Обновить
1
0

Пользователь

Отправить сообщение

Проблему с ssh решил.

Hidden text

telnet 192.168.1.1

...

exec /opt/bin/sh

. /opt/etc/profile

opkg install dropbear

/opt/etc/init.d/S51dropbear start

exit

По вопросу SSH ... а как перезапустить S51dropbear ? я не могу войти по ssh. При попытке входа из putty : в доступе отказано. Даже не появляется запрос на login и пароль.

/opt/etc/init.d/S51dropbear status /opt/etc/init.d/S51dropbear restart

По Cli эти команды не срабатывают. По telnet тоже не работает.

В журнале следующее..

Hidden text

Aug 16 21:34:52 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(58:bf:25:48:0e:67) set key done in WPA2/WPA2PSK.
[I] Aug 16 21:34:52 ndhcps: DHCPDISCOVER received from 58:bf:25:48:0e:67.
[I] Aug 16 21:34:52 ndhcps: making OFFER of 192.168.1.112 to 58:bf:25:48:0e:67.
[I] Aug 16 21:34:52 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.112 from 58:bf:25:48:0e:67.
[I] Aug 16 21:34:53 ndhcps: sending ACK of 192.168.1.112 to 58:bf:25:48:0e:67.
[I] Aug 16 21:34:54 ndm: Network::Interface::Mtk::WifiMonitor: "WifiMaster0/AccessPoint0": STA(58:bf:25:48:0e:67) had disassociated by STA (reason: STA is leaving or has left BSS).
[I] Aug 16 21:39:59 ndhcpc: FastEthernet0/Vlan2: received ACK for 188.32.98.124 from 90.154.77.177 lease 3600 sec.
[I] Aug 16 21:39:59 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Clearing iptables.
[I] Aug 16 21:39:59 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting iptables rule for nfqws postrouting (qnum 200) : -p tcp -m multiport --dports 80,443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:39:59 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting iptables rule for nfqws input+forward (qnum 200) : -p tcp -m multiport --sports 80,443 -m connbytes --connbytes-dir=reply --connbytes-mode=packets --connbytes 1:1.
[I] Aug 16 21:39:59 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting ip6tables rule for nfqws postrouting (qnum 200) : -p tcp -m multiport --dports 80,443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:00 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting ip6tables rule for nfqws input+forward (qnum 200) : -p tcp -m multiport --sports 80,443 -m connbytes --connbytes-dir=reply --connbytes-mode=packets --connbytes 1:1.
[I] Aug 16 21:40:00 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting iptables rule for nfqws postrouting (qnum 210) : -p udp -m multiport --dports 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:00 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting ip6tables rule for nfqws postrouting (qnum 210) : -p udp -m multiport --dports 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:00 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Applying iptables.
[I] Aug 16 21:40:00 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Creating ip list table (firewall type iptables).
[I] Aug 16 21:40:00 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: setting high oom kill priority.
[I] Aug 16 21:40:00 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: reloading ipset backend (no-update).
[I] Aug 16 21:40:00 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding iptables rule for nfqws postrouting (qnum 200) : -p tcp -m multiport --dports 80,443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:01 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding iptables rule for nfqws input+forward (qnum 200) : -p tcp -m multiport --sports 80,443 -m connbytes --connbytes-dir=reply --connbytes-mode=packets --connbytes 1:1.
[I] Aug 16 21:40:01 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding ip6tables rule for nfqws postrouting (qnum 200) : -p tcp -m multiport --dports 80,443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:01 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding ip6tables rule for nfqws input+forward (qnum 200) : -p tcp -m multiport --sports 80,443 -m connbytes --connbytes-dir=reply --connbytes-mode=packets --connbytes 1:1.
[I] Aug 16 21:40:01 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding iptables rule for nfqws postrouting (qnum 210) : -p udp -m multiport --dports 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:01 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding ip6tables rule for nfqws postrouting (qnum 210) : -p udp -m multiport --dports 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:01 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Clearing iptables.
[I] Aug 16 21:40:01 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting iptables rule for nfqws postrouting (qnum 200) : -p tcp -m multiport --dports 80,443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:01 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting iptables rule for nfqws input+forward (qnum 200) : -p tcp -m multiport --sports 80,443 -m connbytes --connbytes-dir=reply --connbytes-mode=packets --connbytes 1:1.
[I] Aug 16 21:40:02 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting ip6tables rule for nfqws postrouting (qnum 200) : -p tcp -m multiport --dports 80,443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:02 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting ip6tables rule for nfqws input+forward (qnum 200) : -p tcp -m multiport --sports 80,443 -m connbytes --connbytes-dir=reply --connbytes-mode=packets --connbytes 1:1.
[I] Aug 16 21:40:02 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting iptables rule for nfqws postrouting (qnum 210) : -p udp -m multiport --dports 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:02 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Deleting ip6tables rule for nfqws postrouting (qnum 210) : -p udp -m multiport --dports 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:02 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Applying iptables.
[I] Aug 16 21:40:02 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Creating ip list table (firewall type iptables).
[I] Aug 16 21:40:02 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: setting high oom kill priority.
[I] Aug 16 21:40:02 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: reloading ipset backend (no-update).
[I] Aug 16 21:40:10 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding iptables rule for nfqws postrouting (qnum 200) : -p tcp -m multiport --dports 80,443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:10 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding iptables rule for nfqws input+forward (qnum 200) : -p tcp -m multiport --sports 80,443 -m connbytes --connbytes-dir=reply --connbytes-mode=packets --connbytes 1:1.
[I] Aug 16 21:40:10 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding ip6tables rule for nfqws postrouting (qnum 200) : -p tcp -m multiport --dports 80,443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:10 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding ip6tables rule for nfqws input+forward (qnum 200) : -p tcp -m multiport --sports 80,443 -m connbytes --connbytes-dir=reply --connbytes-mode=packets --connbytes 1:1.
[I] Aug 16 21:40:10 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding iptables rule for nfqws postrouting (qnum 210) : -p udp -m multiport --dports 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.
[I] Aug 16 21:40:10 ndm: Opkg::Manager: /opt/etc/ndm/netfilter.d/000-zapret.sh: Adding ip6tables rule for nfqws postrouting (qnum 210) : -p udp -m multiport --dports 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000.

Добрый вечер. Есть ситуация.

Ставлю opkg на флешку. Захожу по ssh. Ставлю все по инструкции. Запускаю в работу NFQWS. Все работает отлично. Youtube идеально на всех устройствах.

Проходит минут 10 и все. Больше не работает. Не на одном устройстве. Перезагружаю роутер, не помогает.

Беру другую флешку. Все с начала. Отлично. Получилось. Работает. 10-15 минут. Потом...все умерло.

Есть еще нюанс. После установи всех скриптов и настроек пока не закрою putty-все ок. Потом не могу по ssh на opkg зайти- в доступе отказано. При этом сетевая папка (smb) в Widows работает отлично. Могу заходить, править, удалять. Захожу в роутер, Приложения-Флешка там тоже все доступно. Удалять, добавлять...

Беру другую флешку. Все с начала. Отлично. Получилось. Работает. 10-15 минут. Потом...все умерло. Пробую зайти по SSH. В доступе отказано. При этом просто на роутер по ssh захожу без проблем. В putty 192.168.1.1 222 - в доступе отказано. Трижды перегружал роутер после установки opkg и перед установки скриптов. По ssh вход- все ок.

Очень нужны рекомендации, как бороть проблемы. Как вернуть доступ к youtube? Почему пропадает доступ к opkg по ssh?

Keenetic 1713. Провайдер: Ростелеком

Информация

В рейтинге
Не участвует
Зарегистрирован
Активность