[Openswan Users]
l2tp patched but hanging on verify password error: 737 Loopback
detected
Brad Chang
openswan at dotnoc.com
Fri Jul 9 00:40:10 CEST 2004
Hi I patched the l2tpd as shown on your website now I get this error when
verifying password the session hangs then I get a disconnect and error on the
windows box here are some logs. thanks for all the help you have givven. oh
and after the fist time I get error it seems that ipsec will no longer reply to
any packets taht my windows box sends it (according to tcpdump). then I just
get . should I recompile and install ipsec to?
guardfw2:/usr/local/nagios/etc# tcpdump -n -i any host 64.180.180.220
tcpdump: listening on any
00:37:27.851173 64.180.180.220.500 > 216.187.95.142.500: isakmp: phase 1 I
ident: [|sa]
00:37:28.851334 64.180.180.220.500 > 216.187.95.142.500: isakmp: phase 1 I
ident: [|sa]
00:37:30.851654 64.180.180.220.500 > 216.187.95.142.500: isakmp: phase 1 I
ident: [|sa]
==> /var/log/syslog <==
Jul 9 00:32:14 guardfw2 l2tpd[2520]: ourtid = 12948, entropy_buf = 3294
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 0,
Nr = 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 1 (Start-
Control-Connection-Request)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: protocol_version_avp: peer is using
version 1, revision 0.
Jul 9 00:32:14 guardfw2 l2tpd[2520]: framing_caps_avp: supported peer frames:
sync
Jul 9 00:32:14 guardfw2 l2tpd[2520]: bearer_caps_avp: supported peer bearers:
Jul 9 00:32:14 guardfw2 l2tpd[2520]: firmware_rev_avp: peer reports firmware
version 1280 (0x0500)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: hostname_avp: peer reports
hostname 'pikachu'
Jul 9 00:32:14 guardfw2 l2tpd[2520]: vendor_avp: peer reports
vendor 'Microsoft\200^H'
Jul 9 00:32:14 guardfw2 l2tpd[2520]: assigned_tunnel_avp: using peer's tunnel 3
Jul 9 00:32:14 guardfw2 l2tpd[2520]: receive_window_size_avp: peer wants RWS
of 8. Will use flow control.
==> /var/log/daemon.log <==
Jul 9 00:32:14 guardfw2 l2tpd[2520]: ourtid = 12948, entropy_buf = 3294
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 0,
Nr = 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 1 (Start-
Control-Connection-Request)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: protocol_version_avp: peer is using
version 1, revision 0.
Jul 9 00:32:14 guardfw2 l2tpd[2520]: framing_caps_avp: supported peer frames:
sync
Jul 9 00:32:14 guardfw2 l2tpd[2520]: bearer_caps_avp: supported peer bearers:
Jul 9 00:32:14 guardfw2 l2tpd[2520]: firmware_rev_avp: peer reports firmware
version 1280 (0x0500)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: hostname_avp: peer reports
hostname 'pikachu'
Jul 9 00:32:14 guardfw2 l2tpd[2520]: vendor_avp: peer reports
vendor 'Microsoft\200^H'
Jul 9 00:32:14 guardfw2 l2tpd[2520]: assigned_tunnel_avp: using peer's tunnel 3
Jul 9 00:32:14 guardfw2 l2tpd[2520]: receive_window_size_avp: peer wants RWS
of 8. Will use flow control.
==> /var/log/auth.log <==
Jul 9 00:32:13 guardfw2 pluto[6917]: "roadwarrior2"[1] 64.180.180.220 #2:
IPsec SA established {ESP=>0x5f63f1bf <0x7dc252f5}
==> /var/log/syslog <==
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 1,
Nr = 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 3 (Start-
Control-Connection-Connected)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Connection established to
64.180.180.220, 1701. Local: 12948, Remote: 3. LNS session is 'default'
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 2,
Nr = 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 10
(Incoming-Call-Request)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: new incoming call
Jul 9 00:32:14 guardfw2 l2tpd[2520]: ourcid = 3567, entropy_buf = def
Jul 9 00:32:14 guardfw2 l2tpd[2520]: assigned_call_avp: using peer's call 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: call_serno_avp: serial number is 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: bearer_type_avp: peer bears: analog
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 3,
Nr = 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 1, Ns = 3,
Nr = 2
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 3567
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 12
(Incoming-Call-Connected)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: tx_speed_avp: transmit baud rate is
10000000
Jul 9 00:32:14 guardfw2 l2tpd[2520]: frame_type_avp: peer uses:sync frames
Jul 9 00:32:14 guardfw2 l2tpd[2520]: ignore_avp : Ignoring AVP
Jul 9 00:32:14 guardfw2 l2tpd[2520]: start_pppd: I'm running:
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "/usr/sbin/pppd"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "passive"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "-detach"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "192.168.1.51:192.168.1.25"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "refuse-pap"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "auth"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "require-chap"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "name"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "GuardianVPNserver"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "debug"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "file"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "/etc/ppp/options.l2tpd"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "/dev/ttyp0"
Jul 9 00:32:14 guardfw2 l2tpd[2520]:
Jul 9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Call established with
64.180.180.220, Local: 3567, Remote: 1, Serial: 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 4,
Nr = 2
Jul 9 00:32:14 guardfw2 pppd[11942]: pppd 2.4.1 started by root, uid 0
Jul 9 00:32:14 guardfw2 pppd[11942]: using channel 24
Jul 9 00:32:14 guardfw2 Keepalived_vrrp: Netlink: filter function error
Jul 9 00:32:14 guardfw2 Keepalived_healthcheckers: Netlink: filter function
error
Jul 9 00:32:14 guardfw2 pppd[11942]: Using interface ppp0
Jul 9 00:32:14 guardfw2 pppd[11942]: Connect: ppp0 <--> /dev/ttyp0
Jul 9 00:32:14 guardfw2 pppd[11942]: sent [LCP ConfReq id=0x1 <mru 1410>
<asyncmap 0x0> <auth chap MD5> <magic 0xf4da4701> <pcomp> <accomp>]
Jul 9 00:32:14 guardfw2 pppd[11942]: rcvd [LCP TermReq id=0x3 "WX;\37777777626
\000<\37777777715t\000\000\002\37777777741"]
Jul 9 00:32:14 guardfw2 pppd[11942]: sent [LCP TermAck id=0x3]
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 1, Ns = 4,
Nr = 2
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 3567
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 14 (Call-
Disconnect-Notify)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: result_code_avp: peer closing for reason
3 (Control channel already exists), error = 0 ()
Jul 9 00:32:14 guardfw2 l2tpd[2520]: assigned_call_avp: using peer's call 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Connection closed to
64.180.180.220, serial 0 ()
Jul 9 00:32:14 guardfw2 pppd[11942]: Terminating on signal 15.
Jul 9 00:32:14 guardfw2 pppd[11942]: Modem hangup
Jul 9 00:32:14 guardfw2 pppd[11942]: Connection terminated.
Jul 9 00:32:14 guardfw2 Keepalived_vrrp: Netlink: filter function error
Jul 9 00:32:14 guardfw2 Keepalived_healthcheckers: Netlink: filter function
error
Jul 9 00:32:14 guardfw2 pppd[11942]: Exit.
==> /var/log/daemon.log <==
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 1,
Nr = 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 3 (Start-
Control-Connection-Connected)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Connection established to
64.180.180.220, 1701. Local: 12948, Remote: 3. LNS session is 'default'
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 2,
Nr = 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 10
(Incoming-Call-Request)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: new incoming call
Jul 9 00:32:14 guardfw2 l2tpd[2520]: ourcid = 3567, entropy_buf = def
Jul 9 00:32:14 guardfw2 l2tpd[2520]: assigned_call_avp: using peer's call 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: call_serno_avp: serial number is 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: bearer_type_avp: peer bears: analog
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 3,
Nr = 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 1, Ns = 3,
Nr = 2
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 3567
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 12
(Incoming-Call-Connected)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: tx_speed_avp: transmit baud rate is
10000000
Jul 9 00:32:14 guardfw2 l2tpd[2520]: frame_type_avp: peer uses:sync frames
Jul 9 00:32:14 guardfw2 l2tpd[2520]: ignore_avp : Ignoring AVP
Jul 9 00:32:14 guardfw2 l2tpd[2520]: start_pppd: I'm running:
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "/usr/sbin/pppd"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "passive"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "-detach"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "192.168.1.51:192.168.1.25"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "refuse-pap"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "auth"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "require-chap"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "name"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "GuardianVPNserver"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "debug"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "file"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "/etc/ppp/options.l2tpd"
Jul 9 00:32:14 guardfw2 l2tpd[2520]: "/dev/ttyp0"
Jul 9 00:32:14 guardfw2 l2tpd[2520]:
Jul 9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Call established with
64.180.180.220, Local: 3567, Remote: 1, Serial: 0
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 4,
Nr = 2
Jul 9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 1, Ns = 4,
Nr = 2
Jul 9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel
12948, call 3567
Jul 9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 14 (Call-
Disconnect-Notify)
Jul 9 00:32:14 guardfw2 l2tpd[2520]: result_code_avp: peer closing for reason
3 (Control channel already exists), error = 0 ()
Jul 9 00:32:14 guardfw2 l2tpd[2520]: assigned_call_avp: using peer's call 1
Jul 9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Connection closed to
64.180.180.220, serial 0 ()
old:
Quoting Jacco de Leeuw <jacco2 at dds.nl>:
>
> Brad Chang wrote:
>
> > thanks, now I get error 619 "the specified port is not connected"
>
> I have not seen this error before.
>
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: start_pppd: I'm running:
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "/usr/sbin/pppd"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "passive"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "-detach"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "192.168.1.51:192.168.1.25"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "refuse-pap"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "auth"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "require-chap"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "name"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "GuardianVPNserver"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "debug"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "file"
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: "/etc/ppp/options.l2tpd"
>
>
> Hm. You should have seen another line with "/dev/ttyp0" here. For some
> reason
> l2tpd is not attaching this argument. Are you sure your l2tpd is using the
> correct tty patch?
>
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]:
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: control_finish: Call established
> with
> > 64.180.180.220, Local: 64225, Remote: 1, Serial: 0
>
>
> At this point pppd should start. Do you have another logfile with
> pppd messages?
>
> > Jul 6 14:40:23 guardfw2 l2tpd[7982]: child_handler : pppd died for call
> 1
>
> I hope the ppp log will show why it exits.
>
> Jacco
> --
> Jacco de Leeuw mailto:jacco2 at dds.nl
> Zaandam, The Netherlands http://www.jacco2.dds.nl
> _______________________________________________
> Users mailing list
> Users at lists.openswan.org
> http://lists.openswan.org/mailman/listinfo/users
>
Thanks and best regards,
-Brad Chang
-http://www.dotnoc.com
-------------------------------------------------------------------
hosting,web design and managed services @ http://www.dotnoc.com
More information about the Users
mailing list