. Reloading configuration
    Фев 21 01:50:49
     
    ipsec
    08[CFG] received stroke: add connection 'VPNL2TPServer'
    Фев 21 01:50:49
     
    ipsec
    00[CFG] loaded 0 entries for attr plugin configuration
    Фев 21 01:50:49
     
    ipsec
    00[CFG] loaded 1 RADIUS server configuration
    Фев 21 01:50:49
     
    ipsec
    08[CFG] added configuration 'VPNL2TPServer'
    Фев 21 01:50:49
     
    ipsec
    16[CFG] received stroke: add connection 'L2TP0'
    Фев 21 01:50:49
     
    ipsec
    16[CFG] added configuration 'L2TP0'
    Фев 21 01:50:49
     
    ndm
    IpSec::IpSecNetfilter: start reloading netfilter configuration...
    Фев 21 01:50:49
     
    ndm
    IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    Фев 21 01:50:49
     
    ndm
    IpSec::Configurator: reloading IPsec config task done.
    Фев 21 01:50:49
     
    ipsec
    06[CFG] received stroke: initiate 'L2TP0'
    Фев 21 01:50:49
     
    ipsec
    10[IKE] sending DPD vendor ID
    Фев 21 01:50:49
     
    ipsec
    10[IKE] sending FRAGMENTATION vendor ID
    Фев 21 01:50:49
     
    ndm
    IpSec::Configurator: "L2TP0": crypto map initialized.
    Фев 21 01:50:49
     
    ipsec
    10[IKE] sending NAT-T (RFC 3947) vendor ID
    Фев 21 01:50:49
     
    ipsec
    10[IKE] sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
    Фев 21 01:50:49
     
    ipsec
    10[IKE] initiating Main Mode IKE_SA L2TP0[1] to 95.182.123.183
    Фев 21 01:50:50
     
    ipsec
    13[IKE] received NAT-T (RFC 3947) vendor ID
    Фев 21 01:50:50
     
    ipsec
    13[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
    Фев 21 01:50:50
     
    ipsec
    13[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
    Фев 21 01:50:50
     
    ipsec
    13[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
    Фев 21 01:50:50
     
    ipsec
    13[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID
    Фев 21 01:50:50
     
    ipsec
    13[IKE] received DPD vendor ID
    Фев 21 01:50:50
     
    ipsec
    13[CFG] received proposals: IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
    Фев 21 01:50:50
     
    ipsec
    13[CFG] configured proposals: IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC=128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC=256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:AES_CBC=128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024, IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
    Фев 21 01:50:50
     
    ipsec
    13[CFG] selected proposal: IKE:AES_CBC=256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
    Фев 21 01:50:50
     
    ipsec
    15[IKE] found linked key for crypto map 'L2TP0'
    Фев 21 01:50:50
     
    ipsec
    15[IKE] local host is behind NAT, sending keep alives
    Фев 21 01:50:50
     
    ipsec
    07[IKE] IKE_SA L2TP0[1] established between 95.31.196.5[95.31.196.5]...95.182.123.183[95.182.123.183]
    Фев 21 01:50:50
     
    ipsec
    07[IKE] scheduling reauthentication in 28780s
    Фев 21 01:50:50
     
    ipsec
    07[IKE] maximum IKE_SA lifetime 28800s
    Фев 21 01:50:50
     
    ndm
    IpSec::CryptoMapInfo: "L2TP0": crypto map active IKE SA: 1, active CHILD SA: 0.
    Фев 21 01:50:50
     
    ipsec
    09[CFG] received proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
    Фев 21 01:50:50
     
    ipsec
    09[CFG] configured proposals: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC=128/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:AES_CBC=256/HMAC_SHA2_256_128/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA2_256_128/NO_EXT_SEQ
    Фев 21 01:50:50
     
    ipsec
    09[CFG] selected proposal: ESP:AES_CBC=128/HMAC_SHA1_96/NO_EXT_SEQ
    Фев 21 01:50:50
     
    ipsec
    09[IKE] CHILD_SA L2TP0{1} established with SPIs cee91684_i a5716a43_o and TS 95.31.196.5/32[udp/41271] === 95.182.123.183/32[udp/l2tp]
    Фев 21 01:50:50
     
    ndm
    IpSec::Configurator: crypto map "L2TP0" is up.
    Фев 21 01:50:50
     
    ndm
    IpSec::CryptoMapInfo: "L2TP0": crypto map active IKE SA: 1, active CHILD SA: 1.
    Фев 21 01:50:50
     
    ndm
    Network::Interface::L2tp: "L2TP0": IPsec layer is up, do start L2TP layer.
    Фев 21 01:50:50
     
    ndm
    Network::Interface::Ppp: "L2TP0": enabled connection via any interface.
    Фев 21 01:50:50
     
    ndm
    IpSec::IpSecNetfilter: start reloading netfilter configuration...
    Фев 21 01:50:50
     
    ndm
    IpSec::IpSecNetfilter: netfilter configuration reloading is done.
    Фев 21 01:50:51
     
    ndm
    Core::ConfigurationSaver: configuration saved.
    Фев 21 01:50:51
     
    ipsec
    11[CFG] rereading aa certificates from '/tmp/ipsec/ipsec.d/aacerts'
    Фев 21 01:50:51
     
    ipsec
    11[CFG] rereading ocsp signer certificates from '/tmp/ipsec/ipsec.d/ocspcerts'
    Фев 21 01:50:51
     
    ipsec
    11[CFG] rereading attribute certificates from '/tmp/ipsec/ipsec.d/acerts'
    Фев 21 01:50:51
     
    ipsec
    11[CFG] rereading crls from '/tmp/ipsec/ipsec.d/crls'
    Фев 21 01:50:52
     
    l2tp[1371]
    Plugin pppol2tp.so loaded.
    Фев 21 01:50:52
     
    l2tp[1371]
    pppd 2.4.4-4 started by root, uid 0
    Фев 21 01:50:52
     
    ndm
    Network::Interface::PppTunnel: "L2TP0": added host route to 95.182.123.183 via 95.31.196.6 (GigabitEthernet1).
    Фев 21 01:50:52
     
    pppd_L2TP0
    l2tp_control v2.02
    Фев 21 01:50:52
     
    pppd_L2TP0
    remote host: 95.182.123.183:1701
    Фев 21 01:50:52
     
    pppd_L2TP0
    local bind: 95.31.196.5:41271
    Фев 21 01:50:53
     
    pppd_L2TP0
    creating in-kernel L2TP tunnel (R/L 1/57658)
    Фев 21 01:50:53
     
    pppd_L2TP0
    creating in-kernel L2TP session (R/L 1/30906)
    Фев 21 01:50:53
     
    pppd_L2TP0
    L2TP tunnel/session created
    Фев 21 01:50:53
     
    pppd_L2TP0
    PPP channel connected
    Фев 21 01:50:53
     
    pppd_L2TP0
    using channel 1
    Фев 21 01:50:53
     
    pppd_L2TP0
    Using interface ppp0
    Фев 21 01:50:53
     
    pppd_L2TP0
    Connect: ppp0 <--> l2tp[0]
    Фев 21 01:50:53
     
    pppd_L2TP0
    PAP authentication succeeded
    Фев 21 01:50:53
     
    pppd_L2TP0
    local IP address 192.168.30.10
    Фев 21 01:50:53
     
    pppd_L2TP0
    remote IP address 1.0.0.1
    Фев 21 01:50:53
     
    pppd_L2TP0
    primary DNS address 192.168.30.1
    Фев 21 01:50:53
     
    ipsec
    10[KNL] unable to receive from RT event socket No buffer space available (132)
    Фев 21 01:50:53
     
    ndm
    Network::Interface::Base: "L2TP0": interface is up.
    Фев 21 01:50:53
     
    ndm
    Network::Interface::Base: "L2TP0": interface is up.
    Фев 21 01:50:53
     
    ndm
    Network::Interface::Ppp: "L2TP0": interface "L2TP0" is global, priority 65502.
    Фев 21 01:50:53
     
    ndm
    Network::Interface::Ppp: "L2TP0": adding default route via L2TP0.
    Фев 21 01:50:53
     
    ndm
    Network::Interface::Ppp: "L2TP0": adding nameserver 192.168.30.1.
    Фев 21 01:50:53
     
    ndm
    Dns::Manager: name server 192.168.30.1 added, domain (default).
    Фев 21 01:50:53
     
    ndm
    Network::Interface::Ip: "L2TP0": IP address is 192.168.30.10/32.
    Фев 21 01:50:54
     
    coalagent
    updating configuration...
    Фев 21 01:50:54
     
    ndm
    Http::Nginx: loaded SSL certificate for "3fff06087455fb639118b3ac.keenetic.io".
    Фев 21 01:50:54
     
    ndm
    Http::Nginx: loaded SSL certificate for "dsolo.keenetic.name".
    Фев 21 01:50:54
     
    ndm
    Core::Server: started Session /var/run/ndm.core.socket.
    Фев 21 01:50:55
     
    ipsec
    14[KNL] unable to receive from RT event socket No buffer space available (132)
    Фев 21 01:50:55
     
    ndm
    Core::Session: client disconnected.
    Фев 21 01:50:55
     
    ndm
    Http::Manager: updated configuration.
    Фев 21 01:50:55
     
    ndm
    Core::Server: started Session /var/run/ndm.core.socket.
    Фев 21 01:50:55
     
    ndm
    Core::Session: client disconnected.
    Фев 21 01:50:56
     
    ipsec
    12[KNL] unable to receive from RT event socket No buffer space available (132)
    Фев 21 01:50:57
     
    ipsec
    15[KNL] unable to receive from RT event socket No buffer space available (132)
    Фев 21 01:50:57
     
    bird4
    Kernel dropped some netlink messages, will resync on next scan.

     

    Инструкция по переводу в ручной режим не работает, если закомментировать строку, как написано на github, то затем просто не запускается скрипт.

    Spoiler

    ~ # /opt/etc/cron.daily/add-bird4_routes.sh
    curl: no URL specified!
    curl: try 'curl --help' for more information

    На данный момент считаю что система с BGP вообще не состоятельна, просматриваю статистику в админке кинетика, через VPN огромное количество трафика идёт, хотя по факту надо фильтровать 3-5 сайтов, на которые я хожу раз в пару дней. Также не раз сталкиваюсь со сбоями, что непосредственно сайты мне говорят, что во время работы у вас сменился IP, а должен оставаться постоянным.

    Подскажите что мне сделать, чтобы просто обходить несколько сайтов, без всяких там BGP.

  9. Может ли способ из ссылки в первом посте быть не не достаточно точным (не знаю как ещё это назвать)?
    Например, при входе на 2ip.ru я вижу свой личный IP. При входе на заблоченный rutracker.org всё нормально, сайт открывается.
    Но сегодня я три раза неправильно ввёл пароль от VPS и попросил админов сбросить баны для моего IP, и как оказалось забанен был IP VPN.
    Я скачал с antifilter список всех IP и не нашёл в списке IP VPS. Также проверил на РКН.
    Периодически YouTube выдаёт сообщения, что на территории этой страны могут работать не все функции Premium.

  10. В родительской инструкции указано, что нужна Бета или Драфт прошивка, то есть на Релизе ваш метод работать не будет?

    Как продиагностировать работу системы? По инструкции с гитхаба не работает. До этого из проверок сделал следующее: установил OpenVPN, в приоритетах поставил его первым, пооткрывал сайтики, всё работает.

×
×
  • Create New...