BBox v3+ bridged, PPPoE-sessie op OpenWrt-router onmogelijk met IPv6
Geplaatst: 22 sep 2020, 14:11
Ik heb volgende opstelling draaien bij m'n broer:
Dit werkte tot voor kort perfect met PPPoE-sessie op de OpenWrt-router voor zowel IPv4 als IPv6. Een paar weken terug viel het internet 'uit'. De PPPoE-sessie bleek elke keer te worden afgebroken en opnieuw te worden opgestart nadat de configuratie voor IPv6 niet lukte. De PPP daemon blijft gewoon proberen, maar het maakt geen verschil. Als ik IPv6 uitschakel op de WAN-interface in OpenWrt, dan is de PPPoE-sessie weer direct gewoon actief.
De foutmelding die eruitsprong is de volgende, maar ik vind niks online dat een oplossing biedt:
Logboek:
Bedankt!
Code: Selecteer alles
Proximus BBox v3+ (bridged) -------------> OpenWrt-router met PPPoE-sessie ---------------> LAN
|
\_____ Set-topbox Proximus TV
De foutmelding die eruitsprong is de volgende, maar ik vind niks online dat een oplossing biedt:
Code: Selecteer alles
daemon.debug pppd[19221]: sent [IPV6CP TermReq id=0x2 "Interface configuration failed"]
Code: Selecteer alles
logread -e pppd -f
Tue Sep 8 18:57:36 2020 daemon.info pppd[19221]: Plugin rp-pppoe.so loaded.
Tue Sep 8 18:57:36 2020 daemon.info pppd[19221]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
Tue Sep 8 18:57:36 2020 daemon.notice pppd[19221]: pppd 2.4.7 started by root, uid 0
Tue Sep 8 18:57:36 2020 daemon.debug pppd[19221]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Tue Sep 8 18:57:36 2020 daemon.debug pppd[19221]: dst ff:ff:ff:ff:ff:ff src 00:0d:b9:xx:xx:xx
Tue Sep 8 18:57:36 2020 daemon.debug pppd[19221]: [service-name] [host-uniq 15 4b 00 00]
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: dst ff:ff:ff:ff:ff:ff src 00:0d:b9:xx:xx:xx
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: [service-name] [host-uniq 15 4b 00 00]
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 48
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: dst 00:0d:b9:xx:xx:xx src 24:21:xx:xx:xx:xx
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: [service-name] [AC-name ttnle52lon01] [host-uniq 15 4b 00 00] [AC-cookie 0a 47 32 c6 af a0 98 80 be c4 21 97 69 5a c1 a8]
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: Send PPPOE Discovery V1T1 PADR session 0x0 length 32
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: dst 24:21:xx:xx:xx:xx src 00:0d:b9:xx:xx:xx
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: [service-name] [host-uniq 15 4b 00 00] [AC-cookie 0a 47 32 c6 af a0 98 80 be c4 21 97 69 5a c1 a8]
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: Recv PPPOE Discovery V1T1 PADS session 0x1 length 12
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: dst 00:0d:b9:xx:xx:xx src 24:21:xx:xx:xx:xx
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: [service-name] [host-uniq 15 4b 00 00]
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: PADS: Service-Name: ''
Tue Sep 8 18:57:41 2020 daemon.info pppd[19221]: PPP session is 1
Tue Sep 8 18:57:41 2020 daemon.warn pppd[19221]: Connected to 24:21:xx:xx:xx:xx via interface eth0
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: using channel 83
Tue Sep 8 18:57:41 2020 daemon.info pppd[19221]: Renamed interface ppp0 to pppoe-wan
Tue Sep 8 18:57:41 2020 daemon.info pppd[19221]: Using interface pppoe-wan
Tue Sep 8 18:57:41 2020 daemon.notice pppd[19221]: Connect: pppoe-wan <--> eth0
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0xc4737bb0>]
Tue Sep 8 18:57:41 2020 daemon.debug pppd[19221]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0xc4737bb0>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0xc4737bb0>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0xc4737bb0>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [LCP ConfReq id=0x34 <mru 1492> <auth chap MD5> <magic 0x1171d6d>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [LCP ConfAck id=0x34 <mru 1492> <auth chap MD5> <magic 0x1171d6d>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [LCP EchoReq id=0x0 magic=0xc4737bb0]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [CHAP Challenge id=0x1 <21d6dd7297643f11dcd4d39572901105fdda3e1a172b01c9dd3c3b2a011d96227474940c58531db428f14a1b025b200037dd9acd091b9767585211d86fa77a>, name = "ttnle52lon01"]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [CHAP Response id=0x1 <1f8962cac359ce763993338bf31ac0a4>, name = "$login"]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [LCP EchoRep id=0x0 magic=0x1171d6d]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [CHAP Success id=0x1 "QOS"]
Tue Sep 8 18:57:44 2020 daemon.info pppd[19221]: CHAP authentication succeeded: QOS
Tue Sep 8 18:57:44 2020 daemon.notice pppd[19221]: CHAP authentication succeeded
Tue Sep 8 18:57:44 2020 daemon.notice pppd[19221]: peer from calling number 24:21:xx:xx:xx:xx authorized
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [IPV6CP ConfReq id=0x1 <addr fe80::1536:6f51:2376:6aa2>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [IPV6CP ConfReq id=0x1c <addr fe80::2621:24ff:fe91:b63f>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [IPV6CP ConfAck id=0x1c <addr fe80::2621:24ff:fe91:b63f>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [IPCP ConfReq id=0xd2 <addr 10.24.193.42>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [IPCP ConfAck id=0xd2 <addr 10.24.193.42>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [IPV6CP ConfAck id=0x1 <addr fe80::1536:6f51:2376:6aa2>]
Tue Sep 8 18:57:44 2020 daemon.err pppd[19221]: sif6addr: ioctl(SIOCSIFADDR): Permission denied (line 2642)
Tue Sep 8 18:57:44 2020 daemon.warn pppd[19221]: sif6addr failed
Tue Sep 8 18:57:44 2020 daemon.warn pppd[19221]: cif6addr: ioctl(SIOCDIFADDR): No such address
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [IPV6CP TermReq id=0x2 "Interface configuration failed"]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [IPCP ConfNak id=0x1 <addr 81.245.219.175> <ms-dns1 195.238.2.21> <ms-dns2 195.238.2.22>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [IPCP ConfReq id=0x2 <addr 81.245.219.175> <ms-dns1 195.238.2.21> <ms-dns2 195.238.2.22>]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [LCP TermReq id=0x35]
Tue Sep 8 18:57:44 2020 daemon.info pppd[19221]: LCP terminated by peer
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: sent [LCP TermAck id=0x35]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: rcvd [IPV6CP TermAck id=0x2]
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: Discarded non-LCP packet when LCP not open
Tue Sep 8 18:57:44 2020 daemon.notice pppd[19221]: Modem hangup
Tue Sep 8 18:57:44 2020 daemon.notice pppd[19221]: Connection terminated.
Tue Sep 8 18:57:44 2020 daemon.info pppd[19221]: Connect time 0.2 minutes.
Tue Sep 8 18:57:44 2020 daemon.info pppd[19221]: Sent 60 bytes, received 60 bytes.
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: Send PPPOE Discovery V1T1 PADT session 0x1 length 28
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: dst 24:21:xx:xx:xx:xx src 00:0d:b9:xx:xx:xx
Tue Sep 8 18:57:44 2020 daemon.debug pppd[19221]: [host-uniq 15 4b 00 00] [AC-cookie 0a 47 32 c6 af a0 98 80 be c4 21 97 69 5a c1 a8]
Tue Sep 8 18:57:44 2020 daemon.info pppd[19221]: Sent PADT
Tue Sep 8 18:57:44 2020 daemon.info pppd[19221]: Exit.