Tomato: No Internet and no ssh access

11 posts / 0 new
Last post
Psypher246
Psypher246's picture
Tomato: No Internet and no ssh access

I have some issues with PPP connections on my new installed Tomato with the latest EU firmware. There are other threads with people who have the exact same problem. One I have already posted one is:

 http://www.myopenrouter.com/forum/thread/10470/Can-t-change-password-on-...

 

The password problem is not the issue. the problem is once PPPoE is connected there is no connection to the net despite being able to connect to router. It's not dns as I cannot ping public IP's either.

SSH is also not working as I described in the other posts.

 

Any help would be appreciated, I have a pratically useless device right now and would really like to stick with tomato and figure out why this doesn't work.

 

Thanks

 

 

 

mona
mona's picture
I have checked SSH issue.

I have checked SSH issue. Tomato firmware does not support ssh. If you want to use ssh, you can add it as tomato is open source firmware.

Psypher246
Psypher246's picture
are you sure? then why does

are you sure? then why does it ask for my password AND have the option in the gui to turn it on?? Anyway the ssh issue is the least of my problems, I have a very expensive useless paperwieght right now that won't even connect to the internet. Serious show stopper there I reckon, kinda useless even supplying tomato at all

Psypher246
Psypher246's picture
Please anybody have an idea?

Please anybody have an idea? Should I log it with tomato dev's? Will they not tell me it's customized and not supported? I know for a fact I am not the only person with this issue.

please it's been 5 days and no-one has replied re the internet problem!!

Psypher246
Psypher246's picture
I am really disappointed,

I am really disappointed, wish I never bought the netgear and went with linksys instead. I'm sure there is a more active community there.

Can anyone at least tell me how to go back to netgear firmware so i can have a functioning router??

thanks

Psypher246
Psypher246's picture
as i said in my 1st post i

as i said in my 1st post i can connect to the gui AND ssh to the router, asks for password and then fails. And yes I can ping the router.

BTW i am a CCNA, MCSE, A+, N+ and have 7 years networking experience. The basics are not an issue.

there is no internet when using PPPoE. Here is the info from my other post:
I am experiencing the exact same problem. Just got my router yesterday, got the latest firmware for EU. Everything seems fine, Internet connected yet there is nothing beyond the router. I cannot SSH in either even though the password prompt comes up, enter password, wait 2 mins:

Connection to 192.168.0.254 closed by remote host.
Connection to 192.168.0.254 closed.

Problem looks like a firewall issue but I have setup anything and cannot see anything that would block it.

I am not willing to give up on tomato. Took me hours already to get it working due to incomplete documentation and from what i understand and can see it's the best.

Just tested a direct network setup now, let my current working router connect to the internet, give out dhcp, plug the netgear wan port into the other router's switch and setup my laptop as a device on the netgear lan. dhcp client network setup on the netgear and everything works. so the problem is only with PPPoE connections. could still be a firewall issue not setting up correct rules for ppp.

one change, now from my laptop i can ssh BUT i get this error as soon as i input password:
PTY allocation request failed on channel 0
shell request failed on channel 0

My biggest problem right now is that as far as I understand to restore the firmware back to the original Netgear or even DD-wrt I need ssh access or solder the console cable to the board. I will NOT do this, I am not opening a brand new router. How can I fix ssh so I can put on diffrent firmware. Does not seem like anyone knows how to get the internet to work on tomato as I have found several posts mentioning this issue but no help.

Psypher246
Psypher246's picture
So tried everything again,

So tried everything again, doublechecked everything. Still nothing. here's what i get with ssh:

Am i supposed to ssh using admin or root? Anyway neither works but either give different errors. When i set password auth and use admin it just keeps asking me for the password. Logs (below) show incorrect username trying to access. When i use root I get the error i described before (also in logs) Same applies when using auth keys. If i paste a known working rsa ssh public key i just get the error:

Permission denied (publickey).

Also produces unknown user logs

I get this error when trying to telnet:

telnet 192.168.0.254
Trying 192.168.0.254...
Connected to 192.168.0.254.
Escape character is '^]'.
Connection closed by foreign host.

Even though it's on.

I tried allowing my ip range: 192.168.0.0/24

Nothing works.

the internet is also still doing exactly the same, pppoe connected, cannot break out at all. the logs show me pinging opendns servers (this is just an example no ip's work)

If i get the netgear firmware file and go to the upgrade page and upgrade to the netgear firmware will it work? Same for dd-wrt. Or is it possible to tftp the other firmware to the router?

Dec 31 16:00:06 syslog.info syslogd started: BusyBox v1.2.2
Dec 31 16:00:06 user.notice kernel: klogd started: BusyBox v1.2.2 (2008.01.28-07:44+0000)
Dec 31 16:00:07 user.warn kernel: CPU revision is: 00029029
Dec 31 16:00:07 user.warn kernel: Primary instruction cache 16kb, linesize 16 bytes (4 ways)
Dec 31 16:00:07 user.warn kernel: Primary data cache 16kb, linesize 16 bytes (2 ways)
Dec 31 16:00:07 user.warn kernel: Linux version 2.4.20 (nachi@localhost.localdomain) (gcc version 3.2.3 with Broadcom modifications) #408 Wed Apr 16 01:55:33 PDT 2008
Dec 31 16:00:07 user.warn kernel: Setting the PFC to its default value
Dec 31 16:00:07 user.warn kernel: Determined physical RAM map:
Dec 31 16:00:07 user.warn kernel: memory: 01000000 @ 00000000 (usable)
Dec 31 16:00:07 user.warn kernel: On node 0 totalpages: 4096
Dec 31 16:00:07 user.warn kernel: zone(0): 4096 pages.
Dec 31 16:00:07 user.warn kernel: zone(1): 0 pages.
Dec 31 16:00:07 user.warn kernel: zone(2): 0 pages.
Dec 31 16:00:07 user.warn kernel: Kernel command line: root=/dev/mtdblock2 noinitrd console=ttyS0,115200
Dec 31 16:00:07 user.warn kernel: CPU: BCM5354 rev 2 at 240 MHz
Dec 31 16:00:07 user.warn kernel: Calibrating delay loop... 237.56 BogoMIPS
Dec 31 16:00:07 user.info kernel: Memory: 14452k/16384k available (1348k kernel code, 1932k reserved, 104k data, 72k init, 0k highmem)
Dec 31 16:00:07 user.info kernel: Dentry cache hash table entries: 2048 (order: 2, 16384 bytes)
Dec 31 16:00:07 user.info kernel: Inode cache hash table entries: 1024 (order: 1, 8192 bytes)
Dec 31 16:00:07 user.warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Dec 31 16:00:07 user.warn kernel: Buffer-cache hash table entries: 1024 (order: 0, 4096 bytes)
Dec 31 16:00:07 user.warn kernel: Page-cache hash table entries: 4096 (order: 2, 16384 bytes)
Dec 31 16:00:07 user.warn kernel: Checking for 'wait' instruction... unavailable.
Dec 31 16:00:07 user.warn kernel: POSIX conformance testing by UNIFIX
Dec 31 16:00:07 user.warn kernel: PCI: no core
Dec 31 16:00:07 user.warn kernel: PCI: Fixing up bus 0
Dec 31 16:00:07 user.info kernel: Linux NET4.0 for Linux 2.4
Dec 31 16:00:07 user.info kernel: Based upon Swansea University Computer Society NET3.039
Dec 31 16:00:07 user.warn kernel: Initializing RT netlink socket
Dec 31 16:00:07 user.warn kernel: Starting kswapd
Dec 31 16:00:07 user.info kernel: devfs: v1.12c (20020818) Richard Gooch (rgooch@atnf.csiro.au)
Dec 31 16:00:07 user.info kernel: devfs: boot_options: 0x1
Dec 31 16:00:07 user.info kernel: Squashfs 2.2-r2 (released 2005/09/08) (C) 2002-2005 Phillip Lougher
Dec 31 16:00:07 user.info kernel: Serial driver version 5.05c (2001-07-08) with MANY_PORTS SHARE_IRQ SERIAL_PCI enabled
Dec 31 16:00:07 user.info kernel: ttyS00 at 0xb8000300 (irq = 3) is a 16550A
Dec 31 16:00:07 user.info kernel: ttyS01 at 0xb8000400 (irq = 0) is a 16550A
Dec 31 16:00:07 user.info kernel: PPP generic driver version 2.4.2
Dec 31 16:00:07 user.err kernel: pflash: found no supported devices
Dec 31 16:00:07 user.notice kernel: sflash: squashfs filesystem found at block 621
Dec 31 16:00:07 user.notice kernel: Creating 8 MTD partitions on "sflash":
Dec 31 16:00:07 user.notice kernel: 0x00000000-0x00020000 : "boot"
Dec 31 16:00:07 user.notice kernel: 0x00020000-0x003b0000 : "linux"
Dec 31 16:00:07 user.notice kernel: 0x0009b734-0x003b0000 : "rootfs"
Dec 31 16:00:07 user.notice kernel: 0x003b0000-0x003c0000 : "T_Meter1"
Dec 31 16:00:07 user.notice kernel: 0x003c0000-0x003d0000 : "T_Meter2"
Dec 31 16:00:07 user.notice kernel: 0x003d0000-0x003e0000 : "POT"
Dec 31 16:00:07 user.notice kernel: 0x003e0000-0x003f0000 : "board_data"
Dec 31 16:00:07 user.notice kernel: 0x003f0000-0x00400000 : "nvram"
Dec 31 16:00:07 user.info kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Dec 31 16:00:07 user.info kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Dec 31 16:00:07 user.info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
Dec 31 16:00:07 user.info kernel: TCP: Hash tables configured (established 1024 bind 2048)
Dec 31 16:00:07 user.info kernel: Linux IP multicast router 0.06 plus PIM-SM
Dec 31 16:00:07 user.warn kernel: ip_conntrack version 2.1 (4099 buckets, 2048 max) - 368 bytes per conntrack
Dec 31 16:00:07 user.warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Dec 31 16:00:07 user.info kernel: NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
Dec 31 16:00:07 user.info kernel: NET4: Ethernet Bridge 008 for NET4.0
Dec 31 16:00:07 user.alert kernel: 802.1Q VLAN Support v1.7 Ben Greear
Dec 31 16:00:07 user.alert kernel: All bugs added by David S. Miller
Dec 31 16:00:07 user.warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Dec 31 16:00:07 user.info kernel: Mounted devfs on /dev
Dec 31 16:00:07 user.info kernel: Freeing unused kernel memory: 72k freed
Dec 31 16:00:07 user.warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Dec 31 16:00:07 user.warn kernel: ip_conntrack_pptp version 1.9 loaded
Dec 31 16:00:07 user.warn kernel: ip_nat_pptp version 1.5 loaded
Dec 31 16:00:07 user.warn kernel: ip_conntrack_rtsp v0.01 loading
Dec 31 16:00:07 user.warn kernel: ip_nat_rtsp v0.01 loading
Dec 31 16:00:07 user.warn kernel: eth0: Broadcom BCM47xx 10/100 Mbps Ethernet Controller 4.150.10.5
Dec 31 16:00:07 user.warn kernel: eth1: Broadcom BCM4318 802.11 Wireless Controller 4.150.10.5
Dec 31 16:00:07 user.warn kernel: tomato_ct.c [Apr 16 2008 02:04:19]
Dec 31 16:00:07 user.info kernel: vlan0: dev_set_promiscuity(master, 1)
Dec 31 16:00:07 user.info kernel: device eth0 entered promiscuous mode
Dec 31 16:00:07 user.info kernel: device vlan0 entered promiscuous mode
Dec 31 16:00:07 user.info kernel: device eth1 entered promiscuous mode
Dec 31 16:00:07 user.info kernel: br0: port 2(eth1) entering listening state
Dec 31 16:00:07 user.info kernel: br0: port 1(vlan0) entering listening state
Dec 31 16:00:07 user.info kernel: br0: port 2(eth1) entering learning state
Dec 31 16:00:07 user.info kernel: br0: port 1(vlan0) entering learning state
Dec 31 16:00:07 user.info kernel: br0: port 1(vlan0) entering disabled state
Dec 31 16:00:07 user.info kernel: vlan0: dev_set_promiscuity(master, 1)
Dec 31 16:00:07 user.info kernel: br0: port 1(vlan0) entering listening state
Dec 31 16:00:07 user.info kernel: br0: port 2(eth1) entering forwarding state
Dec 31 16:00:07 user.info kernel: br0: topology change detected, propagating
Dec 31 16:00:07 user.info kernel: br0: port 1(vlan0) entering learning state
Dec 31 16:00:07 user.info kernel: br0: port 1(vlan0) entering forwarding state
Dec 31 16:00:07 user.info kernel: br0: topology change detected, propagating
Dec 31 16:00:07 cron.notice crond[91]: crond 2.3.2 dillon, started, log level 9
Dec 31 16:00:08 daemon.info dnsmasq[97]: started, version 2.40 cachesize 150
Dec 31 16:00:08 authpriv.warn dropbear[73]: Failed reading '/etc/dropbear/dropbear_dss_host_key', disabling DSS
Dec 31 16:00:08 daemon.info dnsmasq[97]: compile time options: no-IPv6 GNU-getopt no-RTC no-ISC-leasefile no-DBus no-I18N no-TFTP
Dec 31 16:00:08 daemon.warn dnsmasq[97]: failed to access /etc/resolv.dnsmasq: No such file or directory
Dec 31 16:00:08 daemon.info dnsmasq[97]: read /etc/hosts - 0 addresses
Dec 31 16:00:08 daemon.info dnsmasq[97]: read /etc/hosts.dnsmasq - 1 addresses
Dec 31 16:00:08 authpriv.info dropbear[103]: Running in background
Dec 31 16:00:17 daemon.info dnsmasq[97]: exiting on receipt of SIGTERM
Dec 31 16:00:17 daemon.info dnsmasq[129]: started, version 2.40 cachesize 150
Dec 31 16:00:17 daemon.info dnsmasq[129]: compile time options: no-IPv6 GNU-getopt no-RTC no-ISC-leasefile no-DBus no-I18N no-TFTP
Dec 31 16:00:17 daemon.info dnsmasq[129]: reading /etc/resolv.dnsmasq
Dec 31 16:00:17 daemon.info dnsmasq[129]: using nameserver 196.14.239.2#53
Dec 31 16:00:17 daemon.info dnsmasq[129]: using nameserver 208.67.222.222#53
Dec 31 16:00:17 daemon.info dnsmasq[129]: read /etc/hosts - 0 addresses
Dec 31 16:00:17 daemon.info dnsmasq[129]: read /etc/hosts.dnsmasq - 1 addresses
Dec 31 16:01:56 authpriv.info dropbear[211]: Child connection from 192.168.0.33:33514
Dec 31 16:01:57 authpriv.warn dropbear[211]: login attempt for nonexistent user from 192.168.0.33:33514
Dec 31 16:01:58 authpriv.info dropbear[211]: exit before auth: error reading: Connection reset by peer
Dec 31 16:02:26 authpriv.info dropbear[216]: Child connection from 192.168.0.33:33516
Dec 31 16:02:26 authpriv.notice dropbear[216]: pubkey auth succeeded for 'root' with key md5 76:06:6f:90:4e:70:b1:38:ba:c5:c9:a8:d7:b0:38:c5 from 192.168.0.33:33516
Dec 31 16:02:26 authpriv.warn dropbear[216]: pty_allocate: openpty: No such file or directory
Dec 31 16:02:26 authpriv.warn dropbear[216]: no pty was allocated, couldn't execute
Dec 31 16:02:26 authpriv.info dropbear[216]: exit after auth (root): Exited normally
Dec 31 16:02:41 authpriv.info dropbear[221]: Child connection from 192.168.0.33:33517
Dec 31 16:02:42 authpriv.warn dropbear[221]: login attempt for nonexistent user from 192.168.0.33:33517
Dec 31 16:02:43 authpriv.info dropbear[221]: exit before auth: error reading: Connection reset by peer
Dec 31 16:03:34 syslog.info System log daemon exiting.
Dec 31 16:03:35 syslog.info syslogd started: BusyBox v1.2.2
Dec 31 16:03:35 user.notice kernel: klogd started: BusyBox v1.2.2 (2008.01.28-07:44+0000)
Dec 31 16:03:35 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=462
Dec 31 16:03:36 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=192.42.113.248 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=20415 DF PROTO=TCP SPT=41212 DPT=9001 WINDOW=5840 RES=0x00 SYN URGP=0 OPT (020405AC0101080A00099D380000000001030309)
Dec 31 16:03:36 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=463
Dec 31 16:03:37 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=85.25.151.22 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=8170 DF PROTO=TCP SPT=38534 DPT=9001 WINDOW=5840 RES=0x00 SYN URGP=0 OPT (020405AC0101080A00099E330000000001030309)
Dec 31 16:03:37 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=464
Dec 31 16:03:38 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=465
Dec 31 16:03:39 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=466
Dec 31 16:03:40 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=467
Dec 31 16:03:41 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=468
Dec 31 16:03:42 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=469
Dec 31 16:03:43 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=470
Dec 31 16:03:44 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=471
Dec 31 16:03:45 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=472
Dec 31 16:03:46 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=473
Dec 31 16:03:47 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=474
Dec 31 16:03:48 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=475
Dec 31 16:03:49 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=476
Dec 31 16:03:50 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=477
Dec 31 16:03:51 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=478
Dec 31 16:03:52 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=83.228.93.76 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=59107 DF PROTO=TCP SPT=44267 DPT=9001 WINDOW=5840 RES=0x00 SYN URGP=0 OPT (020405AC0101080A0009AD0E0000000001030309)
Dec 31 16:03:52 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=479
Dec 31 16:03:53 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=480
Dec 31 16:03:54 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=481
Dec 31 16:03:55 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.43.127.247 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=54146 DF PROTO=TCP SPT=56312 DPT=9001 WINDOW=5840 RES=0x00 SYN URGP=0 OPT (020405AC0101080A0009AFD70000000001030309)
Dec 31 16:03:55 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=83.228.93.76 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=59108 DF PROTO=TCP SPT=44267 DPT=9001 WINDOW=5840 RES=0x00 SYN URGP=0 OPT (020405AC0101080A0009AFFC0000000001030309)
Dec 31 16:03:55 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=482
Dec 31 16:03:56 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=483
Dec 31 16:03:57 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=484
Dec 31 16:03:58 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=485
Dec 31 16:03:59 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=486
Dec 31 16:04:00 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=487
Dec 31 16:04:01 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=83.228.93.76 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=59109 DF PROTO=TCP SPT=44267 DPT=9001 WINDOW=5840 RES=0x00 SYN URGP=0 OPT (020405AC0101080A0009B5D80000000001030309)
Dec 31 16:04:01 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=488
Dec 31 16:04:02 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=489
Dec 31 16:04:03 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=490
Dec 31 16:04:04 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=491
Dec 31 16:04:05 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=492
Dec 31 16:04:06 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=493
Dec 31 16:04:07 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=494
Dec 31 16:04:08 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=495
Dec 31 16:04:09 user.warn kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.0.33 DST=208.67.222.222 LEN=84 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=15910 SEQ=496

Psypher246
Psypher246's picture
So 15 days after my 1st post

So 15 days after my 1st post and no usefull support at all. Flashed my router back to netgear and STILL dissapointed with the hardware. Wireless signal is terrible, cannot even reach 4m away in another room where other AP's run fine. Will not suggest this product to anyone else. Selling mine as soon as I can, the whole experience is really really disappointing. can't even return it cos 14 days has passed.

Eko
Eko's picture
Well, did you try latest dd

Well, did you try latest dd-wrt, build 11028 ??

Yikes2000
Yikes2000's picture
A few things...

A few things...

1. To SSH into Tomato, you need to use 'root' as login, not 'admin'.
2. Same password as the Web GUI 'admin'.
3. Must use SSH2, not SSH1.

kernst
kernst's picture
I had this issue as well on a

I had this issue as well on a Linksys router with Tomato 1.28.something, accompanied by the following lines in the system log:

[...] dropbear[XXXX]: premature exit: Terminated by signal
[...] dropbear[XXXX]: Failed reading '/etc/dropbear/dropbear_dss_host_key', disabling DSS
[...] dropbear[XXXX]: Running in background

Then "ssh: connect to host 192.168.1.254 port 22: Connection timed out" errors when I tried to ssh into the router.

In my case, I had accidentally pasted a new public key into the Administration -> Admin Access -> authorized keys field such that two of them ran together (forgot a carriage return). This would usually have been ignored by OpenSSH (at least, in my experience), but may have caused dropbear to refuse to start. Ever. Again.

So I emptied out the "authorized keys" using the Tomato web interface, clicked "Save" (which restarts dropbear), and then pasted the keys back into the field, correctly this time. Dropbear then went back to accepting incoming connections on port 22, and accepted my key.

Ever hear the one about the chemical engineer, mechanical engineer, electrical engineer, and computer engineer who are carpooling together when the vehicle breaks down? That's what this was like. Undo whatever it was you think the computer doesn't like, then try it again and hope for different results. Sort of like Einstein's definition of insanity, right? ;)