After 5yrs, goodbye Nildram/Pipex/Tiscali - whoever you are now!!!!

Started by Dreamz, Apr 28, 2008, 23:43:36

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Dreamz

Since Pipex took them over things have steadily gotten worse, speedtest now reports my ISP as Tiscali (that was the icing on the cake) and it's really sad, that after 4 years of absolutely awesome service and speeds, a once great ISP has totally gone to the sh*tter, in all aspects - service/support/reliability :bawl:

For the last 3 weeks I've been constantly DC'ing every 5-10 minutes without fail, making it impossible to do anything on the web (bar make forum posts in between DC's :)

ADSL Link Downstream Upstream
Connection Speed 8154 kbps 582 kbps
Line Attenuation 9 db 0 db
Noise Margin 24 db 12 db

I live about 200 metres away from my exchange, hence my line attenuation - but was concerned about my noise margin? it's been fluctuating a bit around 18-25 depending on its mood ???


Inactive

Anything and everything that I post on here is purely my opinion, it ain't going to change the world, you are under no obligation to agree with me, it is purely my expressed opinion.

Simon

Hi Dreamz, and  :welcome:

One of the techies will help you with your enquiry, but it may not be till the morning.  :)
Simon.
--
This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Hi Dreamz

Welcome to the forum. :) :welc: :karma:

One those stats you really should have no problem going flat out, but your u/s sync suggests that you are on a SuperMax package (832 u/s), so something isn't quite right. Would that be a Netgear router you are using? They are notorious for fluctuating noise margin reports, so it may be as simple as that.

However, tell me a bit about your internal phone wiring. Do you have more than one hard-wired phone socket, do you have an NTE5 master socket (the type where you can remove the lower part of the face plate). What's connected to the line, other than your router, and do you use any loose extension leads - if so, are they flat or round?
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Malc


Sebby

:welc: :karma:

It looks like you've been moved onto Tiscali's LLU network. As Rik mentions, something's not quite right with those upstream stats. It could be the router, or perhaps a problem with the LLU equipment.

Personally, I'd be inclined to do nothing until you migrate over to IPStream as this could well be a LLU issue. Hopefully the strangeness will disappear, but if not, we can look into it further. :)

Lona



If one took the Scots out of the world, it would fall apart
Dr. Louis B Wright, Washington DC, National Geographic (1964), from Donald MacDonald, Edinburgh :thumb:


Dreamz

well trying a belkin router at the moment to see if theres any difference, nildram tech support said my downstream was perfect (he was actually envious of my line as i live so close to the exchange) but said my upstream seemed in a state in that it had reported in excess of 1000 errors within 24hrs.

suggested to try another router so im using my dads one at the moment, however im not convinced this is the problem as my router seems to be working ok at my dads house now (we've swapped for the night)) however perhaps its something that tiscrapoli have installed at the exchange that my netgear DG834G v1 doesnt like...

Dreamz

nope, although the belkin logs read this when it dc'd -

Jan 1 00:00:28 critical pppd[401]: Received valid IP address from server. Connection UP. 
Apr 29 21:18:13 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.155.217 DST=79.75.24.90 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=29910 DF PROTO=TCP SPT=2501 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 29 21:18:16 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.155.217 DST=79.75.24.90 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=30146 DF PROTO=TCP SPT=2501 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 29 21:18:16 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.155.217 DST=79.75.24.90 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=30153 DF PROTO=TCP SPT=2628 DPT=139 WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 29 21:18:19 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.155.217 DST=79.75.24.90 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=30385 DF PROTO=TCP SPT=2628 DPT=139 WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 29 21:20:48 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.155.239 DST=79.75.24.90 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=61844 DF PROTO=TCP SPT=4852 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0 
Apr 29 21:22:08 critical pppd[401]: Clear IP addresses. Connection DOWN. 
Apr 29 21:22:08 critical pppd[401]: Clear IP addresses. PPP connection DOWN. 


oO ?

Dreamz

nevermind, think this is just the firewall doing its job and unrelated to the issue - bah! lol

Sebby

Quote from: Dreamz on Apr 29, 2008, 21:19:48
well trying a belkin router at the moment to see if theres any difference, nildram tech support said my downstream was perfect (he was actually envious of my line as i live so close to the exchange) but said my upstream seemed in a state in that it had reported in excess of 1000 errors within 24hrs.

suggested to try another router so im using my dads one at the moment, however im not convinced this is the problem as my router seems to be working ok at my dads house now (we've swapped for the night)) however perhaps its something that tiscrapoli have installed at the exchange that my netgear DG834G v1 doesnt like...

Ah, but I assume your router is now being used on a different line. Personally, I think it's the line, and the issue could well disappear when you move over to BT's equipment.

stirling

im new to idnet but, after almost a year of broken promises of better speeds and so called sweetners to stay with pipex, i asked for a mac code on 28th march, this duely came back and was invalid, i was charged £100 for breaking my contract with pipex, even tho the promise of better speeds by upgrading didnt materialise, some days my  speed was as low as 87kbps, after numerous phone calls to premium rated amatuer technicians i finaly got my code and joined idnet, and more than pleasantly surprised by courtesy i have recieved on phone im also very impressed with internet speeds im recieving.
Thank you IDNET for restoring my  faith in isps  ;D

Simon

Simon.
--
This post reflects my own views, opinions and experience, not those of IDNet.

Sebby

Quote from: stirling on Apr 29, 2008, 22:55:38
im new to idnet but, after almost a year of broken promises of better speeds and so called sweetners to stay with pipex, i asked for a mac code on 28th march, this duely came back and was invalid, i was charged £100 for breaking my contract with pipex, even tho the promise of better speeds by upgrading didnt materialise, some days my  speed was as low as 87kbps, after numerous phone calls to premium rated amatuer technicians i finaly got my code and joined idnet, and more than pleasantly surprised by courtesy i have recieved on phone im also very impressed with internet speeds im recieving.
Thank you IDNET for restoring my  faith in isps  ;D

:welc: :karma:

Glad you like the service! :)

Rik

Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Quote from: Dreamz on Apr 29, 2008, 21:31:19
Apr 29 21:22:08 critical pppd[401]: Clear IP addresses. Connection DOWN. 
Apr 29 21:22:08 critical pppd[401]: Clear IP addresses. PPP connection DOWN. 

That looks to me as if the line fell over at 21:22. :(
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Dreamz

it falls over every 5-10 minutes without fail, we thought reducing the upload speed from 512 to 256 was going to resolve the issue - but nope, upto a 1000 errors over 24hrs on upstream. different router, same sh*t - nildram see me as being connected at their end, even though my browsing dies... i'm wondering if the port scans are having more impact than suspected - and thus timing me out? but i'm just speculating... seems this has all only started happening since Tiscali put some of their equipment in at the exchange/LLU - said they'll pass onto an engineer *again* (3 days running of me phoning them every night with same issues and we're going nowhere) - what's it take for an ISP to resolve an issue these days...

Rik

With the stats you've got, I can offer no good reason why the line should keep falling over, unless the exchange equipment is duff. :( I'm afraid you're going to have to persevere with them, only they can fix this.
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Sebby

What Rik said. There really is no logical explanation for this. :(

Dreamz

router log - looks to me like either time outs from constant port scans OR perhaps exchange congestion? these IP's are ALL within the tiscali network it seems? basically whenever theres 4-5 of these `intrusions` the connection seems to drop? I've gotten my MAC code now too finally, totally had enough of this after 3 weeks.

Date/Time Severity Message
Jan 1 00:00:13 emergency Belkin ADSL Router started: BusyBox v1.00 (2006.03.27-10:18+0000) 
Jan 1 00:00:13 critical kernel: eth1 Link UP. 
Jan 1 00:00:13 critical kernel: ADSL G.994 training 
Jan 1 00:00:17 critical kernel: ADSL G.992 started 
Jan 1 00:00:22 critical kernel: ADSL G.992 channel analysis 
Jan 1 00:00:23 critical kernel: ADSL link up, fast, us=284, ds=0 
Jan 1 00:00:27 critical pppd[401]: PPP LCP UP. 
Jan 1 00:00:28 critical pppd[401]: Received valid IP address from server. Connection UP. 
May 1 19:20:34 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.157.198 DST=79.75.62.40 LEN=64 TOS=0x00 PREC=0x00 TTL=42 ID=25696 DF PROTO=TCP SPT=1596 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 19:20:37 critical pppd[401]: Clear IP addresses. Connection DOWN. 
May 1 19:20:37 critical pppd[401]: Clear IP addresses. PPP connection DOWN. 
May 1 19:26:03 critical pppd[401]: PPP LCP UP. 
May 1 19:26:07 critical pppd[401]: Received valid IP address from server. Connection UP. 
May 1 19:26:10 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.224.182 DST=79.75.8.226 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=36742 DF PROTO=TCP SPT=57148 DPT=135 WINDOW=60352 RES=0x00 SYN URGP=0 
May 1 19:26:13 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.224.182 DST=79.75.8.226 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=37201 DF PROTO=TCP SPT=57148 DPT=135 WINDOW=60352 RES=0x00 SYN URGP=0 
May 1 19:28:34 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.157.198 DST=79.75.8.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=59867 DF PROTO=TCP SPT=3852 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 19:28:37 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.157.198 DST=79.75.8.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=60085 DF PROTO=TCP SPT=3852 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 19:28:40 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.157.198 DST=79.75.8.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=60306 DF PROTO=TCP SPT=3974 DPT=139 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 19:33:22 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.161.100 DST=79.75.62.40 LEN=64 TOS=0x00 PREC=0x00 TTL=42 ID=44246 DF PROTO=TCP SPT=47349 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 19:33:28 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.157.198 DST=79.75.62.40 LEN=64 TOS=0x00 PREC=0x00 TTL=42 ID=17850 DF PROTO=TCP SPT=4395 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 19:33:31 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.157.198 DST=79.75.62.40 LEN=64 TOS=0x00 PREC=0x00 TTL=42 ID=18066 DF PROTO=TCP SPT=4395 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 19:34:05 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.199.114 DST=79.75.62.40 LEN=64 TOS=0x00 PREC=0x00 TTL=42 ID=8773 DF PROTO=TCP SPT=2905 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=4160 
May 1 19:35:33 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.72.48.175 DST=79.75.62.40 LEN=64 TOS=0x00 PREC=0x00 TTL=44 ID=61186 DF PROTO=TCP SPT=3042 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 19:48:11 critical pppd[401]: Clear IP addresses. Connection DOWN. 
May 1 19:48:11 critical pppd[401]: Clear IP addresses. PPP connection DOWN. 
May 1 19:48:22 critical pppd[401]: PPP LCP UP. 
May 1 19:48:24 critical pppd[401]: PPP LCP UP. 
May 1 19:48:24 critical pppd[401]: Received valid IP address from server. Connection UP. 
May 1 19:48:29 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.203.8 DST=79.75.96.112 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=17349 DF PROTO=TCP SPT=1884 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0 
May 1 20:00:58 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.78.156 DST=79.75.96.112 LEN=40 TOS=0x00 PREC=0x00 TTL=127 ID=3970 PROTO=TCP SPT=4527 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 
May 1 20:09:25 critical pppd[401]: Clear IP addresses. Connection DOWN. 
May 1 20:09:25 critical pppd[401]: Clear IP addresses. PPP connection DOWN. 
May 1 20:09:33 critical pppd[401]: PPP LCP UP. 
May 1 20:09:33 critical pppd[401]: Received valid IP address from server. Connection UP. 
May 1 20:12:34 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.231.69 DST=79.75.93.100 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=53480 DF PROTO=TCP SPT=3576 DPT=2967 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 20:13:03 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.236.0 DST=79.75.93.100 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=33976 DF PROTO=TCP SPT=4851 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0 
May 1 20:16:04 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.234.160 DST=79.75.93.100 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=59855 DF PROTO=TCP SPT=2944 DPT=2967 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 20:16:43 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.78.156 DST=79.75.93.100 LEN=40 TOS=0x00 PREC=0x00 TTL=127 ID=4471 PROTO=TCP SPT=4527 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 
May 1 20:30:36 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.152.86 DST=79.75.93.100 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=20426 DF PROTO=TCP SPT=3112 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 
May 1 20:31:34 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.157.198 DST=79.75.93.100 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=21124 DF PROTO=TCP SPT=2070 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 20:39:33 critical pppd[401]: Clear IP addresses. Connection DOWN. 
May 1 20:39:33 critical pppd[401]: Clear IP addresses. PPP connection DOWN. 
May 1 20:45:18 critical kernel: ADSL link down 
May 1 20:45:28 critical kernel: ADSL G.994 training 
May 1 20:45:33 critical kernel: ADSL G.992 started 
May 1 20:45:38 critical kernel: ADSL G.992 channel analysis 
May 1 20:45:42 critical kernel: ADSL link up, fast, us=284, ds=0 
May 1 20:47:16 critical pppd[401]: PPP LCP UP. 
May 1 20:47:16 critical pppd[401]: Received valid IP address from server. Connection UP. 
May 1 20:47:24 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.101.74 DST=79.75.105.39 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=40577 DF PROTO=TCP SPT=5144 DPT=135 WINDOW=60352 RES=0x00 SYN URGP=0 
May 1 20:48:08 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.59.177 DST=79.75.105.39 LEN=64 TOS=0x00 PREC=0x00 TTL=47 ID=22165 DF PROTO=TCP SPT=4527 DPT=445 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 20:51:33 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.101.74 DST=79.75.105.39 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=55091 DF PROTO=TCP SPT=17700 DPT=135 WINDOW=60352 RES=0x00 SYN URGP=0 
May 1 20:54:24 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.101.74 DST=79.75.119.145 LEN=52 TOS=0x00 PREC=0x00 TTL=62 ID=65120 DF PROTO=TCP SPT=26371 DPT=135 WINDOW=60352 RES=0x00 SYN URGP=0 
May 1 20:55:00 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.78.156 DST=79.75.119.145 LEN=40 TOS=0x00 PREC=0x00 TTL=126 ID=863 PROTO=TCP SPT=4527 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 
May 1 20:55:37 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.157.198 DST=79.75.119.145 LEN=64 TOS=0x00 PREC=0x00 TTL=42 ID=60531 DF PROTO=TCP SPT=4658 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 20:55:40 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT=ppp_0_38_1 SRC=79.75.157.198 DST=79.75.119.145 LEN=64 TOS=0x00 PREC=0x00 TTL=42 ID=60867 DF PROTO=TCP SPT=4658 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 20:57:02 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.234.160 DST=79.75.105.39 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=46713 DF PROTO=TCP SPT=4846 DPT=139 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 20:57:05 alert kernel: Intrusion -> IN=ppp_0_38_1 OUT= MAC= SRC=79.75.234.160 DST=79.75.105.39 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=46900 DF PROTO=TCP SPT=4846 DPT=139 WINDOW=53760 RES=0x00 SYN URGP=0 
May 1 20:59:24 critical pppd[401]: Clear IP addresses. Connection DOWN. 
May 1 20:59:24 critical pppd[401]: Clear IP addresses. PPP connection DOWN. 
May 1 20:59:35 critical pppd[401]: PPP LCP UP. 
May 1 20:59:36 critical pppd[401]: Received valid IP address from server. Connection UP. 

Dreamz


Sebby

This is very strange. I just can't see a reason for it. But, like I said originally, I would wait and see what happens when you move over to IPStream as this could well be a problem with your connection to Tiscali's equipment.

Dreamz

oh and this only happens a lot at peak periods - ie Sunday i was online from 8am to 11am with NO problems - come 11am i start getting drop outs and it gets worse over the day, also in the evenings is the worst time - i had this problem when i was on NTL cable once in a different area, and the tech guys eventually told me that they had oversubscribed the line!

Rik

Quote from: Dreamz on May 02, 2008, 09:35:09
the tech guys eventually told me that they had oversubscribed the line!

I was wondering about just that possibility looking at your logs...
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.