#1 11.07.2019 21:55:13

Morta
Mitglied

Von VLAN 10 zu eth0 Internet zugriff mit IPTables als Routing

Hallo!

Ich habe ein VLAN mit ID 10 gemacht mit einem DHCP-Client. Das VLAN eth0.10 bezieht die IP vom ISP nun sehe ich aber am Port eth0 keine IP oder Internet zugriff.
Kann ich irgendwie ein VLAN 10 direkt aufs Interface eth0 machen oder der Traffic von eth0.10 zur bridge br0 weiterleiten?

iptables -A FORWARD -i br0 -s 192.168.1.0/255.255.255.0 -j ACCEPT
iptables -A FORWARD -i eth0 -d 192.168.1.0/255.255.255.0 -j ACCEPT

# Kann ich statt einer IP-Adresse auch VLAN 10 Interface  eth0.10 sagen er soll den Traffic auf eth0 weiterleiten so das ich Internet zugriff habe auf dem ganzen Netzwerk?

iptables -t nat -A POSTROUTING -s ip.add.re.ss/24 ! -d ip.add.re.ss/24 -m comment --comment "Kann das Interface eth0.10 zu eth0 weiterleiten? oder muss ich beiden eine statische IP geben zusätzlich der dynamischen des ISP" -j MASQUERADE
iptables -t filter -A FORWARD -o eth0.10 -m comment --comment "NAT Output für VLAN 10 eth0.10" -j ACCEPT #Mit oder ohne -t filter?
iptables -t filter -A FORWARD -i eth0.10 -m comment --comment "NAT Input für VLAN 10 eth0.10" -j ACCEPT

iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE


echo 1 > /proc/sys/net/ipv4/ip_forward

Kann mir hier jemand weiterhelfen? Wäre sehr dankbar...

Beitrag geändert von Morta (11.07.2019 22:06:24)

Offline

#2 12.07.2019 08:23:21

segfault
Mitglied

Re: Von VLAN 10 zu eth0 Internet zugriff mit IPTables als Routing

Hast Du das VLAN korrekt konfiguriert? Was zeigt:

sudo cat /proc/net/vlan/config
sudo cat /proc/net/vlan/eth0.10

Was zeigt ein:

tcpdump -n -p -i eth0.10

wenn Du auf eth0.10 einen DHCP-Client startest?

Ich würde mich erst einmal versichern, dass die Grundfunktionalität gegeben ist, ehe ich mit iptables rumspiele.

Offline

#3 12.07.2019 15:25:39

Morta
Mitglied

Re: Von VLAN 10 zu eth0 Internet zugriff mit IPTables als Routing

[root@ROUTER morta]# cat /proc/net/vlan/config
VLAN Dev name	 | VLAN ID
Name-Type: VLAN_NAME_TYPE_RAW_PLUS_VID_NO_PAD
eth0.10         | 10  | eth0
[root@ROUTER morta]# cat /proc/net/vlan/eth0.10
eth010  VID: 10	 REORDER_HDR: 1  dev->priv_flags: 1021
         total frames received           36
          total bytes received         2540
      Broadcast/Multicast Rcvd           11

      total frames transmitted           24
       total bytes transmitted         2412
Device: eth0
INGRESS priority mappings: 0:0  1:0  2:0  3:0  4:0  5:0  6:0 7:0
 EGRESS priority mappings: 
[root@ROUTER morta]# tcpdump -n -p -i eth0.10
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0.10, link-type EN10MB (Ethernet), capture size 262144 bytes
13:04:10.680190 IP 185.153.196.25.45327 > 85.7.118.85.15389: Flags [S], seq 3407261449, win 1024, length 0
13:04:13.024933 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
13:04:43.025262 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
13:04:54.733157 IP 80.82.78.104.56504 > 85.7.118.85.3394: Flags [S], seq 2362323755, win 1024, length 0
13:05:13.025558 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
13:05:28.048375 IP 95.57.218.103.44512 > 85.7.118.85.445: Flags [S], seq 2229049148, win 1024, length 0
13:05:33.851660 IP 198.108.67.107.25280 > 85.7.118.85.9070: Flags [S], seq 3114394712, win 1024, length 0
13:05:41.662582 IP 185.153.196.25.45325 > 85.7.118.85.5366: Flags [S], seq 3805977832, win 1024, length 0
13:05:42.345363 IP 198.108.66.209.45248 > 85.7.118.85.8080: Flags [S], seq 2870134667, win 65535, length 0
13:05:43.025872 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
13:05:56.393898 IP 80.82.78.104.56504 > 85.7.118.85.3388: Flags [S], seq 2452477312, win 1024, length 0
13:06:00.992614 IP6 fe80::f2ad:4eff:fe09:6a7f > ff02::2: ICMP6, router solicitation, length 16
13:06:10.225369 IP 185.176.27.34.57886 > 85.7.118.85.19284: Flags [S], seq 661451054, win 1024, length 0
13:06:13.026204 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
13:06:19.590666 IP 77.28.171.80.12154 > 85.7.118.85.23: Flags [S], seq 1576914261, win 14600, length 0
13:06:43.026483 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
13:07:13.026840 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
13:07:22.008003 IP 80.82.78.104.56504 > 85.7.118.85.3399: Flags [S], seq 2801711594, win 1024, length 0
13:07:25.629032 IP 185.153.196.25.45321 > 85.7.118.85.30003: Flags [S], seq 3401250207, win 1024, length 0
13:07:33.148229 IP 185.176.26.105.59073 > 85.7.118.85.2800: Flags [S], seq 1603400972, win 1024, length 0
13:07:36.241248 IP 175.163.96.40.56153 > 85.7.118.85.22: Flags [S], seq 1426552405, win 28030, length 0
13:07:43.027145 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
^C
22 packets captured
22 packets received by filter
0 packets dropped by kernel

Hier noch die config von eth0 und eth0.10

[root@ROUTER network]# cat eth0.network
[Match]
Name=eth0

[Network]
DHCP=ipv4
DNSSEC=no
BindCarrier=eth0
IPForward=ipv4

#[DHCP]
#VendorClassIdentifier="100008,0001,,Router"

;these are arbitrary names, but must match the *.netdev and *.network files
VLAN=eth0.10
[root@ROUTER network]# cat eth0.10.network
[Match]
Name=eth0.10

[Network]
DHCP=ipv4

[DHCP]
UseRoutes=false #richtig?
VendorClassIdentifier="100008,0001,,Router" #bei eth0 oder eth0.10 ?
[root@ROUTER network]# cat eth0.10.netdev 
[NetDev]
Name=eth0.10
Kind=vlan

[VLAN]
Id=10

Ich muss irgendwie auf die Seite swisscom.ch/registration kommen und der Anschluss dort registrieren

Beitrag geändert von Morta (12.07.2019 15:29:43)

Offline

#4 14.07.2019 12:42:26

Morta
Mitglied

Re: Von VLAN 10 zu eth0 Internet zugriff mit IPTables als Routing

Segfault hast du ne Idee?
Ich sollte noch Option 60 senden wie mach ich das über den DHCPcd client?

Hab jetzt noch mit dhcpcd -U eth0.10 probiert

[root@ROUTER network]# dhcpcd -U eth0.10
broadcast_address=100.87.151.255
dhcp_lease_time=1800
dhcp_message_type=5
dhcp_rebinding_time=1575
dhcp_renewal_time=900
dhcp_server_identifier=213.3.239.224
domain_name_servers='195.186.4.162 195.186.1.162'
ip_address=100.87.151.249
network_number=100.87.144.0
routers=100.87.144.1
subnet_cidr=21
subnet_mask=255.255.248.0
dhcp6_dump: eth0.10: No such file or directory
[root@ROUTER network]# 
[root@ROUTER network]# tcpdump -n -p -i eth0.10
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening one eth0.10, link-type EN10MB (Ethernet), capture size 262144 bytes
11:33:26.191177 IP 100.87.151.249.41446 > 8.8.4.4.53: 7387+ A? www.googleapis.com.fritz.box. (46)
11:33:26.191282 IP 100.87.151.249.41446 > 8.8.8.8.53: 7387+ A? www.googleapis.com.fritz.box. (46)
11:33:26.191573 IP 100.87.151.249.21901 > 8.8.4.4.53: 25578+ AAAA? www.googleapis.com.fritz.box. (46)
11:33:26.191633 IP 100.87.151.249.21901 > 8.8.8.8.53: 25578+ AAAA? www.googleapis.com.fritz.box. (46)
11:33:26.944543 IP 100.87.151.249.10371 > 8.8.4.4.53: 44902+ A? www.youtube.com.fritz.box. (43)
11:33:26.944647 IP 100.87.151.249.10371 > 8.8.8.8.53: 44902+ A? www.youtube.com.fritz.box. (43)
11:33:26.945404 IP 100.87.151.249.40362 > 8.8.4.4.53: 58329+ AAAA? www.youtube.com.fritz.box. (43)
11:33:26.945492 IP 100.87.151.249.40362 > 8.8.8.8.53: 58329+ AAAA? www.youtube.com.fritz.box. (43)
11:33:27.312920 IP 100.87.151.249.29591 > 8.8.4.4.53: 42455+ A? detectportal.firefox.com. (42)
11:33:27.313035 IP 100.87.151.249.29591 > 8.8.8.8.53: 42455+ A? detectportal.firefox.com. (42)
11:33:27.313938 IP 100.87.151.249.24170 > 8.8.4.4.53: 51628+ AAAA? detectportal.firefox.com. (42)
11:33:27.314056 IP 100.87.151.249.24170 > 8.8.8.8.53: 51628+ AAAA? detectportal.firefox.com. (42)
11:33:27.538744 ARP, Request who-has 100.87.144.1 tell 100.87.151.249, length 28
11:33:27.540447 ARP, Reply 100.87.144.1 is-at 4c:96:14:68:43:c9, length 42
11:33:27.567551 IP 100.87.151.249.60503 > 8.8.4.4.53: 406+ A? accounts.google.com. (37)
11:33:27.567670 IP 100.87.151.249.60503 > 8.8.8.8.53: 406+ A? accounts.google.com. (37)
11:33:27.568183 IP 100.87.151.249.24520 > 8.8.4.4.53: 15636+ AAAA? accounts.google.com. (37)
11:33:27.568263 IP 100.87.151.249.24520 > 8.8.8.8.53: 15636+ AAAA? accounts.google.com. (37)
11:33:27.827350 IP 192.168.1.25.40305 > 192.168.178.1.53: 34919+ A? profile.accounts.firefox.com.fritz.box. (56)
11:33:27.827433 IP 192.168.1.25.40305 > 192.168.178.1.53: 32894+ AAAA? profile.accounts.firefox.com.fritz.box. (56)
11:33:28.007848 IP 100.87.151.249.32097 > 8.8.4.4.53: 31069+ A? www.google.com. (32)
11:33:28.007952 IP 100.87.151.249.32097 > 8.8.8.8.53: 31069+ A? www.google.com. (32)
11:33:28.008652 IP 100.87.151.249.27312 > 8.8.4.4.53: 42402+ AAAA? www.google.com. (32)
11:33:28.008928 IP 100.87.151.249.27312 > 8.8.8.8.53: 42402+ AAAA? www.google.com. (32)
11:33:28.011054 IP 100.87.151.249.35418 > 8.8.4.4.53: 61722+ A? apidata.googleusercontent.com. (47)
11:33:28.011150 IP 100.87.151.249.35418 > 8.8.8.8.53: 61722+ A? apidata.googleusercontent.com. (47)
11:33:28.011467 IP 100.87.151.249.9699 > 8.8.4.4.53: 58919+ A? apidata.googleusercontent.com. (47)
11:33:28.011533 IP 100.87.151.249.9699 > 8.8.8.8.53: 58919+ A? apidata.googleusercontent.com. (47)
11:33:28.011802 IP 100.87.151.249.55634 > 8.8.4.4.53: 18278+ AAAA? apidata.googleusercontent.com. (47)
11:33:28.011850 IP 100.87.151.249.55634 > 8.8.8.8.53: 18278+ AAAA? apidata.googleusercontent.com. (47)
11:33:28.012113 IP 100.87.151.249.6500 > 8.8.4.4.53: 33698+ AAAA? apidata.googleusercontent.com. (47)
11:33:28.012170 IP 100.87.151.249.6500 > 8.8.8.8.53: 33698+ AAAA? apidata.googleusercontent.com. (47)
11:33:28.012425 IP 100.87.151.249.8917 > 8.8.4.4.53: 51852+ A? apidata.googleusercontent.com. (47)
11:33:28.012476 IP 100.87.151.249.8917 > 8.8.8.8.53: 51852+ A? apidata.googleusercontent.com. (47)
11:33:28.012729 IP 100.87.151.249.47727 > 8.8.4.4.53: 35713+ AAAA? apidata.googleusercontent.com. (47)
11:33:28.012783 IP 100.87.151.249.47727 > 8.8.8.8.53: 35713+ AAAA? apidata.googleusercontent.com. (47)
11:33:28.014394 IP 100.87.151.249.21448 > 8.8.4.4.53: 3974+ A? apidata.googleusercontent.com. (47)
11:33:28.014473 IP 100.87.151.249.21448 > 8.8.8.8.53: 3974+ A? apidata.googleusercontent.com. (47)
11:33:28.014686 IP 100.87.151.249.45020 > 8.8.4.4.53: 39092+ AAAA? apidata.googleusercontent.com. (47)
11:33:28.014725 IP 100.87.151.249.45020 > 8.8.8.8.53: 39092+ AAAA? apidata.googleusercontent.com. (47)
11:33:28.940936 IP 192.168.1.25.55520 > 192.168.178.1.53: 1028+ A? 2.arch.pool.ntp.org.fritz.box. (47)
11:33:28.941028 IP 192.168.1.25.55520 > 192.168.178.1.53: 61466+ AAAA? 2.arch.pool.ntp.org.fritz.box. (47)
11:33:29.417417 IP 192.168.1.25.60971 > 192.168.178.1.53: 46143+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:29.417518 IP 192.168.1.25.60971 > 192.168.178.1.53: 49992+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:29.584540 IP 100.87.151.249.1129 > 8.8.4.4.53: 25825+ A? bbs.archlinux.org.fritz.box. (45)
11:33:29.584672 IP 100.87.151.249.1129 > 8.8.8.8.53: 25825+ A? bbs.archlinux.org.fritz.box. (45)
11:33:29.585004 IP 100.87.151.249.13823 > 8.8.4.4.53: 30460+ AAAA? bbs.archlinux.org.fritz.box. (45)
11:33:29.585104 IP 100.87.151.249.13823 > 8.8.8.8.53: 30460+ AAAA? bbs.archlinux.org.fritz.box. (45)
11:33:30.073888 IP 100.87.151.249.58627 > 91.235.212.22.123: NTPv4, Client, length 48
11:33:31.194115 IP 192.168.1.25.45776 > 192.168.178.1.53: 20640+ A? www.googleapis.com.fritz.box. (46)
11:33:31.194234 IP 192.168.1.25.45776 > 192.168.178.1.53: 7337+ AAAA? www.googleapis.com.fritz.box. (46)
11:33:31.947599 IP 192.168.1.25.40429 > 192.168.178.1.53: 1127+ A? www.youtube.com.fritz.box. (43)
11:33:31.947700 IP 192.168.1.25.40429 > 192.168.178.1.53: 45179+ AAAA? www.youtube.com.fritz.box. (43)
11:33:32.317800 IP 100.87.151.249.29591 > 8.8.4.4.53: 42455+ A? detectportal.firefox.com. (42)
11:33:32.317909 IP 100.87.151.249.29591 > 8.8.8.8.53: 42455+ A? detectportal.firefox.com. (42)
11:33:32.318683 IP 100.87.151.249.24170 > 8.8.4.4.53: 51628+ AAAA? detectportal.firefox.com. (42)
11:33:32.318953 IP 100.87.151.249.24170 > 8.8.8.8.53: 51628+ AAAA? detectportal.firefox.com. (42)
11:33:32.571108 IP 100.87.151.249.60503 > 8.8.4.4.53: 406+ A? accounts.google.com. (37)
11:33:32.571213 IP 100.87.151.249.60503 > 8.8.8.8.53: 406+ A? accounts.google.com. (37)
11:33:32.571603 IP 100.87.151.249.24520 > 8.8.4.4.53: 15636+ AAAA? accounts.google.com. (37)
11:33:32.571669 IP 100.87.151.249.24520 > 8.8.8.8.53: 15636+ AAAA? accounts.google.com. (37)
11:33:32.835249 IP 100.87.151.249.13792 > 8.8.4.4.53: 41488+ A? profile.accounts.firefox.com. (46)
11:33:32.835377 IP 100.87.151.249.13792 > 8.8.8.8.53: 41488+ A? profile.accounts.firefox.com. (46)
11:33:32.835947 IP 100.87.151.249.64461 > 8.8.4.4.53: 55746+ AAAA? profile.accounts.firefox.com. (46)
11:33:32.836096 IP 100.87.151.249.64461 > 8.8.8.8.53: 55746+ AAAA? profile.accounts.firefox.com. (46)
11:33:33.944547 IP 100.87.151.249.4733 > 8.8.4.4.53: 22644+ A? 2.arch.pool.ntp.org.fritz.box. (47)
11:33:33.944653 IP 100.87.151.249.4733 > 8.8.8.8.53: 22644+ A? 2.arch.pool.ntp.org.fritz.box. (47)
11:33:33.945223 IP 100.87.151.249.43143 > 8.8.4.4.53: 57316+ AAAA? 2.arch.pool.ntp.org.fritz.box. (47)
11:33:33.945587 IP 100.87.151.249.43143 > 8.8.8.8.53: 57316+ AAAA? 2.arch.pool.ntp.org.fritz.box. (47)
11:33:34.421334 IP 100.87.151.249.3069 > 8.8.4.4.53: 31942+ A? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:34.421468 IP 100.87.151.249.3069 > 8.8.8.8.53: 31942+ A? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:34.421949 IP 100.87.151.249.55942 > 8.8.4.4.53: 6850+ AAAA? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:34.422020 IP 100.87.151.249.55942 > 8.8.8.8.53: 6850+ AAAA? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:34.587696 IP 192.168.1.25.53505 > 192.168.178.1.53: 50391+ A? bbs.archlinux.org.fritz.box. (45)
11:33:34.587782 IP 192.168.1.25.53505 > 192.168.178.1.53: 23787+ AAAA? bbs.archlinux.org.fritz.box. (45)
11:33:34.901613 IP 100.87.151.249.35384 > 8.8.4.4.53: 31448+ A? serverfault.com. (33)
11:33:34.901736 IP 100.87.151.249.35384 > 8.8.8.8.53: 31448+ A? serverfault.com. (33)
11:33:34.902292 IP 100.87.151.249.28977 > 8.8.4.4.53: 8843+ AAAA? serverfault.com. (33)
11:33:34.902374 IP 100.87.151.249.28977 > 8.8.8.8.53: 8843+ AAAA? serverfault.com. (33)
11:33:36.200415 IP 100.87.151.249.41374 > 8.8.4.4.53: 8486+ A? www.googleapis.com. (36)
11:33:36.200536 IP 100.87.151.249.41374 > 8.8.8.8.53: 8486+ A? www.googleapis.com. (36)
11:33:36.201446 IP 100.87.151.249.38415 > 8.8.4.4.53: 41436+ AAAA? www.googleapis.com. (36)
11:33:36.201558 IP 100.87.151.249.38415 > 8.8.8.8.53: 41436+ AAAA? www.googleapis.com. (36)
11:33:36.876417 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
11:33:36.955745 IP 100.87.151.249.53692 > 8.8.4.4.53: 10007+ A? www.youtube.com. (33)
11:33:36.955875 IP 100.87.151.249.53692 > 8.8.8.8.53: 10007+ A? www.youtube.com. (33)
11:33:36.956358 IP 100.87.151.249.35058 > 8.8.4.4.53: 11346+ AAAA? www.youtube.com. (33)
11:33:36.956433 IP 100.87.151.249.35058 > 8.8.8.8.53: 11346+ AAAA? www.youtube.com. (33)
11:33:37.328100 IP 100.87.151.249.47070 > 8.8.4.4.53: 17344+ A? detectportal.firefox.com. (42)
11:33:37.328224 IP 100.87.151.249.47070 > 8.8.8.8.53: 17344+ A? detectportal.firefox.com. (42)
11:33:37.329277 IP 100.87.151.249.10778 > 8.8.4.4.53: 56382+ AAAA? detectportal.firefox.com. (42)
11:33:37.329393 IP 100.87.151.249.10778 > 8.8.8.8.53: 56382+ AAAA? detectportal.firefox.com. (42)
11:33:37.837776 IP 100.87.151.249.13792 > 8.8.4.4.53: 41488+ A? profile.accounts.firefox.com. (46)
11:33:37.837882 IP 100.87.151.249.13792 > 8.8.8.8.53: 41488+ A? profile.accounts.firefox.com. (46)
11:33:37.838274 IP 100.87.151.249.64461 > 8.8.4.4.53: 55746+ AAAA? profile.accounts.firefox.com. (46)
11:33:37.838345 IP 100.87.151.249.64461 > 8.8.8.8.53: 55746+ AAAA? profile.accounts.firefox.com. (46)
11:33:38.947498 IP 192.168.1.25.55520 > 192.168.178.1.53: 1028+ A? 2.arch.pool.ntp.org.fritz.box. (47)
11:33:38.947613 IP 192.168.1.25.55520 > 192.168.178.1.53: 61466+ AAAA? 2.arch.pool.ntp.org.fritz.box. (47)
11:33:39.424080 IP 192.168.1.25.53254 > 192.168.178.1.53: 45266+ A? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:39.424177 IP 192.168.1.25.53254 > 192.168.178.1.53: 7400+ AAAA? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:39.594830 IP 100.87.151.249.49780 > 8.8.4.4.53: 44414+ A? bbs.archlinux.org. (35)
11:33:39.594960 IP 100.87.151.249.49780 > 8.8.8.8.53: 44414+ A? bbs.archlinux.org. (35)
11:33:39.595451 IP 100.87.151.249.1090 > 8.8.4.4.53: 46111+ AAAA? bbs.archlinux.org. (35)
11:33:39.595529 IP 100.87.151.249.1090 > 8.8.8.8.53: 46111+ AAAA? bbs.archlinux.org. (35)
11:33:39.904378 IP 100.87.151.249.35384 > 8.8.4.4.53: 31448+ A? serverfault.com. (33)
11:33:39.904476 IP 100.87.151.249.35384 > 8.8.8.8.53: 31448+ A? serverfault.com. (33)
11:33:39.904886 IP 100.87.151.249.28977 > 8.8.4.4.53: 8843+ AAAA? serverfault.com. (33)
11:33:39.905181 IP 100.87.151.249.28977 > 8.8.8.8.53: 8843+ AAAA? serverfault.com. (33)
11:33:40.323914 IP 100.87.151.249.37382 > 81.94.123.17.123: NTPv4, Client, length 48
11:33:41.204538 IP 100.87.151.249.41374 > 8.8.4.4.53: 8486+ A? www.googleapis.com. (36)
11:33:41.204647 IP 100.87.151.249.41374 > 8.8.8.8.53: 8486+ A? www.googleapis.com. (36)
11:33:41.204978 IP 100.87.151.249.38415 > 8.8.4.4.53: 41436+ AAAA? www.googleapis.com. (36)
11:33:41.205044 IP 100.87.151.249.38415 > 8.8.8.8.53: 41436+ AAAA? www.googleapis.com. (36)
11:33:41.957743 IP 100.87.151.249.53692 > 8.8.4.4.53: 10007+ A? www.youtube.com. (33)
11:33:41.957845 IP 100.87.151.249.53692 > 8.8.8.8.53: 10007+ A? www.youtube.com. (33)
11:33:41.958252 IP 100.87.151.249.35058 > 8.8.4.4.53: 11346+ AAAA? www.youtube.com. (33)
11:33:41.958564 IP 100.87.151.249.35058 > 8.8.8.8.53: 11346+ AAAA? www.youtube.com. (33)
11:33:42.330998 IP 100.87.151.249.47070 > 8.8.4.4.53: 17344+ A? detectportal.firefox.com. (42)
11:33:42.331103 IP 100.87.151.249.47070 > 8.8.8.8.53: 17344+ A? detectportal.firefox.com. (42)
11:33:42.331408 IP 100.87.151.249.10778 > 8.8.4.4.53: 56382+ AAAA? detectportal.firefox.com. (42)
11:33:42.331654 IP 100.87.151.249.10778 > 8.8.8.8.53: 56382+ AAAA? detectportal.firefox.com. (42)
11:33:42.846908 IP 100.87.151.249.63815 > 8.8.4.4.53: 4449+ A? profile.accounts.firefox.com. (46)
11:33:42.847037 IP 100.87.151.249.63815 > 8.8.8.8.53: 4449+ A? profile.accounts.firefox.com. (46)
11:33:42.847550 IP 100.87.151.249.42858 > 8.8.4.4.53: 22054+ AAAA? profile.accounts.firefox.com. (46)
11:33:42.847959 IP 100.87.151.249.42858 > 8.8.8.8.53: 22054+ AAAA? profile.accounts.firefox.com. (46)
11:33:43.953751 IP 100.87.151.249.65508 > 8.8.4.4.53: 45991+ A? 3.arch.pool.ntp.org. (37)
11:33:43.953884 IP 100.87.151.249.65508 > 8.8.8.8.53: 45991+ A? 3.arch.pool.ntp.org. (37)
11:33:43.954382 IP 100.87.151.249.12223 > 8.8.4.4.53: 45820+ AAAA? 3.arch.pool.ntp.org. (37)
11:33:43.954742 IP 100.87.151.249.12223 > 8.8.8.8.53: 45820+ AAAA? 3.arch.pool.ntp.org. (37)
11:33:44.428148 IP 100.87.151.249.3069 > 8.8.4.4.53: 31942+ A? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:44.428254 IP 100.87.151.249.3069 > 8.8.8.8.53: 31942+ A? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:44.428559 IP 100.87.151.249.55942 > 8.8.4.4.53: 6850+ AAAA? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:44.428620 IP 100.87.151.249.55942 > 8.8.8.8.53: 6850+ AAAA? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:44.598963 IP 100.87.151.249.49780 > 8.8.4.4.53: 44414+ A? bbs.archlinux.org. (35)
11:33:44.599060 IP 100.87.151.249.49780 > 8.8.8.8.53: 44414+ A? bbs.archlinux.org. (35)
11:33:44.599358 IP 100.87.151.249.1090 > 8.8.4.4.53: 46111+ AAAA? bbs.archlinux.org. (35)
11:33:44.599602 IP 100.87.151.249.1090 > 8.8.8.8.53: 46111+ AAAA? bbs.archlinux.org. (35)
11:33:44.909551 IP 100.87.151.249.46366 > 8.8.4.4.53: 3109+ A? serverfault.com. (33)
11:33:44.909676 IP 100.87.151.249.46366 > 8.8.8.8.53: 3109+ A? serverfault.com. (33)
11:33:44.910189 IP 100.87.151.249.30140 > 8.8.4.4.53: 30093+ AAAA? serverfault.com. (33)
11:33:44.910529 IP 100.87.151.249.30140 > 8.8.8.8.53: 30093+ AAAA? serverfault.com. (33)
11:33:46.212709 IP 100.87.151.249.3532 > 8.8.4.4.53: 23614+ A? www.googleapis.com. (36)
11:33:46.212845 IP 100.87.151.249.3532 > 8.8.8.8.53: 23614+ A? www.googleapis.com. (36)
11:33:46.213346 IP 100.87.151.249.53093 > 8.8.4.4.53: 44405+ AAAA? www.googleapis.com. (36)
11:33:46.213782 IP 100.87.151.249.53093 > 8.8.8.8.53: 44405+ AAAA? www.googleapis.com. (36)
11:33:46.965956 IP 100.87.151.249.45800 > 8.8.4.4.53: 31790+ A? www.youtube.com. (33)
11:33:46.966084 IP 100.87.151.249.45800 > 8.8.8.8.53: 31790+ A? www.youtube.com. (33)
11:33:46.966571 IP 100.87.151.249.46567 > 8.8.4.4.53: 32932+ AAAA? www.youtube.com. (33)
11:33:46.966935 IP 100.87.151.249.46567 > 8.8.8.8.53: 32932+ AAAA? www.youtube.com. (33)
11:33:47.340456 IP 100.87.151.249.48897 > 8.8.4.4.53: 65023+ A? detectportal.firefox.com. (42)
11:33:47.340584 IP 100.87.151.249.48897 > 8.8.8.8.53: 65023+ A? detectportal.firefox.com. (42)
11:33:47.341061 IP 100.87.151.249.21833 > 8.8.4.4.53: 49415+ AAAA? detectportal.firefox.com. (42)
11:33:47.341427 IP 100.87.151.249.21833 > 8.8.8.8.53: 49415+ AAAA? detectportal.firefox.com. (42)
11:33:47.851081 IP 100.87.151.249.63815 > 8.8.4.4.53: 4449+ A? profile.accounts.firefox.com. (46)
11:33:47.851191 IP 100.87.151.249.63815 > 8.8.8.8.53: 4449+ A? profile.accounts.firefox.com. (46)
11:33:47.851510 IP 100.87.151.249.42858 > 8.8.4.4.53: 22054+ AAAA? profile.accounts.firefox.com. (46)
11:33:47.851791 IP 100.87.151.249.42858 > 8.8.8.8.53: 22054+ AAAA? profile.accounts.firefox.com. (46)
11:33:48.957784 IP 100.87.151.249.65508 > 8.8.4.4.53: 45991+ A? 3.arch.pool.ntp.org. (37)
11:33:48.957889 IP 100.87.151.249.65508 > 8.8.8.8.53: 45991+ A? 3.arch.pool.ntp.org. (37)
11:33:48.958211 IP 100.87.151.249.12223 > 8.8.4.4.53: 45820+ AAAA? 3.arch.pool.ntp.org. (37)
11:33:48.958488 IP 100.87.151.249.12223 > 8.8.8.8.53: 45820+ AAAA? 3.arch.pool.ntp.org. (37)
11:33:49.432323 IP 192.168.1.25.53254 > 192.168.178.1.53: 45266+ A? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:49.432427 IP 192.168.1.25.53254 > 192.168.178.1.53: 7400+ AAAA? safe-browsing-quorum.privacy.ghostery.net.fritz.box. (69)
11:33:49.605692 IP 100.87.151.249.10325 > 8.8.4.4.53: 31467+ A? bbs.archlinux.org. (35)
11:33:49.605816 IP 100.87.151.249.10325 > 8.8.8.8.53: 31467+ A? bbs.archlinux.org. (35)
11:33:49.606294 IP 100.87.151.249.45442 > 8.8.4.4.53: 62048+ AAAA? bbs.archlinux.org. (35)
11:33:49.606660 IP 100.87.151.249.45442 > 8.8.8.8.53: 62048+ AAAA? bbs.archlinux.org. (35)
11:33:49.914346 IP 100.87.151.249.46366 > 8.8.4.4.53: 3109+ A? serverfault.com. (33)
11:33:49.914460 IP 100.87.151.249.46366 > 8.8.8.8.53: 3109+ A? serverfault.com. (33)
11:33:49.914783 IP 100.87.151.249.30140 > 8.8.4.4.53: 30093+ AAAA? serverfault.com. (33)
11:33:49.915067 IP 100.87.151.249.30140 > 8.8.8.8.53: 30093+ AAAA? serverfault.com. (33)
11:33:50.573927 IP 100.87.151.249.43181 > 192.33.96.102.123: NTPv4, Client, length 48
11:33:51.215986 IP 100.87.151.249.3532 > 8.8.4.4.53: 23614+ A? www.googleapis.com. (36)
11:33:51.216096 IP 100.87.151.249.3532 > 8.8.8.8.53: 23614+ A? www.googleapis.com. (36)
11:33:51.216771 IP 100.87.151.249.53093 > 8.8.4.4.53: 44405+ AAAA? www.googleapis.com. (36)
11:33:51.216857 IP 100.87.151.249.53093 > 8.8.8.8.53: 44405+ AAAA? www.googleapis.com. (36)
11:33:51.970953 IP 100.87.151.249.45800 > 8.8.4.4.53: 31790+ A? www.youtube.com. (33)
11:33:51.971057 IP 100.87.151.249.45800 > 8.8.8.8.53: 31790+ A? www.youtube.com. (33)
11:33:51.971711 IP 100.87.151.249.46567 > 8.8.4.4.53: 32932+ AAAA? www.youtube.com. (33)
11:33:51.971798 IP 100.87.151.249.46567 > 8.8.8.8.53: 32932+ AAAA? www.youtube.com. (33)
11:33:52.345163 IP 100.87.151.249.48897 > 8.8.4.4.53: 65023+ A? detectportal.firefox.com. (42)
11:33:52.345263 IP 100.87.151.249.48897 > 8.8.8.8.53: 65023+ A? detectportal.firefox.com. (42)
11:33:52.345916 IP 100.87.151.249.21833 > 8.8.4.4.53: 49415+ AAAA? detectportal.firefox.com. (42)
11:33:52.346002 IP 100.87.151.249.21833 > 8.8.8.8.53: 49415+ AAAA? detectportal.firefox.com. (42)
11:33:53.964208 IP 100.87.151.249.42291 > 8.8.4.4.53: 15652+ A? 0.arch.pool.ntp.org. (37)
11:33:53.964327 IP 100.87.151.249.42291 > 8.8.8.8.53: 15652+ A? 0.arch.pool.ntp.org. (37)
11:33:53.965174 IP 100.87.151.249.7713 > 8.8.4.4.53: 39246+ AAAA? 0.arch.pool.ntp.org. (37)
11:33:53.965289 IP 100.87.151.249.7713 > 8.8.8.8.53: 39246+ AAAA? 0.arch.pool.ntp.org. (37)
11:33:54.441385 IP 100.87.151.249.30508 > 8.8.4.4.53: 43654+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:54.441508 IP 100.87.151.249.30508 > 8.8.8.8.53: 43654+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:54.442059 IP 100.87.151.249.42460 > 8.8.4.4.53: 26222+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:54.442438 IP 100.87.151.249.42460 > 8.8.8.8.53: 26222+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:54.607722 IP 100.87.151.249.10325 > 8.8.4.4.53: 31467+ A? bbs.archlinux.org. (35)
11:33:54.607822 IP 100.87.151.249.10325 > 8.8.8.8.53: 31467+ A? bbs.archlinux.org. (35)
11:33:54.608142 IP 100.87.151.249.45442 > 8.8.4.4.53: 62048+ AAAA? bbs.archlinux.org. (35)
11:33:54.608420 IP 100.87.151.249.45442 > 8.8.8.8.53: 62048+ AAAA? bbs.archlinux.org. (35)
11:33:55.505624 IP 100.87.151.249.25938 > 8.8.4.4.53: 14744+ A? www.archlinux.org. (35)
11:33:55.505757 IP 100.87.151.249.25938 > 8.8.8.8.53: 14744+ A? www.archlinux.org. (35)
11:33:55.506227 IP 100.87.151.249.30227 > 8.8.4.4.53: 40991+ AAAA? www.archlinux.org. (35)
11:33:55.506586 IP 100.87.151.249.30227 > 8.8.8.8.53: 40991+ AAAA? www.archlinux.org. (35)
11:33:56.225415 IP 100.87.151.249.52825 > 8.8.4.4.53: 7909+ A? www.googleapis.com. (36)
11:33:56.225542 IP 100.87.151.249.52825 > 8.8.8.8.53: 7909+ A? www.googleapis.com. (36)
11:33:56.226029 IP 100.87.151.249.42109 > 8.8.4.4.53: 18363+ AAAA? www.googleapis.com. (36)
11:33:56.226398 IP 100.87.151.249.42109 > 8.8.8.8.53: 18363+ AAAA? www.googleapis.com. (36)
11:33:57.091995 IP 100.87.151.249.11892 > 8.8.4.4.53: 61071+ A? offers-api.ghostery.net. (41)
11:33:57.092128 IP 100.87.151.249.11892 > 8.8.8.8.53: 61071+ A? offers-api.ghostery.net. (41)
11:33:57.092611 IP 100.87.151.249.59391 > 8.8.4.4.53: 24121+ AAAA? offers-api.ghostery.net. (41)
11:33:57.092980 IP 100.87.151.249.59391 > 8.8.8.8.53: 24121+ AAAA? offers-api.ghostery.net. (41)
11:33:58.029417 IP 100.87.151.249.26684 > 8.8.4.4.53: 31645+ AAAA? www.archlinux.org. (35)
11:33:58.029543 IP 100.87.151.249.26684 > 8.8.8.8.53: 31645+ AAAA? www.archlinux.org. (35)
11:33:58.030031 IP 100.87.151.249.58574 > 8.8.4.4.53: 52291+ A? www.archlinux.org. (35)
11:33:58.030394 IP 100.87.151.249.58574 > 8.8.8.8.53: 52291+ A? www.archlinux.org. (35)
11:33:58.967771 IP 100.87.151.249.42291 > 8.8.4.4.53: 15652+ A? 0.arch.pool.ntp.org. (37)
11:33:58.967877 IP 100.87.151.249.42291 > 8.8.8.8.53: 15652+ A? 0.arch.pool.ntp.org. (37)
11:33:58.968190 IP 100.87.151.249.7713 > 8.8.4.4.53: 39246+ AAAA? 0.arch.pool.ntp.org. (37)
11:33:58.968467 IP 100.87.151.249.7713 > 8.8.8.8.53: 39246+ AAAA? 0.arch.pool.ntp.org. (37)
11:33:59.444352 IP 100.87.151.249.30508 > 8.8.4.4.53: 43654+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:59.444461 IP 100.87.151.249.30508 > 8.8.8.8.53: 43654+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:59.444768 IP 100.87.151.249.42460 > 8.8.4.4.53: 26222+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:33:59.445039 IP 100.87.151.249.42460 > 8.8.8.8.53: 26222+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:00.510659 IP 100.87.151.249.25938 > 8.8.4.4.53: 14744+ A? www.archlinux.org. (35)
11:34:00.510817 IP 100.87.151.249.25938 > 8.8.8.8.53: 14744+ A? www.archlinux.org. (35)
11:34:00.511184 IP 100.87.151.249.30227 > 8.8.4.4.53: 40991+ AAAA? www.archlinux.org. (35)
11:34:00.511488 IP 100.87.151.249.30227 > 8.8.8.8.53: 40991+ AAAA? www.archlinux.org. (35)
11:34:00.846393 IP 100.87.151.249.40357 > 172.104.136.243.53: 30264+% [1au] A? 1.arch.pool.ntp.org. (71)
11:34:00.847930 IP 100.87.151.249.45891 > 195.186.4.162.53: 49238+% [1au] A? 1.arch.pool.ntp.org. (71)
11:34:00.854145 IP 195.186.4.162.53 > 100.87.151.249.45891: 49238 4/0/1 A 217.147.208.1, A 213.251.53.234, A 84.16.67.12, A 195.141.190.190 (112)
11:34:00.855967 IP 100.87.151.249.42164 > 195.186.4.162.53: 15700+% [1au] SOA? 1.arch.pool.ntp.org. (71)
11:34:00.863859 IP 195.186.4.162.53 > 100.87.151.249.42164: 15700 0/1/1 (103)
11:34:00.868259 IP 100.87.151.249.51457 > 217.147.208.1.123: NTPv4, Client, length 48
11:34:01.230523 IP 100.87.151.249.52825 > 8.8.4.4.53: 7909+ A? www.googleapis.com. (36)
11:34:01.230633 IP 100.87.151.249.52825 > 8.8.8.8.53: 7909+ A? www.googleapis.com. (36)
11:34:01.230961 IP 100.87.151.249.42109 > 8.8.4.4.53: 18363+ AAAA? www.googleapis.com. (36)
11:34:01.231055 IP 100.87.151.249.42109 > 8.8.8.8.53: 18363+ AAAA? www.googleapis.com. (36)
11:34:02.094429 IP 100.87.151.249.11892 > 8.8.4.4.53: 61071+ A? offers-api.ghostery.net. (41)
11:34:02.094538 IP 100.87.151.249.11892 > 8.8.8.8.53: 61071+ A? offers-api.ghostery.net. (41)
11:34:02.094841 IP 100.87.151.249.59391 > 8.8.4.4.53: 24121+ AAAA? offers-api.ghostery.net. (41)
11:34:02.094918 IP 100.87.151.249.59391 > 8.8.8.8.53: 24121+ AAAA? offers-api.ghostery.net. (41)
11:34:03.034407 IP 100.87.151.249.58574 > 8.8.4.4.53: 52291+ A? www.archlinux.org. (35)
11:34:03.034510 IP 100.87.151.249.58574 > 8.8.8.8.53: 52291+ A? www.archlinux.org. (35)
11:34:03.034915 IP 100.87.151.249.26684 > 8.8.4.4.53: 31645+ AAAA? www.archlinux.org. (35)
11:34:03.035232 IP 100.87.151.249.26684 > 8.8.8.8.53: 31645+ AAAA? www.archlinux.org. (35)
11:34:03.974047 IP 100.87.151.249.38511 > 8.8.4.4.53: 58829+ A? 1.arch.pool.ntp.org. (37)
11:34:03.974173 IP 100.87.151.249.38511 > 8.8.8.8.53: 58829+ A? 1.arch.pool.ntp.org. (37)
11:34:03.974681 IP 100.87.151.249.58835 > 8.8.4.4.53: 55700+ AAAA? 1.arch.pool.ntp.org. (37)
11:34:03.975041 IP 100.87.151.249.58835 > 8.8.8.8.53: 55700+ AAAA? 1.arch.pool.ntp.org. (37)
11:34:04.454476 IP 100.87.151.249.43403 > 8.8.4.4.53: 61579+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:04.454604 IP 100.87.151.249.43403 > 8.8.8.8.53: 61579+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:04.455092 IP 100.87.151.249.25362 > 8.8.4.4.53: 25662+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:04.455474 IP 100.87.151.249.25362 > 8.8.8.8.53: 25662+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:06.876750 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
11:34:07.104079 IP 100.87.151.249.16782 > 8.8.4.4.53: 43867+ A? offers-api.ghostery.net. (41)
11:34:07.104211 IP 100.87.151.249.16782 > 8.8.8.8.53: 43867+ A? offers-api.ghostery.net. (41)
11:34:07.104694 IP 100.87.151.249.18090 > 8.8.4.4.53: 27426+ AAAA? offers-api.ghostery.net. (41)
11:34:07.105063 IP 100.87.151.249.18090 > 8.8.8.8.53: 27426+ AAAA? offers-api.ghostery.net. (41)
11:34:08.977761 IP 100.87.151.249.38511 > 8.8.4.4.53: 58829+ A? 1.arch.pool.ntp.org. (37)
11:34:08.977873 IP 100.87.151.249.38511 > 8.8.8.8.53: 58829+ A? 1.arch.pool.ntp.org. (37)
11:34:08.978197 IP 100.87.151.249.58835 > 8.8.4.4.53: 55700+ AAAA? 1.arch.pool.ntp.org. (37)
11:34:08.978484 IP 100.87.151.249.58835 > 8.8.8.8.53: 55700+ AAAA? 1.arch.pool.ntp.org. (37)
11:34:08.978773 ARP, Request who-has 100.87.144.1 tell 100.87.151.249, length 28
11:34:08.984902 ARP, Reply 100.87.144.1 is-at 4c:96:14:68:43:c9, length 42
11:34:09.457688 IP 100.87.151.249.43403 > 8.8.4.4.53: 61579+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:09.457797 IP 100.87.151.249.43403 > 8.8.8.8.53: 61579+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:09.458461 IP 100.87.151.249.25362 > 8.8.4.4.53: 25662+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:09.458542 IP 100.87.151.249.25362 > 8.8.8.8.53: 25662+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:11.074060 IP 100.87.151.249.37902 > 213.251.53.234.123: NTPv4, Client, length 48
11:34:12.107764 IP 100.87.151.249.16782 > 8.8.4.4.53: 43867+ A? offers-api.ghostery.net. (41)
11:34:12.107874 IP 100.87.151.249.16782 > 8.8.8.8.53: 43867+ A? offers-api.ghostery.net. (41)
11:34:12.108199 IP 100.87.151.249.18090 > 8.8.4.4.53: 27426+ AAAA? offers-api.ghostery.net. (41)
11:34:12.108499 IP 100.87.151.249.18090 > 8.8.8.8.53: 27426+ AAAA? offers-api.ghostery.net. (41)
11:34:13.985993 IP 100.87.151.249.14470 > 8.8.4.4.53: 53285+ A? 2.arch.pool.ntp.org. (37)
11:34:13.986130 IP 100.87.151.249.14470 > 8.8.8.8.53: 53285+ A? 2.arch.pool.ntp.org. (37)
11:34:13.986618 IP 100.87.151.249.1385 > 8.8.4.4.53: 49793+ AAAA? 2.arch.pool.ntp.org. (37)
11:34:13.986986 IP 100.87.151.249.1385 > 8.8.8.8.53: 49793+ AAAA? 2.arch.pool.ntp.org. (37)
11:34:14.466018 IP 100.87.151.249.44699 > 8.8.4.4.53: 8380+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:14.466147 IP 100.87.151.249.44699 > 8.8.8.8.53: 8380+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:14.466647 IP 100.87.151.249.11141 > 8.8.4.4.53: 32082+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:14.467082 IP 100.87.151.249.11141 > 8.8.8.8.53: 32082+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:17.302820 IP 100.87.151.249.38358 > 8.8.4.4.53: 20981+ A? detectportal.firefox.com. (42)
11:34:17.302953 IP 100.87.151.249.38358 > 8.8.8.8.53: 20981+ A? detectportal.firefox.com. (42)
11:34:17.303442 IP 100.87.151.249.5388 > 8.8.4.4.53: 17751+ AAAA? detectportal.firefox.com. (42)
11:34:17.303804 IP 100.87.151.249.5388 > 8.8.8.8.53: 17751+ AAAA? detectportal.firefox.com. (42)
11:34:18.991055 IP 100.87.151.249.14470 > 8.8.4.4.53: 53285+ A? 2.arch.pool.ntp.org. (37)
11:34:18.991164 IP 100.87.151.249.14470 > 8.8.8.8.53: 53285+ A? 2.arch.pool.ntp.org. (37)
11:34:18.991486 IP 100.87.151.249.1385 > 8.8.4.4.53: 49793+ AAAA? 2.arch.pool.ntp.org. (37)
11:34:18.991764 IP 100.87.151.249.1385 > 8.8.8.8.53: 49793+ AAAA? 2.arch.pool.ntp.org. (37)
11:34:19.470973 IP 100.87.151.249.44699 > 8.8.4.4.53: 8380+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:19.471084 IP 100.87.151.249.44699 > 8.8.8.8.53: 8380+ A? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:19.471395 IP 100.87.151.249.11141 > 8.8.4.4.53: 32082+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:19.471656 IP 100.87.151.249.11141 > 8.8.8.8.53: 32082+ AAAA? safe-browsing-quorum.privacy.ghostery.net. (59)
11:34:21.323906 IP 100.87.151.249.51833 > 84.16.67.12.123: NTPv4, Client, length 48
11:34:22.307631 IP 100.87.151.249.38358 > 8.8.4.4.53: 20981+ A? detectportal.firefox.com. (42)
11:34:22.307740 IP 100.87.151.249.38358 > 8.8.8.8.53: 20981+ A? detectportal.firefox.com. (42)
11:34:22.308059 IP 100.87.151.249.5388 > 8.8.4.4.53: 17751+ AAAA? detectportal.firefox.com. (42)
11:34:22.308343 IP 100.87.151.249.5388 > 8.8.8.8.53: 17751+ AAAA? detectportal.firefox.com. (42)
11:34:23.997183 IP 100.87.151.249.22280 > 8.8.4.4.53: 12274+ A? 3.arch.pool.ntp.org. (37)
11:34:23.997316 IP 100.87.151.249.22280 > 8.8.8.8.53: 12274+ A? 3.arch.pool.ntp.org. (37)
11:34:23.997801 IP 100.87.151.249.28374 > 8.8.4.4.53: 57067+ AAAA? 3.arch.pool.ntp.org. (37)
11:34:23.998169 IP 100.87.151.249.28374 > 8.8.8.8.53: 57067+ AAAA? 3.arch.pool.ntp.org. (37)
11:34:26.164969 IP 100.87.151.249.64632 > 8.8.4.4.53: 30293+ A? www.googleapis.com. (36)
11:34:26.165100 IP 100.87.151.249.64632 > 8.8.8.8.53: 30293+ A? www.googleapis.com. (36)
11:34:26.165559 IP 100.87.151.249.31919 > 8.8.4.4.53: 3284+ AAAA? www.googleapis.com. (36)
11:34:26.165920 IP 100.87.151.249.31919 > 8.8.8.8.53: 3284+ AAAA? www.googleapis.com. (36)
11:34:27.317600 IP 100.87.151.249.37831 > 8.8.4.4.53: 33947+ A? detectportal.firefox.com. (42)
11:34:27.317740 IP 100.87.151.249.37831 > 8.8.8.8.53: 33947+ A? detectportal.firefox.com. (42)
11:34:27.318187 IP 100.87.151.249.32058 > 8.8.4.4.53: 23364+ AAAA? detectportal.firefox.com. (42)
11:34:27.318565 IP 100.87.151.249.32058 > 8.8.8.8.53: 23364+ AAAA? detectportal.firefox.com. (42)

Beitrag geändert von Morta (14.07.2019 14:59:47)

Offline

#5 14.07.2019 17:04:10

segfault
Mitglied

Re: Von VLAN 10 zu eth0 Internet zugriff mit IPTables als Routing

Sieht doch alles gut aus. Du hast eine Adresse und Konnektivität nach Aussen geht prinzipiell auch

11:34:00.846393 IP 100.87.151.249.40357 > 172.104.136.243.53: 30264+% [1au] A? 1.arch.pool.ntp.org. (71)
11:34:00.847930 IP 100.87.151.249.45891 > 195.186.4.162.53: 49238+% [1au] A? 1.arch.pool.ntp.org. (71)
11:34:00.854145 IP 195.186.4.162.53 > 100.87.151.249.45891: 49238 4/0/1 A 217.147.208.1, A 213.251.53.234, A 84.16.67.12, A 195.141.190.190 (112)
11:34:00.855967 IP 100.87.151.249.42164 > 195.186.4.162.53: 15700+% [1au] SOA? 1.arch.pool.ntp.org. (71)

Google DNS ist (vermutlich) gefiltert, jedenfalls antwortet niemand:

11:34:00.511488 IP 100.87.151.249.30227 > 8.8.8.8.53: 40991+ AAAA? www.archlinux.org. (35)

DHCP ist also OK.

Update:

$ host 172.104.136.243
243.136.104.172.in-addr.arpa domain name pointer li1652-243.members.linode.com.
$ host 195.186.4.162
162.4.186.195.in-addr.arpa domain name pointer cns8.bluewin.ch.

Du hast vermutlich nur Konnektivität zu Hosts von bluewin.ch, zu keinen anderen. Du musst mit Deinem Carrier klären, wie weiter zu verfahren ist.

Beitrag geändert von segfault (14.07.2019 17:10:36)

Offline

#6 14.07.2019 18:42:31

Morta
Mitglied

Re: Von VLAN 10 zu eth0 Internet zugriff mit IPTables als Routing

Du hast vermutlich nur Konnektivität zu Hosts von bluewin.ch, zu keinen anderen. Du musst mit Deinem Carrier klären, wie weiter zu verfahren ist.

Der ISP gibt nur Support von ihrem Geräten im Internet
Ich muss auf die Seite www.swisscom.ch/registration und mich dort einloggen mit meinem Login!
Habe die DNS Server mal auf Swisscom-DNS geändert

root@ROUTER morta]# tcpdump -n -p -i eth0.10
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0.10, link-type EN10MB (Ethernet), capture size 262144 bytes
16:00:27.937717 IP 192.168.1.25.37632 > 172.217.168.74.443: Flags [S], seq 2332390700, win 64240, options [mss 1460,sackOK,TS val 1700528057 ecr 0,nop,wscale 7], length 0
16:00:27.940937 IP 192.168.1.25.52190 > 172.217.168.42.443: Flags [S], seq 473960116, win 64240, options [mss 1460,sackOK,TS val 3742993511 ecr 0,nop,wscale 7], length 0
16:00:28.719438 IP 192.168.1.25.48858 > 54.175.13.201.443: Flags [S], seq 3979048970, win 64240, options [mss 1460,sackOK,TS val 3339468644 ecr 0,nop,wscale 7], length 0
16:00:28.719527 IP 192.168.1.25.48860 > 54.175.13.201.443: Flags [S], seq 3918067417, win 64240, options [mss 1460,sackOK,TS val 3339468644 ecr 0,nop,wscale 7], length 0
16:00:36.302015 IP 83.76.250.253.45495 > 193.33.30.39.123: NTPv4, Client, length 48
16:00:46.552007 IP 83.76.250.253.48078 > 213.144.138.218.123: NTPv4, Client, length 48
16:00:47.376905 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
16:00:47.420924 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339487346 ecr 0,nop,wscale 7], length 0
16:00:47.422895 IP 83.76.250.253.3509 > 195.186.1.162.53: 38+ A? collector-hpn.ghostery.net. (44)
16:00:47.422999 IP 83.76.250.253.3509 > 195.186.4.162.53: 38+ A? collector-hpn.ghostery.net. (44)
16:00:47.423279 IP 83.76.250.253.37335 > 195.186.1.162.53: 20794+ AAAA? collector-hpn.ghostery.net. (44)
16:00:47.427931 IP 195.186.1.162.53 > 83.76.250.253.3509: 38 4/0/0 CNAME collector-hpn.privacy.ghostery.net., A 54.175.13.201, A 3.94.1.170, A 3.208.182.109 (128)
16:00:47.428636 IP 195.186.1.162.53 > 83.76.250.253.37335: 20794 1/1/0 CNAME collector-hpn.privacy.ghostery.net. (161)
16:00:47.429293 IP 195.186.4.162.53 > 83.76.250.253.3509: 38 4/0/0 CNAME collector-hpn.privacy.ghostery.net., A 54.175.13.201, A 3.94.1.170, A 3.208.182.109 (128)
16:00:47.429455 IP 83.76.250.253 > 195.186.4.162: ICMP 83.76.250.253 udp port 3509 unreachable, length 164
16:00:47.671611 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339487597 ecr 0,nop,wscale 7], length 0
16:00:47.797940 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339487723 ecr 0,nop,wscale 7], length 0
16:00:47.940314 IP 192.168.1.25.45088 > 172.217.168.10.443: Flags [S], seq 3111240491, win 64240, options [mss 1460,sackOK,TS val 3034930975 ecr 0,nop,wscale 7], length 0
16:00:48.053010 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339487978 ecr 0,nop,wscale 7], length 0
16:00:48.190949 IP 192.168.1.25.52202 > 172.217.168.42.443: Flags [S], seq 2816235964, win 64240, options [mss 1460,sackOK,TS val 3743013761 ecr 0,nop,wscale 7], length 0
16:00:48.422438 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339488347 ecr 0,nop,wscale 7], length 0
16:00:48.689143 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339488614 ecr 0,nop,wscale 7], length 0
16:00:48.822404 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339488747 ecr 0,nop,wscale 7], length 0
16:00:48.955765 IP 192.168.1.25.45088 > 172.217.168.10.443: Flags [S], seq 3111240491, win 64240, options [mss 1460,sackOK,TS val 3034931991 ecr 0,nop,wscale 7], length 0
16:00:49.062345 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339488987 ecr 0,nop,wscale 7], length 0
16:00:49.195762 IP 192.168.1.25.52202 > 172.217.168.42.443: Flags [S], seq 2816235964, win 64240, options [mss 1460,sackOK,TS val 3743014766 ecr 0,nop,wscale 7], length 0
16:00:50.475793 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339490401 ecr 0,nop,wscale 7], length 0
16:00:50.546119 IP 83.76.250.253 > 224.0.0.22: igmp v3 report, 1 group record(s)
16:00:50.905714 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339490831 ecr 0,nop,wscale 7], length 0
16:00:50.905797 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339490831 ecr 0,nop,wscale 7], length 0
16:00:51.115680 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339491041 ecr 0,nop,wscale 7], length 0
16:00:51.115758 IP 192.168.1.25.45088 > 172.217.168.10.443: Flags [S], seq 3111240491, win 64240, options [mss 1460,sackOK,TS val 3034934151 ecr 0,nop,wscale 7], length 0
16:00:51.328986 IP 192.168.1.25.52202 > 172.217.168.42.443: Flags [S], seq 2816235964, win 64240, options [mss 1460,sackOK,TS val 3743016899 ecr 0,nop,wscale 7], length 0
16:00:54.315696 IP 192.168.1.25.58312 > 195.186.145.93.443: Flags [S], seq 684680908, win 64240, options [mss 1460,sackOK,TS val 3440070699 ecr 0,nop,wscale 7], length 0
16:00:54.315795 IP 192.168.1.25.58314 > 195.186.145.93.443: Flags [S], seq 3451636052, win 64240, options [mss 1460,sackOK,TS val 3440070699 ecr 0,nop,wscale 7], length 0
16:00:54.528972 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339494454 ecr 0,nop,wscale 7], length 0
16:00:54.955638 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339494881 ecr 0,nop,wscale 7], length 0
16:00:54.955724 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339494881 ecr 0,nop,wscale 7], length 0
16:00:55.168883 IP 192.168.1.25.45088 > 172.217.168.10.443: Flags [S], seq 3111240491, win 64240, options [mss 1460,sackOK,TS val 3034938204 ecr 0,nop,wscale 7], length 0
16:00:55.168959 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339495094 ecr 0,nop,wscale 7], length 0
16:00:55.382251 IP 192.168.1.25.52202 > 172.217.168.42.443: Flags [S], seq 2816235964, win 64240, options [mss 1460,sackOK,TS val 3743020952 ecr 0,nop,wscale 7], length 0
16:00:55.506092 ARP, Request who-has 83.76.250.1 tell 83.76.250.253, length 28
16:00:55.509811 ARP, Reply 83.76.250.1 is-at 4c:96:14:68:43:c9, length 42
16:00:56.810069 IP 83.76.250.253.35966 > 172.104.136.243.53: 89+% [1au] A? 2.arch.pool.ntp.org. (71)
16:00:56.810760 IP 83.76.250.253.32815 > 195.186.4.162.53: 24507+% [1au] A? 2.arch.pool.ntp.org. (71)
16:00:56.816843 IP 195.186.4.162.53 > 83.76.250.253.32815: 24507 4/0/1 A 185.17.70.106, A 82.197.188.130, A 185.134.196.76, A 31.3.135.232 (112)
16:00:56.817938 IP 83.76.250.253.54907 > 195.186.4.162.53: 37836+% [1au] SOA? 2.arch.pool.ntp.org. (71)
16:00:56.824581 IP 195.186.4.162.53 > 83.76.250.253.54907: 37836 0/1/1 (103)
16:00:56.828271 IP 83.76.250.253.55096 > 185.17.70.106.123: NTPv4, Client, length 48
16:00:57.941245 IP 192.168.1.25.44772 > 216.58.215.234.443: Flags [S], seq 2188739712, win 64240, options [mss 1460,sackOK,TS val 2371188078 ecr 0,nop,wscale 7], length 0
16:00:58.540702 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339498466 ecr 0,nop,wscale 7], length 0
16:00:58.796543 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339498722 ecr 0,nop,wscale 7], length 0
16:00:59.542253 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339499467 ecr 0,nop,wscale 7], length 0
16:00:59.808889 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339499734 ecr 0,nop,wscale 7], length 0
16:01:01.568896 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339501494 ecr 0,nop,wscale 7], length 0
16:01:01.995510 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339501921 ecr 0,nop,wscale 7], length 0
16:01:02.619148 IP6 fe80::f2ad:4eff:fe09:6a7f > ff02::2: ICMP6, router solicitation, length 16
16:01:02.628961 IP 192.168.1.25.40670 > 193.247.167.91.80: Flags [S], seq 1037446016, win 64240, options [mss 1460,sackOK,TS val 913004153 ecr 0,nop,wscale 7], length 0
16:01:02.635401 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339502561 ecr 0,nop,wscale 7], length 0
16:01:02.879491 IP 192.168.1.25.40672 > 193.247.167.91.80: Flags [S], seq 1002981317, win 64240, options [mss 1460,sackOK,TS val 913004404 ecr 0,nop,wscale 7], length 0
16:01:02.881925 IP 162.243.142.246.58753 > 83.76.250.253.135: Flags [S], seq 3021953845, win 65535, length 0
16:01:02.882075 IP 83.76.250.253.135 > 162.243.142.246.58753: Flags [R.], seq 0, ack 3021953846, win 0, length 0
16:01:03.062172 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339502987 ecr 0,nop,wscale 7], length 0
16:01:03.062252 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339502987 ecr 0,nop,wscale 7], length 0
16:01:03.275490 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339503201 ecr 0,nop,wscale 7], length 0
16:01:03.648829 IP 192.168.1.25.40670 > 193.247.167.91.80: Flags [S], seq 1037446016, win 64240, options [mss 1460,sackOK,TS val 913005173 ecr 0,nop,wscale 7], length 0
16:01:03.888803 IP 192.168.1.25.40672 > 193.247.167.91.80: Flags [S], seq 1002981317, win 64240, options [mss 1460,sackOK,TS val 913005413 ecr 0,nop,wscale 7], length 0
16:01:05.622147 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339505547 ecr 0,nop,wscale 7], length 0
16:01:05.835356 IP 192.168.1.25.40670 > 193.247.167.91.80: Flags [S], seq 1037446016, win 64240, options [mss 1460,sackOK,TS val 913007360 ecr 0,nop,wscale 7], length 0
16:01:06.048755 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339505974 ecr 0,nop,wscale 7], length 0
16:01:06.048832 IP 192.168.1.25.40672 > 193.247.167.91.80: Flags [S], seq 1002981317, win 64240, options [mss 1460,sackOK,TS val 913007573 ecr 0,nop,wscale 7], length 0
16:01:07.051956 IP 83.76.250.253.55132 > 82.197.188.130.123: NTPv4, Client, length 48
16:01:07.630471 IP 192.168.1.25.47664 > 193.247.167.104.80: Flags [S], seq 1751409768, win 64240, options [mss 1460,sackOK,TS val 1310493402 ecr 0,nop,wscale 7], length 0
16:01:07.880979 IP 192.168.1.25.47666 > 193.247.167.104.80: Flags [S], seq 3827386569, win 64240, options [mss 1460,sackOK,TS val 1310493652 ecr 0,nop,wscale 7], length 0
16:01:08.635361 IP 192.168.1.25.47664 > 193.247.167.104.80: Flags [S], seq 1751409768, win 64240, options [mss 1460,sackOK,TS val 1310494407 ecr 0,nop,wscale 7], length 0
16:01:08.902020 IP 192.168.1.25.47666 > 193.247.167.104.80: Flags [S], seq 3827386569, win 64240, options [mss 1460,sackOK,TS val 1310494673 ecr 0,nop,wscale 7], length 0
16:01:09.709870 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339509635 ecr 0,nop,wscale 7], length 0
16:01:09.965729 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339509891 ecr 0,nop,wscale 7], length 0
16:01:10.715325 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339510641 ecr 0,nop,wscale 7], length 0
16:01:10.741923 IP 192.168.1.25.47664 > 193.247.167.104.80: Flags [S], seq 1751409768, win 64240, options [mss 1460,sackOK,TS val 1310496513 ecr 0,nop,wscale 7], length 0
16:01:10.955300 IP 192.168.1.25.47666 > 193.247.167.104.80: Flags [S], seq 3827386569, win 64240, options [mss 1460,sackOK,TS val 1310496727 ecr 0,nop,wscale 7], length 0
16:01:10.981960 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339510907 ecr 0,nop,wscale 7], length 0
16:01:12.875345 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339512801 ecr 0,nop,wscale 7], length 0
16:01:13.088671 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339513014 ecr 0,nop,wscale 7], length 0
16:01:13.728555 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339513654 ecr 0,nop,wscale 7], length 0
16:01:14.155273 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339514081 ecr 0,nop,wscale 7], length 0
16:01:16.928563 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339516854 ecr 0,nop,wscale 7], length 0
16:01:17.141832 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339517067 ecr 0,nop,wscale 7], length 0
16:01:17.302235 IP 83.76.250.253.37498 > 185.134.196.76.123: NTPv4, Client, length 48
16:01:17.377215 IP 1.1.1.1 > 224.0.0.1: igmp query v3 [max resp time 5.0s]
16:01:17.939106 IP 192.168.1.25.37666 > 172.217.168.74.443: Flags [S], seq 3982515055, win 64240, options [mss 1460,sackOK,TS val 1700578060 ecr 0,nop,wscale 7], length 0
16:01:18.189757 IP 192.168.1.25.45114 > 172.217.168.10.443: Flags [S], seq 636078125, win 64240, options [mss 1460,sackOK,TS val 3034961225 ecr 0,nop,wscale 7], length 0
16:01:18.955144 IP 192.168.1.25.37666 > 172.217.168.74.443: Flags [S], seq 3982515055, win 64240, options [mss 1460,sackOK,TS val 1700579076 ecr 0,nop,wscale 7], length 0
16:01:19.195129 IP 192.168.1.25.45114 > 172.217.168.10.443: Flags [S], seq 636078125, win 64240, options [mss 1460,sackOK,TS val 3034962231 ecr 0,nop,wscale 7], length 0
16:01:19.716334 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669025726 ecr 0,nop,wscale 7], length 0
16:01:19.915157 IP 192.168.1.25.48906 > 54.175.13.201.443: Flags [S], seq 2579205650, win 64240, options [mss 1460,sackOK,TS val 3339519841 ecr 0,nop,wscale 7], length 0
16:01:19.915227 IP 192.168.1.25.48900 > 54.175.13.201.443: Flags [S], seq 3684052370, win 64240, options [mss 1460,sackOK,TS val 3339519841 ecr 0,nop,wscale 7], length 0
16:01:19.915263 IP 192.168.1.25.48902 > 54.175.13.201.443: Flags [S], seq 1985829142, win 64240, options [mss 1460,sackOK,TS val 3339519841 ecr 0,nop,wscale 7], length 0
16:01:19.915295 IP 192.168.1.25.48898 > 54.175.13.201.443: Flags [S], seq 2056364619, win 64240, options [mss 1460,sackOK,TS val 3339519841 ecr 0,nop,wscale 7], length 0
16:01:20.707696 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339520633 ecr 0,nop,wscale 7], length 0
16:01:20.741737 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669026751 ecr 0,nop,wscale 7], length 0
16:01:20.960374 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339520886 ecr 0,nop,wscale 7], length 0
16:01:20.981711 IP 192.168.1.25.37666 > 172.217.168.74.443: Flags [S], seq 3982515055, win 64240, options [mss 1460,sackOK,TS val 1700581102 ecr 0,nop,wscale 7], length 0
16:01:21.408528 IP 192.168.1.25.45114 > 172.217.168.10.443: Flags [S], seq 636078125, win 64240, options [mss 1460,sackOK,TS val 3034964444 ecr 0,nop,wscale 7], length 0
16:01:21.666127 IP 83.76.250.253 > 224.0.0.22: igmp v3 report, 1 group record(s)
16:01:21.728424 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339521654 ecr 0,nop,wscale 7], length 0
16:01:21.968456 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339521894 ecr 0,nop,wscale 7], length 0
16:01:22.901753 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669028911 ecr 0,nop,wscale 7], length 0
16:01:23.755112 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339523681 ecr 0,nop,wscale 7], length 0
16:01:24.181724 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339524107 ecr 0,nop,wscale 7], length 0
16:01:25.035039 IP 192.168.1.25.48924 > 54.175.13.201.443: Flags [S], seq 3288815740, win 64240, options [mss 1460,sackOK,TS val 3339524961 ecr 0,nop,wscale 7], length 0
16:01:25.035128 IP 192.168.1.25.37666 > 172.217.168.74.443: Flags [S], seq 3982515055, win 64240, options [mss 1460,sackOK,TS val 1700585156 ecr 0,nop,wscale 7], length 0
16:01:25.248436 IP 192.168.1.25.48926 > 54.175.13.201.443: Flags [S], seq 1550255860, win 64240, options [mss 1460,sackOK,TS val 3339525174 ecr 0,nop,wscale 7], length 0
16:01:25.461613 IP 192.168.1.25.45114 > 172.217.168.10.443: Flags [S], seq 636078125, win 64240, options [mss 1460,sackOK,TS val 3034968497 ecr 0,nop,wscale 7], length 0
16:01:26.742174 IP 192.168.1.25.37676 > 172.217.168.74.443: Flags [S], seq 873968197, win 64240, options [mss 1460,sackOK,TS val 1700586863 ecr 0,nop,wscale 7], length 0
16:01:26.954912 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669032965 ecr 0,nop,wscale 7], length 0
16:01:27.551985 IP 83.76.250.253.53104 > 31.3.135.232.123: NTPv4, Client, length 48
16:01:27.755035 IP 192.168.1.25.37676 > 172.217.168.74.443: Flags [S], seq 873968197, win 64240, options [mss 1460,sackOK,TS val 1700587876 ecr 0,nop,wscale 7], length 0
16:01:27.808276 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339527734 ecr 0,nop,wscale 7], length 0
16:01:27.938579 IP 192.168.1.25.52234 > 172.217.168.42.443: Flags [S], seq 2901926855, win 64240, options [mss 1460,sackOK,TS val 3743053509 ecr 0,nop,wscale 7], length 0
16:01:28.234960 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339528161 ecr 0,nop,wscale 7], length 0
16:01:29.941697 IP 192.168.1.25.37676 > 172.217.168.74.443: Flags [S], seq 873968197, win 64240, options [mss 1460,sackOK,TS val 1700590062 ecr 0,nop,wscale 7], length 0
16:01:30.158239 IP 192.168.1.25.48912 > 54.175.13.201.443: Flags [S], seq 1433198219, win 64240, options [mss 1460,sackOK,TS val 3339530084 ecr 0,nop,wscale 7], length 0
16:01:31.861680 IP 192.168.1.25.48914 > 54.175.13.201.443: Flags [S], seq 854937896, win 64240, options [mss 1460,sackOK,TS val 3339531787 ecr 0,nop,wscale 7], length 0
16:01:33.994878 IP 192.168.1.25.37676 > 172.217.168.74.443: Flags [S], seq 873968197, win 64240, options [mss 1460,sackOK,TS val 1700594116 ecr 0,nop,wscale 7], length 0
16:01:34.946096 ARP, Request who-has 83.76.250.1 tell 83.76.250.253, length 28
16:01:34.947251 ARP, Reply 83.76.250.1 is-at 4c:96:14:68:43:c9, length 42
16:01:35.061495 IP 192.168.1.25.58604 > 138.201.81.199.80: Flags [S], seq 924078595, win 64240, options [mss 1460,sackOK,TS val 2669041071 ecr 0,nop,wscale 7], length 0
16:01:35.914797 IP 192.168.1.25.48934 > 54.175.13.201.443: Flags [S], seq 4151181481, win 64240, options [mss 1460,sackOK,TS val 3339535841 ecr 0,nop,wscale 7], length 0
16:01:36.341494 IP 192.168.1.25.48936 > 54.175.13.201.443: Flags [S], seq 3573034917, win 64240, options [mss 1460,sackOK,TS val 3339536267 ecr 0,nop,wscale 7], length 0
16:01:37.810629 IP 83.76.250.253.51203 > 172.104.136.243.53: 27206+% [1au] A? 3.arch.pool.ntp.org. (71)
16:01:37.811251 IP 83.76.250.253.47108 > 195.186.4.162.53: 6393+% [1au] A? 3.arch.pool.ntp.org. (71)
16:01:37.818044 IP 195.186.4.162.53 > 83.76.250.253.47108: 6393 4/0/1 A 217.147.223.78, A 185.17.70.106, A 212.51.144.44, A 195.186.4.101 (112)
16:01:37.818880 IP 83.76.250.253.46756 > 195.186.4.162.53: 65109+% [1au] SOA? 3.arch.pool.ntp.org. (71)
16:01:37.826172 IP 195.186.4.162.53 > 83.76.250.253.46756: 65109 0/1/1 (103)
16:01:37.829778 IP 83.76.250.253.44069 > 217.147.223.78.123: NTPv4, Client, length 48
^C
136 packets captured
136 packets received by filter
0 packets dropped by kernel
[root@ROUTER morta]# 

Ich muss doch von eth0.10 zu Ausgang br0  ein Routing machen... Irgendwie kann ich die DNS auflösen habe aber Packet Loss

Beitrag geändert von Morta (14.07.2019 18:43:23)

Offline

Schnellantwort auf dieses Thema

Schreibe deinen Beitrag und versende ihn
Deine Antwort

Fußzeile des Forums