[Openswan Users] l2tp patched but hanging on verify password error: 737 Loopback detected

Brad Chang openswan at dotnoc.com
Fri Jul 9 00:40:10 CEST 2004


Hi I patched the l2tpd as shown on your website now I get this error when 
verifying password the session hangs then I get a disconnect and error on the 
windows box here are some logs.  thanks for all the help you have givven.  oh 
and after the fist time I get error it seems that ipsec will no longer reply to 
any packets taht my windows box sends it (according to tcpdump).  then I just 
get .  should I recompile and install ipsec to? 

guardfw2:/usr/local/nagios/etc# tcpdump -n -i any host 64.180.180.220
tcpdump: listening on any
00:37:27.851173 64.180.180.220.500 > 216.187.95.142.500: isakmp: phase 1 I 
ident: [|sa]
00:37:28.851334 64.180.180.220.500 > 216.187.95.142.500: isakmp: phase 1 I 
ident: [|sa]
00:37:30.851654 64.180.180.220.500 > 216.187.95.142.500: isakmp: phase 1 I 
ident: [|sa]


==> /var/log/syslog <==
Jul  9 00:32:14 guardfw2 l2tpd[2520]: ourtid = 12948, entropy_buf = 3294
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 0, 
Nr = 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 1 (Start-
Control-Connection-Request)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: protocol_version_avp: peer is using 
version 1, revision 0.
Jul  9 00:32:14 guardfw2 l2tpd[2520]: framing_caps_avp: supported peer frames: 
sync
Jul  9 00:32:14 guardfw2 l2tpd[2520]: bearer_caps_avp: supported peer bearers:
Jul  9 00:32:14 guardfw2 l2tpd[2520]: firmware_rev_avp: peer reports firmware 
version 1280 (0x0500)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: hostname_avp: peer reports 
hostname 'pikachu'
Jul  9 00:32:14 guardfw2 l2tpd[2520]: vendor_avp: peer reports 
vendor 'Microsoft\200^H'
Jul  9 00:32:14 guardfw2 l2tpd[2520]: assigned_tunnel_avp: using peer's tunnel 3
Jul  9 00:32:14 guardfw2 l2tpd[2520]: receive_window_size_avp: peer wants RWS 
of 8.  Will use flow control.

==> /var/log/daemon.log <==
Jul  9 00:32:14 guardfw2 l2tpd[2520]: ourtid = 12948, entropy_buf = 3294
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 0, 
Nr = 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 1 (Start-
Control-Connection-Request)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: protocol_version_avp: peer is using 
version 1, revision 0.
Jul  9 00:32:14 guardfw2 l2tpd[2520]: framing_caps_avp: supported peer frames: 
sync
Jul  9 00:32:14 guardfw2 l2tpd[2520]: bearer_caps_avp: supported peer bearers:
Jul  9 00:32:14 guardfw2 l2tpd[2520]: firmware_rev_avp: peer reports firmware 
version 1280 (0x0500)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: hostname_avp: peer reports 
hostname 'pikachu'
Jul  9 00:32:14 guardfw2 l2tpd[2520]: vendor_avp: peer reports 
vendor 'Microsoft\200^H'
Jul  9 00:32:14 guardfw2 l2tpd[2520]: assigned_tunnel_avp: using peer's tunnel 3
Jul  9 00:32:14 guardfw2 l2tpd[2520]: receive_window_size_avp: peer wants RWS 
of 8.  Will use flow control.

==> /var/log/auth.log <==
Jul  9 00:32:13 guardfw2 pluto[6917]: "roadwarrior2"[1] 64.180.180.220 #2: 
IPsec SA established {ESP=>0x5f63f1bf <0x7dc252f5}

==> /var/log/syslog <==
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 1, 
Nr = 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 3 (Start-
Control-Connection-Connected)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Connection established to 
64.180.180.220, 1701.  Local: 12948, Remote: 3.  LNS session is 'default'
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 2, 
Nr = 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 10 
(Incoming-Call-Request)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: new incoming call
Jul  9 00:32:14 guardfw2 l2tpd[2520]: ourcid = 3567, entropy_buf = def
Jul  9 00:32:14 guardfw2 l2tpd[2520]: assigned_call_avp: using peer's call 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: call_serno_avp: serial number is 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: bearer_type_avp: peer bears: analog
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 3, 
Nr = 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 1, Ns = 3, 
Nr = 2
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 3567
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 12 
(Incoming-Call-Connected)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: tx_speed_avp: transmit baud rate is 
10000000
Jul  9 00:32:14 guardfw2 l2tpd[2520]: frame_type_avp: peer uses:sync frames
Jul  9 00:32:14 guardfw2 l2tpd[2520]: ignore_avp : Ignoring AVP
Jul  9 00:32:14 guardfw2 l2tpd[2520]: start_pppd: I'm running:
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "/usr/sbin/pppd"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "passive"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "-detach"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "192.168.1.51:192.168.1.25"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "refuse-pap"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "auth"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "require-chap"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "name"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "GuardianVPNserver"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "debug"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "file"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "/etc/ppp/options.l2tpd"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "/dev/ttyp0"
Jul  9 00:32:14 guardfw2 l2tpd[2520]:
Jul  9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Call established with 
64.180.180.220, Local: 3567, Remote: 1, Serial: 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 4, 
Nr = 2
Jul  9 00:32:14 guardfw2 pppd[11942]: pppd 2.4.1 started by root, uid 0
Jul  9 00:32:14 guardfw2 pppd[11942]: using channel 24
Jul  9 00:32:14 guardfw2 Keepalived_vrrp: Netlink: filter function error
Jul  9 00:32:14 guardfw2 Keepalived_healthcheckers: Netlink: filter function 
error
Jul  9 00:32:14 guardfw2 pppd[11942]: Using interface ppp0
Jul  9 00:32:14 guardfw2 pppd[11942]: Connect: ppp0 <--> /dev/ttyp0
Jul  9 00:32:14 guardfw2 pppd[11942]: sent [LCP ConfReq id=0x1 <mru 1410> 
<asyncmap 0x0> <auth chap MD5> <magic 0xf4da4701> <pcomp> <accomp>]
Jul  9 00:32:14 guardfw2 pppd[11942]: rcvd [LCP TermReq id=0x3 "WX;\37777777626
\000<\37777777715t\000\000\002\37777777741"]
Jul  9 00:32:14 guardfw2 pppd[11942]: sent [LCP TermAck id=0x3]
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 1, Ns = 4, 
Nr = 2
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 3567
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 14 (Call-
Disconnect-Notify)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: result_code_avp: peer closing for reason 
3 (Control channel already exists), error = 0 ()
Jul  9 00:32:14 guardfw2 l2tpd[2520]: assigned_call_avp: using peer's call 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Connection closed to 
64.180.180.220, serial 0 ()
Jul  9 00:32:14 guardfw2 pppd[11942]: Terminating on signal 15.
Jul  9 00:32:14 guardfw2 pppd[11942]: Modem hangup
Jul  9 00:32:14 guardfw2 pppd[11942]: Connection terminated.
Jul  9 00:32:14 guardfw2 Keepalived_vrrp: Netlink: filter function error
Jul  9 00:32:14 guardfw2 Keepalived_healthcheckers: Netlink: filter function 
error
Jul  9 00:32:14 guardfw2 pppd[11942]: Exit.

==> /var/log/daemon.log <==
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 1, 
Nr = 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 3 (Start-
Control-Connection-Connected)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Connection established to 
64.180.180.220, 1701.  Local: 12948, Remote: 3.  LNS session is 'default'
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 2, 
Nr = 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 10 
(Incoming-Call-Request)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: new incoming call
Jul  9 00:32:14 guardfw2 l2tpd[2520]: ourcid = 3567, entropy_buf = def
Jul  9 00:32:14 guardfw2 l2tpd[2520]: assigned_call_avp: using peer's call 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: call_serno_avp: serial number is 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: bearer_type_avp: peer bears: analog
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 3, 
Nr = 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 1, Ns = 3, 
Nr = 2
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 3567
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 12 
(Incoming-Call-Connected)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: tx_speed_avp: transmit baud rate is 
10000000
Jul  9 00:32:14 guardfw2 l2tpd[2520]: frame_type_avp: peer uses:sync frames
Jul  9 00:32:14 guardfw2 l2tpd[2520]: ignore_avp : Ignoring AVP
Jul  9 00:32:14 guardfw2 l2tpd[2520]: start_pppd: I'm running:
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "/usr/sbin/pppd"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "passive"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "-detach"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "192.168.1.51:192.168.1.25"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "refuse-pap"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "auth"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "require-chap"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "name"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "GuardianVPNserver"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "debug"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "file"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "/etc/ppp/options.l2tpd"
Jul  9 00:32:14 guardfw2 l2tpd[2520]: "/dev/ttyp0"
Jul  9 00:32:14 guardfw2 l2tpd[2520]:
Jul  9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Call established with 
64.180.180.220, Local: 3567, Remote: 1, Serial: 0
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 0, Ns = 4, 
Nr = 2
Jul  9 00:32:14 guardfw2 l2tpd[2520]: check_control: control, cid = 1, Ns = 4, 
Nr = 2
Jul  9 00:32:14 guardfw2 l2tpd[2520]: handle_avps: handling avp's for tunnel 
12948, call 3567
Jul  9 00:32:14 guardfw2 l2tpd[2520]: message_type_avp: message type 14 (Call-
Disconnect-Notify)
Jul  9 00:32:14 guardfw2 l2tpd[2520]: result_code_avp: peer closing for reason 
3 (Control channel already exists), error = 0 ()
Jul  9 00:32:14 guardfw2 l2tpd[2520]: assigned_call_avp: using peer's call 1
Jul  9 00:32:14 guardfw2 l2tpd[2520]: control_finish: Connection closed to 
64.180.180.220, serial 0 ()




















old:


Quoting Jacco de Leeuw <jacco2 at dds.nl>:

> 
> Brad Chang wrote:
> 
>  > thanks, now I get error 619 "the specified port is not connected"
> 
> I have not seen this error before.
> 
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: start_pppd: I'm running:
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "/usr/sbin/pppd"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "passive"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "-detach"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "192.168.1.51:192.168.1.25"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "refuse-pap"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "auth"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "require-chap"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "name"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "GuardianVPNserver"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "debug"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "file"
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: "/etc/ppp/options.l2tpd"
> 
> 
> Hm. You should have seen another line with "/dev/ttyp0" here. For some
> reason
> l2tpd is not attaching this argument. Are you sure your l2tpd is using the
> correct tty patch?
> 
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]:
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: control_finish: Call established
> with
>  > 64.180.180.220, Local: 64225, Remote: 1, Serial: 0
> 
> 
> At this point pppd should start. Do you have another logfile with
> pppd messages?
> 
>  > Jul  6 14:40:23 guardfw2 l2tpd[7982]: child_handler : pppd died for call
> 1
> 
> I hope the ppp log will show why it exits.
> 
> Jacco
> -- 
> Jacco de Leeuw                         mailto:jacco2 at dds.nl
> Zaandam, The Netherlands           http://www.jacco2.dds.nl
> _______________________________________________
> Users mailing list
> Users at lists.openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> 






Thanks and best regards,
-Brad Chang
-http://www.dotnoc.com


-------------------------------------------------------------------
hosting,web design and managed services @ http://www.dotnoc.com



More information about the Users mailing list