Show pagesourceOld revisionsBacklinksBack to top × Table of Contents LOG MESSAGES dropbear netfilter pppd dnsmasq LOG MESSAGES In 12.09 The content of the membuffer that syslogd writes to, by default, consists of up to 16 KB utf-8/ASCII encoded characters. Remember this if/when you use logger. To read the content of the membuffer that syslogd writes to, use the logread utility (for kernel messages use dmesg). Let's have a look at the MESSAGES different program produces: on OpenWrt they all start with the name of the program that send the message plus its PID. It would be foolish to even try to display and explain all the Log messages the programs used with OpenWrt generate. We need external links. dropbear Feb 4 21:45:43 openwrt user.info dropbear[9815]: Child connection from 192.168.1.1:46247 Feb 4 21:45:43 openwrt user.notice dropbear[9815]: password auth succeeded for 'username' from 192.168.1.1:46247 Feb 5 00:03:34 openwrt user.info dropbear[9815]: exit after auth (username): Exited normally Feb 5 03:13:39 openwrt user.warn dropbear[10221]: bad password attempt for 'root' from 192.168.1.1:51570 Feb 5 03:13:40 openwrt user.warn dropbear[10221]: bad password attempt for 'root' from 192.168.1.1:51570 Feb 5 03:13:42 openwrt user.warn dropbear[10221]: bad password attempt for 'root' from 192.168.1.1:51570 Feb 5 03:13:43 openwrt user.warn dropbear[10221]: bad password attempt for 'root' from 192.168.1.1:51570 Feb 5 03:13:45 openwrt user.warn dropbear[10221]: bad password attempt for 'root' from 192.168.1.1:51570 Feb 5 03:13:48 openwrt user.info dropbear[10221]: exit before auth (user 'root', 5 fails): Disconnect received dropbear[PID]: dropbear with the PID 999 is running all the time. This instance (PID=9815) has been spawn for this ssh session. password auth succeeded for 'username' from 192.168.1.1:46247: \\this is going to spawn an ash instance with the PID 9687 As you see, it is possible to try many many passwords. You can put an end to this by configuring dropbear or with netfilter. You can (and should) read your logs regularly, but of course you can also initiate thing with logs. When you debug, you should create a lot of logs. During normal service, you should create logs to WARN you read them regularly LOGs in order to be able to reconstruct things. read them when need it Yes, when you have any service running 24/7, you are responsible for it. “I didn't know” doesn't really count in court. It is your responsibility to keep yourself informed! netfilter Feb 3 16:04:14 openwrt user.warn kernel: IPT_dsl-Rej IN=pppoe-dsl OUT= MAC= SRC=119.121.32.2 DST=141.70.120.8 LEN=79 TOS=0x00 PREC=0x00 TTL=53 ID=22415 PROTO=UDP SPT=15758 DPT=38565 LEN=59 kernel: IPT_dsl-Rej IN=pppoe-dsl OUT= MAC= SRC=222.155.169.237 DST=79.128.154.27 LEN=60 TOS=0x00 PREC=0x40 TTL=46 ID=7247 DF PROTO=TCP SPT=4709 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0 Part of Message Meaning kernel: The kernel send this message. (because netfilter is part of the kernel) remember iptables/ip6tables are only the user space programs to configure netfilter. IPT_dsl-Rej the string you set with --log-prefix, see configuration IN= Incoming interface OUT= Outgoing Interface MAC= dst and src MACs and something else SRC= Source IP address DST= Destination IP address LEN= Overall length of IP packet in bytes TOS= the ToS-Flag PREC= belongs to ToS TTL= Time-to-live in ms or in hops ID= DF Don't Fragment Flag set PROTO= transport protocol used TCP UDP etc. SPT= source port DPT= destination port LEN= payload size in bytes WINDOW= RES= SYN SYN flag, see Three-way handshake URGP= http://logi.cc/en/2010/07/netfilter-log-format/ pppd Feb 22 14:20:13 openwrt daemon.info pppd[18505]: Plugin rp-pppoe.so loaded. Feb 22 14:20:13 openwrt daemon.notice pppd[18505]: pppd 2.4.4 started by root, uid 0 Feb 22 14:20:13 openwrt daemon.info pppd[18505]: PPP session is 1561 Feb 22 14:20:13 openwrt daemon.info pppd[18505]: Using interface pppoe-dsl Feb 22 14:20:13 openwrt daemon.notice pppd[18505]: Connect: pppoe-dsl <--> eth0.2 Feb 22 14:20:13 openwrt daemon.info pppd[18505]: CHAP authentication succeeded: access accepted : xxxxxxx Feb 22 14:20:13 openwrt daemon.notice pppd[18505]: CHAP authentication succeeded Feb 22 14:20:13 openwrt daemon.notice pppd[18505]: peer from calling number xx:xx:xx:xx:xx:xx authorized Feb 22 14:20:13 openwrt daemon.notice pppd[18505]: local IP address 123.123.123.99 Feb 22 14:20:13 openwrt daemon.notice pppd[18505]: remote IP address 123.123.123.1 Feb 22 14:20:13 openwrt daemon.notice pppd[18505]: primary DNS address 100.150.100.200 Feb 22 14:20:13 openwrt daemon.notice pppd[18505]: secondary DNS address 100.150.100.100 Feb 22 14:20:13 openwrt user.notice ifup: Enabling Router Solicitations on dsl (pppoe-dsl) Feb 22 14:20:15 openwrt user.notice rdate: Synced with ntp0.fau.de --- Feb 22 23:20:11 openwrt daemon.info pppd[18196]: Terminating on signal 15 Feb 22 23:20:11 openwrt daemon.info pppd[18196]: Connect time 1268.2 minutes. Feb 22 23:20:11 openwrt daemon.info pppd[18196]: Sent 62343675 bytes, received 1094463306 bytes. Feb 22 23:20:11 openwrt daemon.notice pppd[18196]: Connection terminated. Feb 22 23:20:12 openwrt daemon.info pppd[18196]: Exit. NOTE: You can make pppd verbose with setting option pppd_options debug in your /etc/config/network, see network. With uci commit network and then restart pppd (ifdown pppoe-dsl does NOT restart the daemon, you can achieve that with ???) Message Meaning dnsmasq Feb 4 20:07:59 openwrt daemon.info dnsmasq-dhcp[1026]: DHCPREQUEST(eth0.1) 192.168.1.1 xx:xx:xx:xx:xx:xx Feb 4 20:07:59 openwrt daemon.info dnsmasq-dhcp[1026]: DHCPACK(eth0.1) 192.168.1.1 xx:xx:xx:xx:xx:xx wonderwoman Feb 4 21:16:20 openwrt daemon.info dnsmasq-dhcp[1026]: DHCPREQUEST(eth0.1) 192.168.1.1 xx:xx:xx:xx:xx:xx Feb 4 21:16:20 openwrt daemon.info dnsmasq-dhcp[1026]: DHCPACK(eth0.1) 192.168.3.1 xx:xx:xx:xx:xx:xx superman This website uses cookies. By using the website, you agree with storing cookies on your computer. Also you acknowledge that you have read and understand our Privacy Policy. If you do not agree leave the website.OKMore information about cookies Last modified: 2023/03/19 06:16by ryanc