--------------------------------------------- * The following section contains information about your system lun. 16 août 2021 16:54:20 CEST Output of uname -a Linux primarylaptop 5.13.9-gnu-1-pae #1 SMP PREEMPT Tue, 10 Aug 2021 20:07:49 +0000 i686 GNU/Linux --------------------------------------------- * The following section contains information about your network * interfaces. The one you chose for PPPoE should contain the words: * 'UP' and 'RUNNING'. If it does not, you probably have an Ethernet * driver problem. Output of ip link show 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: pw0: mtu 1500 qdisc noqueue state UP mode DORMANT group default qlen 1000 link/ether 58:94:6b:9c:4d:53 brd ff:ff:ff:ff:ff:ff permaddr 00:25:d3:87:19:d1 altname wlp2s0 3: pw1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 00:60:b2:54:cc:48 brd ff:ff:ff:ff:ff:ff permaddr 60:d8:19:98:2a:00 altname wlp3s0 4: usb: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 82:28:e9:a2:01:3e brd ff:ff:ff:ff:ff:ff 5: virbr1: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:f3:e1:bc brd ff:ff:ff:ff:ff:ff 6: virbr0: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:69:37:ff brd ff:ff:ff:ff:ff:ff 7: ue0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 3c:04:bf:28:b4:94 brd ff:ff:ff:ff:ff:ff permaddr 28:ee:52:0f:6a:49 altname enp0s26f7u5u2u4 --------------------------------------------- * The following section contains information about kernel modules. Output of lsmod Module Size Used by bsd_comp 16384 0 netlink_diag 16384 0 ppp_synctty 20480 0 ppp_async 20480 0 ppp_generic 40960 3 ppp_async,ppp_synctty,bsd_comp slhc 16384 1 ppp_generic nfnetlink 20480 0 8021q 28672 0 mrp 20480 1 8021q ccm 20480 6 rfcomm 69632 4 cdc_ether 20480 0 usbnet 45056 1 cdc_ether r8152 94208 0 mii 16384 2 usbnet,r8152 bnep 24576 2 xt_MASQUERADE 20480 3 xt_conntrack 16384 1 xt_CHECKSUM 16384 2 ipt_REJECT 16384 4 nf_reject_ipv4 16384 1 ipt_REJECT xt_tcpudp 20480 18 ip6table_mangle 16384 1 ip6table_nat 16384 1 ip6table_filter 16384 1 ip6_tables 24576 3 ip6table_mangle,ip6table_filter,ip6table_nat iptable_mangle 16384 1 iptable_nat 16384 1 nf_nat 45056 3 xt_MASQUERADE,iptable_nat,ip6table_nat nf_conntrack 139264 3 xt_MASQUERADE,xt_conntrack,nf_nat nf_defrag_ipv6 24576 1 nf_conntrack nf_defrag_ipv4 16384 1 nf_conntrack libcrc32c 16384 2 nf_conntrack,nf_nat iptable_filter 16384 1 btusb 53248 0 btrtl 24576 1 btusb btbcm 16384 1 btusb btintel 32768 1 btusb mousedev 20480 0 bluetooth 565248 27 btrtl,btintel,bnep,btbcm,rfcomm,btusb bridge 196608 0 stp 16384 1 bridge llc 16384 2 bridge,stp ecdh_generic 16384 1 bluetooth ecc 49152 1 ecdh_generic iTCO_wdt 16384 0 iTCO_vendor_support 16384 1 iTCO_wdt coretemp 20480 0 kvm_intel 294912 0 ath9k 139264 0 ath9k_common 32768 1 ath9k ath9k_hw 471040 2 ath9k,ath9k_common kvm 741376 1 kvm_intel ath 32768 3 ath9k_hw,ath9k,ath9k_common mac80211 872448 2 ath9k_hw,ath9k irqbypass 16384 1 kvm input_leds 16384 0 psmouse 147456 0 cfg80211 774144 4 mac80211,ath9k,ath,ath9k_common lpc_ich 24576 0 i2c_i801 32768 0 i2c_smbus 20480 1 i2c_i801 libarc4 16384 1 mac80211 thinkpad_acpi 94208 0 nvram 16384 1 thinkpad_acpi platform_profile 16384 1 thinkpad_acpi rfkill 24576 6 bluetooth,thinkpad_acpi,cfg80211 battery 24576 1 thinkpad_acpi ac 20480 0 snd_hda_codec_conexant 24576 1 snd_hda_codec_generic 77824 1 snd_hda_codec_conexant ledtrig_audio 16384 2 thinkpad_acpi,snd_hda_codec_generic rtc_cmos 24576 1 led_class 20480 4 input_leds,thinkpad_acpi,ath9k,snd_hda_codec_generic snd_hda_intel 40960 3 snd_intel_dspcfg 20480 1 snd_hda_intel snd_hda_codec 126976 3 snd_hda_intel,snd_hda_codec_conexant,snd_hda_codec_generic snd_hda_core 81920 4 snd_hda_intel,snd_hda_codec_conexant,snd_hda_codec,snd_hda_codec_generic snd_hwdep 16384 1 snd_hda_codec snd_pcm 114688 3 snd_hda_intel,snd_hda_codec,snd_hda_core e1000e 241664 0 snd_timer 36864 1 snd_pcm snd 81920 14 snd_hda_intel,snd_hwdep,snd_hda_codec_conexant,snd_hda_codec,snd_timer,thinkpad_acpi,snd_hda_codec_generic,snd_pcm soundcore 16384 1 snd intel_agp 16384 0 evdev 20480 12 mac_hid 16384 0 acpi_cpufreq 24576 1 usbip_host 28672 0 usbip_core 28672 1 usbip_host g_ether 16384 0 usb_f_rndis 32768 1 g_ether u_ether 24576 2 g_ether,usb_f_rndis libcomposite 57344 2 g_ether,usb_f_rndis udc_core 65536 3 u_ether,usb_f_rndis,libcomposite nbd 40960 0 crypto_user 20480 0 fuse 114688 3 ip_tables 24576 3 iptable_mangle,iptable_filter,iptable_nat x_tables 36864 13 ipt_REJECT,iptable_mangle,ip_tables,iptable_filter,xt_tcpudp,xt_MASQUERADE,iptable_nat,ip6table_mangle,xt_CHECKSUM,ip6table_filter,xt_conntrack,ip6table_nat,ip6_tables ext4 708608 3 crc32c_generic 16384 6 crc16 16384 2 bluetooth,ext4 mbcache 16384 1 ext4 jbd2 118784 1 ext4 crypto_simd 16384 0 cryptd 24576 1 crypto_simd sd_mod 53248 1 dm_crypt 45056 1 encrypted_keys 20480 1 dm_crypt dm_mod 114688 33 dm_crypt trusted 32768 2 encrypted_keys,dm_crypt asn1_encoder 16384 1 trusted tee 32768 1 trusted tpm 65536 1 trusted rng_core 16384 1 tpm serio_raw 20480 0 atkbd 28672 0 libps2 20480 2 atkbd,psmouse ahci 36864 1 libahci 32768 1 ahci uhci_hcd 45056 0 libata 225280 2 ahci,libahci scsi_mod 212992 2 sd_mod,libata ehci_pci 20480 0 ehci_hcd 73728 1 ehci_pci usbcore 245760 8 usbnet,usbip_host,ehci_hcd,cdc_ether,uhci_hcd,btusb,r8152,ehci_pci usb_common 16384 6 udc_core,ehci_hcd,uhci_hcd,libcomposite,usbcore,usbip_core i8042 28672 0 serio 24576 6 serio_raw,atkbd,psmouse,i8042 netconsole 20480 0 i915 1871872 14 intel_gtt 20480 2 intel_agp,i915 i2c_algo_bit 16384 1 i915 drm_kms_helper 225280 1 i915 syscopyarea 16384 1 drm_kms_helper sysfillrect 16384 1 drm_kms_helper sysimgblt 16384 1 drm_kms_helper fb_sys_fops 16384 1 drm_kms_helper cec 57344 2 i915,drm_kms_helper drm 479232 7 i915,drm_kms_helper agpgart 40960 3 intel_agp,intel_gtt,drm --------------------------------------------- * The following section lists your routing table. * If you have an entry which starts with '0.0.0.0', you probably * have defined a default route and gateway, and pppd will * not create a default route using your ISP. Try getting * rid of this route. Output of ip route default via 192.168.10.1 dev pw0 192.168.10.0/24 dev pw0 proto kernel scope link src 192.168.10.213 192.168.11.0/24 dev virbr1 proto kernel scope link src 192.168.11.1 linkdown 192.168.122.0/24 dev virbr0 proto kernel scope link src 192.168.122.1 linkdown --------------------------------------------- Contents of /etc/resolv.conf * The following section lists DNS setup. * If you can browse by IP address, but not name, suspect * a DNS problem. nameserver 192.168.10.1 --------------------------------------------- * The following section lists /etc/ppp/options. * You should have NOTHING in that file. Contents of /etc/ppp/options # /etc/ppp/options # # Originally created by Jim Knoble # Modified for Debian by alvar Bray # Modified for PPP Server setup by Christoph Lameter # Modified for ArchLinux by Manolis Tzanidakis # # To quickly see what options are active in this file, use this command: # egrep -v '#|^ *$' /etc/ppp/options # Specify which DNS Servers the incoming Win95 or WinNT Connection should use # Two Servers can be remotely configured # ms-dns 192.168.1.1 # ms-dns 192.168.1.2 # Specify which WINS Servers the incoming connection Win95 or WinNT should use # ms-wins 192.168.1.50 # ms-wins 192.168.1.51 # Run the executable or shell command specified after pppd has # terminated the link. This script could, for example, issue commands # to the modem to cause it to hang up if hardware modem control signals # were not available. #disconnect "chat -- \d+++\d\c OK ath0 OK" # async character map -- 32-bit hex; each bit is a character # that needs to be escaped for pppd to receive it. 0x00000001 # represents '\x01', and 0x80000000 represents '\x1f'. asyncmap 0 # Require the peer to authenticate itself before allowing network # packets to be sent or received. # Please do not disable this setting. It is expected to be standard in # future releases of pppd. Use the call option (see manpage) to disable # authentication for specific peers. auth # Use hardware flow control (i.e. RTS/CTS) to control the flow of data # on the serial port. crtscts # Use software flow control (i.e. XON/XOFF) to control the flow of data # on the serial port. #xonxoff # Specifies that certain characters should be escaped on transmission # (regardless of whether the peer requests them to be escaped with its # async control character map). The characters to be escaped are # specified as a list of hex numbers separated by commas. Note that # almost any character can be specified for the escape option, unlike # the asyncmap option which only allows control characters to be # specified. The characters which may not be escaped are those with hex # values 0x20 - 0x3f or 0x5e. #escape 11,13,ff # Don't use the modem control lines. #local # Specifies that pppd should use a UUCP-style lock on the serial device # to ensure exclusive access to the device. lock # Don't show the passwords when logging the contents of PAP packets. # This is the default. hide-password # When logging the contents of PAP packets, this option causes pppd to # show the password string in the log message. #show-password # Use the modem control lines. On Ultrix, this option implies hardware # flow control, as for the crtscts option. (This option is not fully # implemented.) modem # Set the MRU [Maximum Receive Unit] value to for negotiation. pppd # will ask the peer to send packets of no more than bytes. The # minimum MRU value is 128. The default MRU value is 1500. A value of # 296 is recommended for slow links (40 bytes for TCP/IP header + 256 # bytes of data). #mru 542 # Set the interface netmask to , a 32 bit netmask in "decimal dot" # notation (e.g. 255.255.255.0). #netmask 255.255.255.0 # Disables the default behaviour when no local IP address is specified, # which is to determine (if possible) the local IP address from the # hostname. With this option, the peer will have to supply the local IP # address during IPCP negotiation (unless it specified explicitly on the # command line or in an options file). #noipdefault # Enables the "passive" option in the LCP. With this option, pppd will # attempt to initiate a connection; if no reply is received from the # peer, pppd will then just wait passively for a valid LCP packet from # the peer (instead of exiting, as it does without this option). #passive # With this option, pppd will not transmit LCP packets to initiate a # connection until a valid LCP packet is received from the peer (as for # the "passive" option with old versions of pppd). #silent # Don't request or allow negotiation of any options for LCP and IPCP # (use default values). #-all # Disable Address/Control compression negotiation (use default, i.e. # address/control field disabled). #-ac # Disable asyncmap negotiation (use the default asyncmap, i.e. escape # all control characters). #-am # Don't fork to become a background process (otherwise pppd will do so # if a serial device is specified). #-detach # Disable IP address negotiation (with this option, the remote IP # address must be specified with an option on the command line or in # an options file). #-ip # Disable IPCP negotiation and IP communication. This option should # only be required if the peer is buggy and gets confused by requests # from pppd for IPCP negotiation. #noip # Disable magic number negotiation. With this option, pppd cannot # detect a looped-back line. #-mn # Disable MRU [Maximum Receive Unit] negotiation (use default, i.e. # 1500). #-mru # Disable protocol field compression negotiation (use default, i.e. # protocol field compression disabled). #-pc # Require the peer to authenticate itself using PAP. #+pap # Don't agree to authenticate using PAP. #-pap # Require the peer to authenticate itself using CHAP [Cryptographic # Handshake Authentication Protocol] authentication. #+chap # Don't agree to authenticate using CHAP. #-chap # Disable negotiation of Van Jacobson style IP header compression (use # default, i.e. no compression). #-vj # Increase debugging level (same as -d). If this option is given, pppd # will log the contents of all control packets sent or received in a # readable form. The packets are logged through syslog with facility # daemon and level debug. This information can be directed to a file by # setting up /etc/syslog.conf appropriately (see syslog.conf(5)). (If # pppd is compiled with extra debugging enabled, it will log messages # using facility local2 instead of daemon). #debug # Append the domain name to the local host name for authentication # purposes. For example, if gethostname() returns the name porsche, # but the fully qualified domain name is porsche.Quotron.COM, you would # use the domain option to set the domain name to Quotron.COM. #domain # Enable debugging code in the kernel-level PPP driver. The argument n # is a number which is the sum of the following values: 1 to enable # general debug messages, 2 to request that the contents of received # packets be printed, and 4 to request that the contents of transmitted # packets be printed. #kdebug n # Set the MTU [Maximum Transmit Unit] value to . Unless the peer # requests a smaller value via MRU negotiation, pppd will request that # the kernel networking code send data packets of no more than n bytes # through the PPP network interface. #mtu # Set the name of the local system for authentication purposes to . # This is a privileged option. With this option, pppd will use lines in the # secrets files which have as the second field when looking for a # secret to use in authenticating the peer. In addition, unless overridden # with the user option, will be used as the name to send to the peer # when authenticating the local system to the peer. (Note that pppd does # not append the domain name to .) #name # Enforce the use of the hostname as the name of the local system for # authentication purposes (overrides the name option). #usehostname # Set the assumed name of the remote system for authentication purposes # to . #remotename # Add an entry to this system's ARP [Address Resolution Protocol] # table with the IP address of the peer and the Ethernet address of this # system. proxyarp # Use the system password database for authenticating the peer using # PAP. Note: mgetty already provides this option. If this is specified # then dialin from users using a script under Linux to fire up ppp wont work. # login # If this option is given, pppd will send an LCP echo-request frame to the # peer every n seconds. Normally the peer should respond to the echo-request # by sending an echo-reply. This option can be used with the # lcp-echo-failure option to detect that the peer is no longer connected. lcp-echo-interval 30 # If this option is given, pppd will presume the peer to be dead if n # LCP echo-requests are sent without receiving a valid LCP echo-reply. # If this happens, pppd will terminate the connection. Use of this # option requires a non-zero value for the lcp-echo-interval parameter. # This option can be used to enable pppd to terminate after the physical # connection has been broken (e.g., the modem has hung up) in # situations where no hardware modem control lines are available. lcp-echo-failure 4 # Set the LCP restart interval (retransmission timeout) to seconds # (default 3). #lcp-restart # Set the maximum number of LCP terminate-request transmissions to # (default 3). #lcp-max-terminate # Set the maximum number of LCP configure-request transmissions to # (default 10). #lcp-max-configure # Set the maximum number of LCP configure-NAKs returned before starting # to send configure-Rejects instead to (default 10). #lcp-max-failure # Set the IPCP restart interval (retransmission timeout) to # seconds (default 3). #ipcp-restart # Set the maximum number of IPCP terminate-request transmissions to # (default 3). #ipcp-max-terminate # Set the maximum number of IPCP configure-request transmissions to # (default 10). #ipcp-max-configure # Set the maximum number of IPCP configure-NAKs returned before starting # to send configure-Rejects instead to (default 10). #ipcp-max-failure # Set the PAP restart interval (retransmission timeout) to seconds # (default 3). #pap-restart # Set the maximum number of PAP authenticate-request transmissions to # (default 10). #pap-max-authreq # Set the maximum time that pppd will wait for the peer to authenticate # itself with PAP to seconds (0 means no limit). #pap-timeout # Set the CHAP restart interval (retransmission timeout for # challenges) to seconds (default 3). #chap-restart # Set the maximum number of CHAP challenge transmissions to # (default 10). #chap-max-challenge # If this option is given, pppd will rechallenge the peer every # seconds. #chap-interval # With this option, pppd will accept the peer's idea of our local IP # address, even if the local IP address was specified in an option. #ipcp-accept-local # With this option, pppd will accept the peer's idea of its (remote) IP # address, even if the remote IP address was specified in an option. #ipcp-accept-remote # Disable the IPXCP and IPX protocols. # To let pppd pass IPX packets comment this out --- you'll probably also # want to install ipxripd, and have the Internal IPX Network option enabled # in your kernel. /usr/doc/HOWTO/IPX-HOWTO.gz contains more info. noipx # Exit once a connection has been made and terminated. This is the default, # unless the `persist' or `demand' option has been specified. #nopersist # Do not exit after a connection is terminated; instead try to reopen # the connection. #persist # Terminate after n consecutive failed connection attempts. # A value of 0 means no limit. The default value is 10. #maxfail # Initiate the link only on demand, i.e. when data traffic is present. # With this option, the remote IP address must be specified by the user on # the command line or in an options file. Pppd will initially configure # the interface and enable it for IP traffic without connecting to the peer. # When traffic is available, pppd will connect to the peer and perform # negotiation, authentication, etc. When this is completed, pppd will # commence passing data packets (i.e., IP packets) across the link. #demand # Specifies that pppd should disconnect if the link is idle for seconds. # The link is idle when no data packets (i.e. IP packets) are being sent or # received. Note: it is not advisable to use this option with the persist # option without the demand option. If the active-filter option is given, # data packets which are rejected by the specified activity filter also # count as the link being idle. #idle # Specifies how many seconds to wait before re-initiating the link after # it terminates. This option only has any effect if the persist or demand # option is used. The holdoff period is not applied if the link was # terminated because it was idle. #holdoff # Wait for up n milliseconds after the connect script finishes for a valid # PPP packet from the peer. At the end of this time, or when a valid PPP # packet is received from the peer, pppd will commence negotiation by # sending its first LCP packet. The default value is 1000 (1 second). # This wait period only applies if the connect or pty option is used. #connect-delay # Packet filtering: for more information, see pppd(8) # Any packets matching the filter expression will be interpreted as link # activity, and will cause a "demand" connection to be activated, and reset # the idle connection timer. (idle option) # The filter expression is akin to that of tcpdump(1) #active-filter # uncomment the line below this if you use PPPoE #plugin /usr/lib/pppd/plugins/pppoe.so # ------ --------------------------------------------- * The following section identifies your Ethernet interface * and user name. Some ISP's need 'username'; others * need 'username@isp.com'. Try both ETH=ue0; USER=test@fdn.dslnet.fr --------------------------------------------- * The following section shows the pppd command we will invoke pppd invocation /usr/bin/setsid /usr/bin/pppd pty '/usr/bin/pppoe -p /var/run/pppoe.conf-pppoe.pid.pppoe -I ue0 -T 80 -U -m 1412 ' noipdefault noauth default-asyncmap defaultroute hide-password nodetach usepeerdns mtu 1492 mru 1492 noaccomp nodeflate nopcomp novj novjccomp user test@fdn.dslnet.fr lcp-echo-interval 20 lcp-echo-failure 3 debug --------------------------------------------- using channel 15 Using interface ppp0 Connect: ppp0 <--> /dev/pts/5 rcvd [LCP ConfReq id=0xbb ] sent [LCP ConfReq id=0x1 ] sent [LCP ConfAck id=0xbb ] rcvd [LCP ConfAck id=0x1 ] sent [LCP EchoReq id=0x0 magic=0xc09cd7af] rcvd [CHAP Challenge id=0x1 <5ac4bf764e389bc426f5e5c97e75f9cf79d05584cd29d1064c32bf576add2e44226d3b71a5d636cccc9c16ca91909b0b61708faf99e1b5e514f5bcfd53>, name = "1001.sr2e.p93pa2.idf"] sent [CHAP Response id=0x1 <42037ee4ef2e9f258e83378331df5b9e>, name = "test@fdn.dslnet.fr"] rcvd [LCP EchoRep id=0x0 magic=0x574c0ed1] rcvd [CHAP Failure id=0x1 "Fixed by AuthResult"] CHAP authentication failed: Fixed by AuthResult CHAP authentication failed sent [LCP TermReq id=0x2 "Failed to authenticate ourselves to peer"] rcvd [LCP TermReq id=0xbc] sent [LCP TermAck id=0xbc] rcvd [LCP TermAck id=0x2] Connection terminated. Script /usr/bin/pppoe -p /var/run/pppoe.conf-pppoe.pid.pppoe -I ue0 -T 80 -U -m 1412 -D /tmp/pppoe-debug-16954/pppoe-debug.txt-0 finished (pid 16979), status = 0x0 --------------------------------------------- * The following section is an extract from your log. * Look for error messages from pppd, such as * a lack of kernel support for PPP, authentication failure * etc. Can't find messages file (looked for /var/{log,adm}/messages lun. 16 août 2021 16:54:20 CEST --------------------------------------------- * The following section is a dump of the packets * sent and received by rp-pppoe. If you don't see * any output, it's an Ethernet driver problem. If you only * see three PADI packets and nothing else, check your cables * and modem. Make sure the modem lights flash when you try * to connect. Check that your Ethernet card is in * half-duplex, 10Mb/s mode. If all else fails, * try using pppoe-sniff. rp-pppoe debugging dump rp-pppoe-3.15 16:54:20.536 SENT PPPoE Discovery (8863) PADI sess-id 0 length 12 SourceAddr 3c:04:bf:28:b4:94 DestAddr ff:ff:ff:ff:ff:ff 01 01 00 00 01 03 00 04 34 32 35 33 ........4253 16:54:20.731 RCVD PPPoE Discovery (8863) PADO sess-id 0 length 56 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 01 01 00 00 01 02 00 14 31 30 30 31 2e 73 72 32 ........1001.sr2 65 2e 70 39 33 70 61 32 2e 69 64 66 01 03 00 04 e.p93pa2.idf.... 34 32 35 33 01 04 00 10 dc 0c 97 6c 34 61 e2 aa 4253.......l4a.. 59 a3 21 ce 5f 12 4d 93 Y.!._.M. 16:54:20.731 SENT PPPoE Discovery (8863) PADR sess-id 0 length 32 SourceAddr 3c:04:bf:28:b4:94 DestAddr 06:00:11:00:00:00 01 01 00 00 01 03 00 04 34 32 35 33 01 04 00 10 ........4253.... dc 0c 97 6c 34 61 e2 aa 59 a3 21 ce 5f 12 4d 93 ...l4a..Y.!._.M. 16:54:20.732 RCVD PPPoE Discovery (8863) PADO sess-id 0 length 58 SourceAddr 06:00:22:00:00:00 DestAddr 3c:04:bf:28:b4:94 01 01 00 00 01 02 00 16 31 30 30 32 2e 73 72 32 ........1002.sr2 65 2e 70 37 35 74 68 32 2e 70 61 72 69 73 01 03 e.p75th2.paris.. 00 04 34 32 35 33 01 04 00 10 da 48 c3 9e 33 26 ..4253.....H..3& 00 86 76 33 0a 66 3f 43 a6 51 ..v3.f?C.Q 16:54:20.734 RCVD PPPoE Discovery (8863) PADS sess-id 1 length 12 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 01 01 00 00 01 03 00 04 34 32 35 33 ........4253 16:54:20.735 RCVD PPPoE Session (8864) SESS sess-id 1 length 21 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 c0 21 01 bb 00 13 01 04 05 d4 03 05 c2 23 05 05 .!...........#.. 06 57 4c 0e d1 .WL.. 16:54:20.735 SENT PPPoE Session (8864) SESS sess-id 1 length 16 SourceAddr 3c:04:bf:28:b4:94 DestAddr 06:00:11:00:00:00 c0 21 01 01 00 0e 01 04 05 d4 05 06 c0 9c d7 af .!.............. 16:54:20.735 SENT PPPoE Session (8864) SESS sess-id 1 length 21 SourceAddr 3c:04:bf:28:b4:94 DestAddr 06:00:11:00:00:00 c0 21 02 bb 00 13 01 04 05 d4 03 05 c2 23 05 05 .!...........#.. 06 57 4c 0e d1 .WL.. 16:54:20.737 RCVD PPPoE Session (8864) SESS sess-id 1 length 16 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 c0 21 02 01 00 0e 01 04 05 d4 05 06 c0 9c d7 af .!.............. 16:54:20.737 RCVD PPPoE Session (8864) SESS sess-id 1 length 88 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 c2 23 01 01 00 56 3d 5a c4 bf 76 4e 38 9b c4 26 .#...V=Z..vN8..& f5 e5 c9 7e 75 f9 cf 79 d0 55 84 cd 29 d1 06 4c ...~u..y.U..)..L 32 bf 57 6a dd 2e 44 22 6d 3b 71 a5 d6 36 cc cc 2.Wj..D"m;q..6.. 9c 16 ca 91 90 9b 0b 61 70 8f af 99 e1 b5 e5 14 .......ap....... f5 bc fd 53 31 30 30 31 2e 73 72 32 65 2e 70 39 ...S1001.sr2e.p9 33 70 61 32 2e 69 64 66 3pa2.idf 16:54:20.738 SENT PPPoE Session (8864) SESS sess-id 1 length 10 SourceAddr 3c:04:bf:28:b4:94 DestAddr 06:00:11:00:00:00 c0 21 09 00 00 08 c0 9c d7 af .!........ 16:54:20.738 SENT PPPoE Session (8864) SESS sess-id 1 length 41 SourceAddr 3c:04:bf:28:b4:94 DestAddr 06:00:11:00:00:00 c2 23 02 01 00 27 10 42 03 7e e4 ef 2e 9f 25 8e .#...'.B.~....%. 83 37 83 31 df 5b 9e 74 65 73 74 40 66 64 6e 2e .7.1.[.test@fdn. 64 73 6c 6e 65 74 2e 66 72 dslnet.fr 16:54:20.741 RCVD PPPoE Session (8864) SESS sess-id 1 length 10 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 c0 21 0a 00 00 08 57 4c 0e d1 .!....WL.. 16:54:20.745 RCVD PPPoE Session (8864) SESS sess-id 1 length 25 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 c2 23 04 01 00 17 46 69 78 65 64 20 62 79 20 41 .#....Fixed by A 75 74 68 52 65 73 75 6c 74 uthResult 16:54:20.745 RCVD PPPoE Session (8864) SESS sess-id 1 length 6 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 c0 21 05 bc 00 04 .!.... 16:54:20.746 SENT PPPoE Session (8864) SESS sess-id 1 length 46 SourceAddr 3c:04:bf:28:b4:94 DestAddr 06:00:11:00:00:00 c0 21 05 02 00 2c 46 61 69 6c 65 64 20 74 6f 20 .!...,Failed to 61 75 74 68 65 6e 74 69 63 61 74 65 20 6f 75 72 authenticate our 73 65 6c 76 65 73 20 74 6f 20 70 65 65 72 selves to peer 16:54:20.746 SENT PPPoE Session (8864) SESS sess-id 1 length 6 SourceAddr 3c:04:bf:28:b4:94 DestAddr 06:00:11:00:00:00 c0 21 06 bc 00 04 .!.... 16:54:20.748 RCVD PPPoE Session (8864) SESS sess-id 1 length 6 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 c0 21 06 02 00 04 .!.... 16:54:20.748 RCVD PPPoE Discovery (8863) PADT sess-id 1 length 0 SourceAddr 06:00:11:00:00:00 DestAddr 3c:04:bf:28:b4:94 16:54:20.748 SENT PPPoE Discovery (8863) PADT sess-id 1 length 55 SourceAddr 3c:04:bf:28:b4:94 DestAddr 06:00:11:00:00:00 01 03 00 04 34 32 35 33 02 03 00 17 52 65 63 65 ....4253....Rece 69 76 65 64 20 50 41 44 54 20 66 72 6f 6d 20 70 ived PADT from p 65 65 72 01 04 00 10 dc 0c 97 6c 34 61 e2 aa 59 eer.......l4a..Y a3 21 ce 5f 12 4d 93 .!._.M.