Help In Configuring My BSNL FTTH With Syrotech ONT


This is a log entry where the PPPoE auth fails due to mac binding at BSNL's auth server.

Code:
Tue Mar 26 08:24:06 2019 daemon.notice pppd[31302]: pppd 2.4.7 started by root, uid 0
Tue Mar 26 08:24:06 2019 daemon.info pppd[31302]: PPP session is 8420
Tue Mar 26 08:24:06 2019 daemon.warn pppd[31302]: Connected to 20:d8:0b:d4:8d:f4 via interface eth0.702
Tue Mar 26 08:24:06 2019 kern.info kernel: [134208.751099] pppoe-wan2_test: renamed from ppp0
Tue Mar 26 08:24:06 2019 daemon.info pppd[31302]: Using interface pppoe-wan2_test
Tue Mar 26 08:24:06 2019 daemon.notice pppd[31302]: Connect: pppoe-wan2_test <--> eth0.702
Tue Mar 26 08:24:06 2019 daemon.info odhcpd[1015]: Using a RA lifetime of 0 seconds on br-lan
Tue Mar 26 08:24:06 2019 daemon.info pppd[31302]: CHAP authentication failed: Policy Failed
Tue Mar 26 08:24:06 2019 daemon.err pppd[31302]: CHAP authentication failed
Tue Mar 26 08:24:06 2019 daemon.notice pppd[31302]: Modem hangup
Tue Mar 26 08:24:06 2019 daemon.notice pppd[31302]: Connection terminated.
Tue Mar 26 08:24:06 2019 daemon.info pppd[31302]: Sent PADT
Tue Mar 26 08:24:06 2019 daemon.info pppd[31302]: Exit.
 
Upvote 0
@varkey thanks for clarifying that. So if BSNL isn't linking customer identify to MAC anymore, what do they use?

If it's just simple PPPoE username/password, for which their password is 'password', isn't that really unsafe? I agree MAC spoofing is a trivial affair, but still requires knowledge of the particular user's particular MAC.

Yep it is unsafe and stupid especially when they set the default password to password. 🤷🏻‍♂️ What can we do? I've changed the password for mine, and I'd recommend everyone to do the same too.
 
Upvote 0
Back