--- Begin Message ---
Package: linux-image-3.2.0-4-amd64
Version: 3.2.54-2
Package: xl2tpd
Version: 1.3.1+dfsg-1
Using xl2tp as a l2tp client to connect, using the above amd64 bit
kernel doesnt connect, using the same config and same xl2tp version on a
i386 pc connects fine.
xl2tp debug output on amd64 kernel
xl2tpd[32225]: setsockopt recvref[30]: Protocol not available
xl2tpd[32225]: This binary does not support kernel L2TP.
xl2tpd[32225]: xl2tpd version xl2tpd-1.3.1 started on
fw1.pta.fishwicks.co.za PID:32225
xl2tpd[32225]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[32225]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[32225]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[32225]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[32225]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[32225]: get_call: allocating new tunnel for host x.x.x.x, port 1701.
xl2tpd[32225]: Connecting to host x.x.x.x, port 1701
xl2tpd[32225]: control_finish: message type is (null)(0). Tunnel is 0,
call is 0.
packet dump:
HEX: { C8 02 00 78 00 00 00 00 00 00 00 00 80 08 00 00 00 00 00 01 80 08
00 00 00 02 01 00 80 0A 00 00 00 03 00 00 00 03 80 0A 00 00 00 04 00 00
00 00 80 08 00 00 00 06 06 90 80 1D 00 00 00 07 66 77 31 2E 70 74 61 2E
66 69 73 68 77 69 63 6B 73 2E 63 6F 2E 7A 61 80 13 00 00 00 08 78 65 6C
65 72 61 6E 63 65 2E 63 6F 6D 80 08 00 00 00 09 86 87 80 08 00 00 00 0A
00 04 }
ASCII: { x
hostname.local xelerance.com }
xl2tpd[32225]: control_finish: sending SCCRQ
xl2tpd[32225]: network_thread: recv packet from x.x.x.x, size = 139,
tunnel = 34439, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 8B 00 87 86 00 00 00 00 01 00 80 08 00 00 00 00 00 02 80 08
00 00 00 02 01 00 80 14 00 00 00 07 76 7A 62 5F 6C 32 74 70 5F 74 74 5F
6C 6F 80 0A 00 00 00 03 00 00 00 01 80 08 00 00 00 09 36 D4 80 08 00 00
00 0A 00 40 80 1D 00 00 00 0B 31 BF 15 22 92 BE 38 13 83 34 1A 78 3E 03
A9 8A 95 2E 61 C3 C6 58 43 00 08 00 00 00 06 20 15 00 1C 00 00 00 08 4A
75 6E 69 70 65 72 20 4E 65 74 77 6F 72 6B 73 2C 20 49 6E 63 2E }
ASCII: { fvzb_l2tp_tt_lo
6 @ 1 " 8 4 x> .a XC Juniper
Networks, Inc.}
xl2tpd[32225]: handle_avps: handling avp's for tunnel 34439, call 0
xl2tpd[32225]: message_type_avp: message type 2
(Start-Control-Connection-Reply)
xl2tpd[32225]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[32225]: hostname_avp: peer reports hostname 'vzb_l2tp_tt_lo'
xl2tpd[32225]: framing_caps_avp: supported peer frames: sync
xl2tpd[32225]: assigned_tunnel_avp: using peer's tunnel 14036
xl2tpd[32225]: receive_window_size_avp: peer wants RWS of 64. Will use
flow control.
xl2tpd[32225]: challenge_avp: challenge avp found
xl2tpd[32225]: firmware_rev_avp: peer reports firmware version 8213 (0x2015)
xl2tpd[32225]: vendor_avp: peer reports vendor 'Juniper Networks, Inc.'
xl2tpd[32225]: control_finish: message type is
Start-Control-Connection-Reply(2). Tunnel is 14036, call is 0.
packet dump:
HEX: { C8 02 00 2A 36 D4 00 00 00 01 00 01 80 08 00 00 00 00 00 03 80 16
00 00 00 0D 90 19 50 7D 32 24 04 6E 0C 79 71 F3 B1 E9 A2 05 }
ASCII: { *6 P}2$ n yq }
xl2tpd[32225]: control_finish: sending SCCCN
xl2tpd[32225]: Connection established to x.x.x.x, 1701. Local: 34439,
Remote: 14036 (ref=0/0).
xl2tpd[32225]: Calling on tunnel 34439
xl2tpd[32225]: control_finish: message type is (null)(0). Tunnel is
14036, call is 0.
packet dump:
HEX: { C8 02 00 30 36 D4 00 00 00 02 00 01 80 08 00 00 00 00 00 0A 80 08
00 00 00 0E 99 14 80 0A 00 00 00 0F 00 00 00 01 80 0A 00 00 00 12 00 00
00 00 }
ASCII: { 06 }
xl2tpd[32225]: control_finish: sending ICRQ
xl2tpd[32225]: network_thread: recv packet from x.x.x.x, size = 88,
tunnel = 34439, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 58 00 87 86 00 00 01 00 02 00 80 08 00 00 00 00 00 04 80 08
00 00 00 09 36 D4 80 3C 00 00 00 01 00 04 00 03 74 75 6E 6E 65 6C 20 72
65 63 65 69 76 65 20 73 63 63 63 6E 20 61 75 74 68 65 6E 74 69 63 61 74
65 20 66 61 69 6C 65 64 20 63 68 61 6C 6C 65 6E 67 65 }
ASCII: { X 6 < tunnel receive scccn
authenticate failed challenge}
xl2tpd[32225]: handle_avps: handling avp's for tunnel 34439, call 0
xl2tpd[32225]: message_type_avp: message type 4
(Stop-Control-Connection-Notification)
xl2tpd[32225]: assigned_tunnel_avp: using peer's tunnel 14036
xl2tpd[32225]: result_code_avp: peer closing for reason 4 (Requester is
not authorized to establish a control channel), error = 3 (tunnel
receive scccn authenticate failed challenge)
xl2tpd[32225]: control_finish: message type is
Stop-Control-Connection-Notification(4). Tunnel is 14036, call is 0.
xl2tpd[32225]: control_finish: Connection closed to x.x.x.x, port 1701
(tunnel receive scccn authenticate failed challenge), Local: 34439,
Remote: 14036
xl2tpd[32225]: build_fdset: closing down tunnel 34439
^Cxl2tpd[32225]: network_thread: select returned error 4 (Interrupted
system call)
xl2tpd[32225]: death_handler: Fatal signal 2 received
xl2tpd debug output on i386 kernel
xl2tpd[16819]: setsockopt recvref[30]: Protocol not available
xl2tpd[16819]: This binary does not support kernel L2TP.
xl2tpd[16819]: xl2tpd version xl2tpd-1.3.1 started on fw1 PID:16819
xl2tpd[16819]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[16819]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[16819]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[16819]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[16819]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[16819]: get_call: allocating new tunnel for host x.x.x.x, port 1701.
xl2tpd[16819]: Connecting to host x.x.x.x, port 1701
xl2tpd[16819]: control_finish: message type is (null)(0). Tunnel is 0,
call is 0.
packet dump:
HEX: { C8 02 00 64 00 00 00 00 00 00 00 00 80 08 00 00 00 00 00 01 80 08
00 00 00 02 01 00 80 0A 00 00 00 03 00 00 00 03 80 0A 00 00 00 04 00 00
00 00 80 08 00 00 00 06 06 90 80 09 00 00 00 07 66 77 31 80 13 00 00 00
08 78 65 6C 65 72 61 6E 63 65 2E 63 6F 6D 80 08 00 00 00 09 7F 72 80 08
00 00 00 0A 00 04 }
ASCII: { d
localhostname xelerance.com r }
xl2tpd[16819]: control_finish: sending SCCRQ
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 137,
tunnel = 32626, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 89 00 72 7F 00 00 00 00 01 00 80 08 00 00 00 00 00 02 80 08
00 00 00 02 01 00 80 14 00 00 00 07 76 7A 62 5F 6C 32 74 70 5F 74 74 5F
6C 6F 80 0A 00 00 00 03 00 00 00 01 80 08 00 00 00 09 30 E5 80 08 00 00
00 0A 00 40 80 1B 00 00 00 0B 17 62 DA ED 04 45 5C D7 19 B0 C1 6A 33 2E
32 44 9B 13 F4 12 7C 00 08 00 00 00 06 20 15 00 1C 00 00 00 08 4A 75 6E
69 70 65 72 20 4E 65 74 77 6F 72 6B 73 2C 20 49 6E 63 2E }
ASCII: { r vzb_l2tp_tt_lo
0 @ b E\ j3.2D | Juniper Networks, Inc.}
xl2tpd[16819]: handle_avps: handling avp's for tunnel 32626, call 0
xl2tpd[16819]: message_type_avp: message type 2
(Start-Control-Connection-Reply)
xl2tpd[16819]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[16819]: hostname_avp: peer reports hostname 'vzb_l2tp_tt_lo'
xl2tpd[16819]: framing_caps_avp: supported peer frames: sync
xl2tpd[16819]: assigned_tunnel_avp: using peer's tunnel 12517
xl2tpd[16819]: receive_window_size_avp: peer wants RWS of 64. Will use
flow control.
xl2tpd[16819]: challenge_avp: challenge avp found
xl2tpd[16819]: firmware_rev_avp: peer reports firmware version 8213 (0x2015)
xl2tpd[16819]: vendor_avp: peer reports vendor 'Juniper Networks, Inc.'
xl2tpd[16819]: control_finish: message type is
Start-Control-Connection-Reply(2). Tunnel is 12517, call is 0.
packet dump:
HEX: { C8 02 00 2A 30 E5 00 00 00 01 00 01 80 08 00 00 00 00 00 03 80 16
00 00 00 0D 86 62 E9 F0 1A 07 09 03 47 F9 7A 0D 8E 99 70 89 }
ASCII: { *0 b G z p }
xl2tpd[16819]: control_finish: sending SCCCN
xl2tpd[16819]: Connection established to x.x.x.x, 1701. Local: 32626,
Remote: 12517 (ref=0/0).
xl2tpd[16819]: Calling on tunnel 32626
xl2tpd[16819]: control_finish: message type is (null)(0). Tunnel is
12517, call is 0.
packet dump:
HEX: { C8 02 00 30 30 E5 00 00 00 02 00 01 80 08 00 00 00 00 00 0A 80 08
00 00 00 0E 45 87 80 0A 00 00 00 0F 00 00 00 01 80 0A 00 00 00 12 00 00
00 00 }
ASCII: { 00 E }
xl2tpd[16819]: control_finish: sending ICRQ
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 28,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 C8 1C 00 72 7F 87 45 01 00 03 00 80 08 00 00 00 00 00 0B 80 08
00 00 00 0E 59 6C }
ASCII: { r E Yl}
xl2tpd[16819]: handle_avps: handling avp's for tunnel 32626, call 17799
xl2tpd[16819]: message_type_avp: message type 11 (Incoming-Call-Reply)
xl2tpd[16819]: assigned_call_avp: using peer's call 22892
xl2tpd[16819]: control_finish: message type is Incoming-Call-Reply(11).
Tunnel is 12517, call is 22892.
packet dump:
HEX: { C8 02 00 32 30 E5 59 6C 00 03 00 02 80 08 00 00 00 00 00 0C 80 0A
00 00 00 18 00 00 00 00 80 0A 00 00 00 13 00 00 00 01 80 0A 00 00 00 26
00 00 00 00 }
ASCII: { 20 Yl & }
xl2tpd[16819]: control_finish: Sending ICCN
xl2tpd[16819]: Call established with x.x.x.x, Local: 17799, Remote:
22892, Serial: 1 (ref=0/0)
xl2tpd[16819]: start_pppd: I'm running:
xl2tpd[16819]: "/usr/sbin/pppd"
xl2tpd[16819]: "passive"
xl2tpd[16819]: "nodetach"
xl2tpd[16819]: ":"
xl2tpd[16819]: "refuse-chap"
xl2tpd[16819]: "auth"
xl2tpd[16819]: "require-pap"
xl2tpd[16819]: "name"
xl2tpd[16819]: "pap-username"
xl2tpd[16819]: "debug"
xl2tpd[16819]: "file"
xl2tpd[16819]: "/etc/ppp/options.l2tpd"
xl2tpd[16819]: "ipparam"
xl2tpd[16819]: "x.x.x.x"
xl2tpd[16819]: "/dev/pts/2"
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 24,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 01 8F 00 0E 03 04 C0 23 05 06 44 30
96 03 }
ASCII: { r E ! # D0 }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 12,
tunnel = 32626, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 0C 00 72 7F 00 00 02 00 04 00 }
ASCII: { r }
packet dump:
HEX: { 40 02 00 24 30 E5 59 6C FF 03 C0 21 01 01 00 18 01 04 05 AC 02 06
00 00 00 00 05 06 C4 4B 53 69 07 02 08 02 }
ASCII: { @ $0 Yl ! KSi }
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 34,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 02 01 00 18 01 04 05 AC 02 06 00 00
00 00 05 06 C4 4B 53 69 07 02 08 02 }
ASCII: { r E ! KSi }
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 24,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 01 90 00 0E 03 04 C0 23 05 06 44 30
96 03 }
ASCII: { r E ! # D0 }
packet dump:
HEX: { 40 02 00 1A 30 E5 59 6C FF 03 C0 21 02 90 00 0E 03 04 C0 23 05 06
44 30 96 03 }
ASCII: { @ 0 Yl ! # D0 }
packet dump:
HEX: { 40 02 00 14 30 E5 59 6C FF 03 C0 21 09 00 00 08 C4 4B 53 69 }
ASCII: { @ 0 Yl ! KSi}
packet dump:
HEX: { 40 02 00 41 30 E5 59 6C FF 03 C0 23 01 01 00 35 25 70 6B 66 6A 68
62 2E 6D 70 6C 73 40 61 75 63 6F 72 2E 63 6F 6D 40 64 73 6C 2E 75 75 6E
65 74 2E 63 6F 2E 7A 61 0A 49 62 4E 65 65 62 64 79 78 32 }
ASCII: { @ A0 Yl # 5%pkfjhb.m...@aucor.com@dsl.uunet.co.za IbNeebdyx2}
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 18,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 0A 00 00 08 44 30 96 03 }
ASCII: { r E ! D0 }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 15,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 23 02 01 00 05 00 }
ASCII: { r E # }
packet dump:
HEX: { 40 02 00 1C 30 E5 59 6C FF 03 80 21 01 01 00 10 02 06 00 2D 0F 01
03 06 00 00 00 00 }
ASCII: { @ 0 Yl ! - }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 01 11 00 0A 03 06 AC 18 03 03 }
ASCII: { r E ! }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 02 11 00 0A 03 06 AC 18 03 03 }
ASCII: { @ 0 Yl ! }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 04 01 00 0A 02 06 00 2D 0F 01 }
ASCII: { r E ! - }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 01 02 00 0A 03 06 00 00 00 00 }
ASCII: { @ 0 Yl ! }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 03 02 00 0A 03 06 C4 2F 02 B3 }
ASCII: { r E ! / }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 01 03 00 0A 03 06 C4 2F 02 B3 }
ASCII: { @ 0 Yl ! / }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20,
tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 02 03 00 0A 03 06 C4 2F 02 B3 }
ASCII: { r E ! / }
^Cxl2tpd[16819]: network_thread: select returned error 4 (Interrupted
system call)
xl2tpd[16819]: death_handler: Fatal signal 2 received
packet dump:
HEX: { C8 02 00 34 30 E5 00 00 00 04 00 02 80 08 00 00 00 00 00 04 80 08
00 00 00 09 7F 72 80 18 00 00 00 01 00 01 00 00 53 65 72 76 65 72 20 63
6C 6F 73 69 6E 67 }
ASCII: { 40 r Server closing}
xl2tpd[16819]: Terminating pppd: sending TERM signal to pid 16820
xl2tpd[16819]: Connection 12517 closed to x.x.x.x, port 1701 (Server
closing)
--
Thank you,
Mark Adrian Coetser
Connection reset by some moron with a backhoe
--- End Message ---