[Openswan Users] problems with cisco 2811 server and linux client
Hennes
hennes_666 at gmx.net
Thu Sep 11 05:59:15 EDT 2008
Hi at all!
I try to set up a vpn connection between a Cisco 2811 router (as the server) and an openSUSE 11 client. The Cisco router is totally configured and I have to configure the client with open source components. In fact of this I supposed to use openSUSE and its openswan package. I configured the client following the tutorial at the jacco2 homepage. The IPsec connection works and also the L2TP connection starts, but my problem is the ppp authorization. The client connects the server and the client authorizes itself to the Cisco router but my problem now is, that the client wants the Cisco also to authorize itself to the client. But the server doesn’t have to authorize itself to the client. After the client has authorized itself to the server there should be the vpn tunnel and nothing like an authorization request or something like this.
L2tpd.conf:
[lac L2TPserver]
lns = 172.16.0.1
refuse chap = yes
require pap = yes
require authentication = yes
; Name should be the same as the username in the PPP authentication!
name = ac-conn1
ppp debug = yes
pppoptfile = /etc/ppp/options.l2tpd.client
length bit = yes
pap.secrets:
# Secrets for authentication using PAP
# client server secret IP addresses I tried this one with and without IP addresses
#ac-conn1 * "*******" 10.0.0.0/24
#* ac-conn1 "*******" 10.0.0.0/24
# OUTBOUND CONNECTIONS
# Here you should add your PPP Login and PPP password to connect to your
# provider via pap. The * means that the entry(login and passoword may be
# used for ANY host you connect to.
# Thus you do not have to worry about the foreign machine name. Just
# replace password with your password.
#hostname * password and this one, but both times the result was the same
ac-conn1 * "*******"
options.l2tpd.client:
/etc/ppp/options.l2tpd.client
ipcp-accept-local
ipcp-accept-remote
refuse-eap
noccp
noauth
crtscts
idle 1800
mtu 1410
mru 1410
nodefaultroute
debug
lock
#proxyarp
connect-delay 5000
Cisco ppp auth debug:
*Sep 2 2008 16:04:02.815 MEST: ppp1 PPP: Using vpn set call direction
*Sep 2 2008 16:04:02.815 MEST: ppp1 PPP: Treating connection as a callin
*Sep 2 2008 16:04:02.815 MEST: ppp1 PPP: Session handle[D3000003] Session id[1]
*Sep 2 2008 16:04:02.975 MEST: ppp1 PPP: Authorization required
*Sep 2 2008 16:04:02.979 MEST: ppp1 PAP: I AUTH-REQ id 1 len 19 from "ac-conn1"
*Sep 2 2008 16:04:02.979 MEST: ppp1 PAP: Authenticating peer ac-conn1
*Sep 2 2008 16:04:02.979 MEST: ppp1 PPP: Sent PAP LOGIN Request
*Sep 2 2008 16:04:02.983 MEST: ppp1 PPP: Received LOGIN Response PASS
*Sep 2 2008 16:04:02.987 MEST: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up
*Sep 2 2008 16:04:02.991 MEST: Vi2.1 PPP: Sent LCP AUTHOR Request
*Sep 2 2008 16:04:02.991 MEST: Vi2.1 PPP: Sent IPCP AUTHOR Request
*Sep 2 2008 16:04:02.995 MEST: Vi2.1 LCP: Received AAA AUTHOR Response PASS
*Sep 2 2008 16:04:02.995 MEST: Vi2.1 IPCP: Received AAA AUTHOR Response PASS
*Sep 2 2008 16:04:02.995 MEST: Vi2.1 PAP: O AUTH-ACK id 1 len 5
*Sep 2 2008 16:04:03.987 MEST: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access2, changed state to up
*Sep 2 2008 16:04:05.979 MEST: Vi2.1 PAP: I AUTH-REQ id 2 len 19 from "ac-conn1"
*Sep 2 2008 16:04:05.979 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:05.979 MEST: Vi2.1 PAP: O AUTH-ACK id 2 len 5
*Sep 2 2008 16:04:08.983 MEST: Vi2.1 PAP: I AUTH-REQ id 3 len 19 from "ac-conn1"
*Sep 2 2008 16:04:08.983 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:08.983 MEST: Vi2.1 PAP: O AUTH-ACK id 3 len 5
*Sep 2 2008 16:04:11.987 MEST: Vi2.1 PAP: I AUTH-REQ id 4 len 19 from "ac-conn1"
*Sep 2 2008 16:04:11.987 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:11.987 MEST: Vi2.1 PAP: O AUTH-ACK id 4 len 5
*Sep 2 2008 16:04:14.991 MEST: Vi2.1 PAP: I AUTH-REQ id 5 len 19 from "ac-conn1"
*Sep 2 2008 16:04:14.991 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:14.991 MEST: Vi2.1 PAP: O AUTH-ACK id 5 len 5
*Sep 2 2008 16:04:17.995 MEST: Vi2.1 PAP: I AUTH-REQ id 6 len 19 from "ac-conn1"
*Sep 2 2008 16:04:17.995 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:17.995 MEST: Vi2.1 PAP: O AUTH-ACK id 6 len 5
*Sep 2 2008 16:04:20.999 MEST: Vi2.1 PAP: I AUTH-REQ id 7 len 19 from "ac-conn1"
*Sep 2 2008 16:04:20.999 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:21.003 MEST: Vi2.1 PAP: O AUTH-ACK id 7 len 5
*Sep 2 2008 16:04:24.003 MEST: Vi2.1 PAP: I AUTH-REQ id 8 len 19 from "ac-conn1"
*Sep 2 2008 16:04:24.007 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:24.007 MEST: Vi2.1 PAP: O AUTH-ACK id 8 len 5
*Sep 2 2008 16:04:27.007 MEST: Vi2.1 PAP: I AUTH-REQ id 9 len 19 from "ac-conn1"
*Sep 2 2008 16:04:27.011 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:27.011 MEST: Vi2.1 PAP: O AUTH-ACK id 9 len 5
*Sep 2 2008 16:04:30.015 MEST: Vi2.1 PAP: I AUTH-REQ id 10 len 19 from "ac-conn1"
*Sep 2 2008 16:04:30.015 MEST: Vi2.1 PAP: Resending Auth-Ack
*Sep 2 2008 16:04:30.015 MEST: Vi2.1 PAP: O AUTH-ACK id 10 len 5
Linux /var/log/messages:
Sep 2 00:04:22 linux-vpn-client pluto[4265]: loaded host cert file '/etc/ipsec.d/certs/usercrt.pem' (1858 bytes)
Sep 2 00:04:22 linux-vpn-client pluto[4265]: added connection description "l2tp-cert"
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: initiating Main Mode
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: STATE_MAIN_I2: sent MI2, expecting MR2
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: ignoring Vendor ID payload [Cisco-Unity]
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: received Vendor ID payload [Dead Peer Detection]
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: ignoring unknown Vendor ID payload [74154bed40f1d162d45b946bc29def3b]
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: ignoring Vendor ID payload [XAUTH]
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: I am sending my cert
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: I am sending a certificate request
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
Sep 2 00:04:23 linux-vpn-client pluto[4265]: "l2tp-cert" #1: STATE_MAIN_I3: sent MI3, expecting MR3
Sep 2 00:04:24 linux-vpn-client pluto[4265]: "l2tp-cert" #1: Main mode peer ID is ID_DER_ASN1_DN: 'C=DE, O=gematik AG 5, CN=anwasa.gematik.de, S=Konzentrator, G=VPN, SN=00004'
Sep 2 00:04:24 linux-vpn-client pluto[4265]: "l2tp-cert" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
Sep 2 00:04:24 linux-vpn-client pluto[4265]: "l2tp-cert" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_256 prf=oakley_sha group=modp1536}
Sep 2 00:04:24 linux-vpn-client pluto[4265]: "l2tp-cert" #2: initiating Quick Mode RSASIG+ENCRYPT+PFS+UP {using isakmp#1}
Sep 2 00:04:24 linux-vpn-client pluto[4265]: "l2tp-cert" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME
Sep 2 00:04:24 linux-vpn-client pluto[4265]: "l2tp-cert" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
Sep 2 00:04:24 linux-vpn-client pluto[4265]: "l2tp-cert" #2: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0x8df4d3af <0x173d7427 xfrm=AES_256-HMAC_SHA1 NATD=none DPD=none}
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: do_control: Got message c L2TPserver (12 bytes long)
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: ourtid = 16665, entropy_buf = 4119
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: l2tp_call:Connecting to host 172.16.0.1, port 1701
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: check_control: control, cid = 0, Ns = 0, Nr = 1
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: handle_avps: handling avp's for tunnel 16665, call 0
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: protocol_version_avp: peer is using version 1, revision 0.
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: firmware_rev_avp: peer reports firmware version 4384 (0x1120)
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: hostname_avp: peer reports hostname 'vpn_gw'
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: vendor_avp: peer reports vendor 'Cisco Systems, Inc.�#'
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: receive_window_size_avp: peer wants RWS of 1024. Will use flow control.
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: assigned_tunnel_avp: using peer's tunnel 38218
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: framing_caps_avp: supported peer frames:
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: bearer_caps_avp: supported peer bearers:
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: control_finish: Connection established to 172.16.0.1, 1701. Local: 16665, Remote: 38218.
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: ourcid = 3643, entropy_buf = e3b
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: lac_call: Calling on tunnel 16665
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: check_control: control, cid = 0, Ns = 1, Nr = 3
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: check_control: control, cid = 0, Ns = 1, Nr = 3
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: handle_avps: handling avp's for tunnel 16665, call 3643
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: message_type_avp: message type 11 (Incoming-Call-Reply)
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: assigned_call_avp: using peer's call 2
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: control_finish: Call established with 172.16.0.1, Local: 3643, Remote: 2, Serial: 1
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: start_pppd: I'm running:
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "/usr/sbin/pppd"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "passive"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "-detach"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: ":"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "refuse-chap"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "auth"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "require-pap"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "name"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "ac-conn1"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "debug"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "file"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "/etc/ppp/options.l2tpd.client"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: "/dev/ttyp0"
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]:
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: check_control: control, cid = 0, Ns = 2, Nr = 4
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: check_control: control, cid = 2, Ns = 2, Nr = 4
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: handle_avps: handling avp's for tunnel 16665, call 3643
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: message_type_avp: message type 16 (Set-Link-Info)
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: ignore_avp : Ignoring AVP
Sep 2 00:06:30 linux-vpn-client kernel: PPP generic driver version 2.4.2
Sep 2 00:06:30 linux-vpn-client pppd[5266]: pppd 2.4.4 started by root, uid 0
Sep 2 00:06:30 linux-vpn-client pppd[5266]: using channel 1
Sep 2 00:06:30 linux-vpn-client pppd[5266]: Using interface ppp0
Sep 2 00:06:30 linux-vpn-client pppd[5266]: Connect: ppp0 <--> /dev/ttyp0
Sep 2 00:06:30 linux-vpn-client pppd[5266]: sent [LCP ConfReq id=0x1 <mru 1410> <asyncmap 0x0> <magic 0xd14136d1> <pcomp> <accomp>]
Sep 2 00:06:30 linux-vpn-client pppd[5266]: rcvd [LCP ConfReq id=0x1 <asyncmap 0xa0000> <auth pap> <magic 0x21985742> <pcomp> <accomp>]
Sep 2 00:06:30 linux-vpn-client pppd[5266]: sent [LCP ConfAck id=0x1 <asyncmap 0xa0000> <auth pap> <magic 0x21985742> <pcomp> <accomp>]
Sep 2 00:06:30 linux-vpn-client pppd[5266]: rcvd [LCP ConfNak id=0x1 <mru 1500>]
Sep 2 00:06:30 linux-vpn-client pppd[5266]: sent [LCP ConfReq id=0x2 <asyncmap 0x0> <magic 0xd14136d1> <pcomp> <accomp>]
Sep 2 00:06:30 linux-vpn-client pppd[5266]: rcvd [LCP ConfAck id=0x2 <asyncmap 0x0> <magic 0xd14136d1> <pcomp> <accomp>]
Sep 2 00:06:30 linux-vpn-client pppd[5266]: sent [LCP EchoReq id=0x0 magic=0xd14136d1]
Sep 2 00:06:30 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x1 user="ac-conn1" password=<hidden>]
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: check_control: control, cid = 2, Ns = 3, Nr = 4
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: handle_avps: handling avp's for tunnel 16665, call 3643
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: message_type_avp: message type 16 (Set-Link-Info)
Sep 2 00:06:30 linux-vpn-client l2tpd[4302]: ignore_avp : Ignoring AVP
Sep 2 00:06:30 linux-vpn-client pppd[5266]: rcvd [LCP EchoRep id=0x0 magic=0x21985742]
Sep 2 00:06:30 linux-vpn-client pppd[5266]: rcvd [proto=0x201] 00 05 00
Sep 2 00:06:30 linux-vpn-client pppd[5266]: discarding proto 0x201 in phase 5
Sep 2 00:06:30 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 01 00 0a 03 06 ac 10 00 01
Sep 2 00:06:30 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:31 linux-vpn-client pppd[5266]: rcvd [LCP EchoReq id=0x1 magic=0x21985742 d1 41 36 d1]
Sep 2 00:06:31 linux-vpn-client pppd[5266]: sent [LCP EchoRep id=0x1 magic=0xd14136d1 d1 41 36 d1]
Sep 2 00:06:32 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 02 00 0a 03 06 ac 10 00 01
Sep 2 00:06:32 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:33 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x2 user="ac-conn1" password=<hidden>]
Sep 2 00:06:33 linux-vpn-client pppd[5266]: rcvd [proto=0x202] 00 05 00
Sep 2 00:06:33 linux-vpn-client pppd[5266]: discarding proto 0x202 in phase 5
Sep 2 00:06:34 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 03 00 0a 03 06 ac 10 00 01
Sep 2 00:06:34 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:36 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x3 user="ac-conn1" password=<hidden>]
Sep 2 00:06:36 linux-vpn-client pppd[5266]: rcvd [proto=0x203] 00 05 00
Sep 2 00:06:36 linux-vpn-client pppd[5266]: discarding proto 0x203 in phase 5
Sep 2 00:06:36 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 04 00 0a 03 06 ac 10 00 01
Sep 2 00:06:36 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:38 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 05 00 0a 03 06 ac 10 00 01
Sep 2 00:06:38 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:39 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x4 user="ac-conn1" password=<hidden>]
Sep 2 00:06:39 linux-vpn-client pppd[5266]: rcvd [proto=0x204] 00 05 00
Sep 2 00:06:39 linux-vpn-client pppd[5266]: discarding proto 0x204 in phase 5
Sep 2 00:06:40 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 06 00 0a 03 06 ac 10 00 01
Sep 2 00:06:40 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:41 linux-vpn-client pppd[5266]: rcvd [LCP EchoReq id=0x2 magic=0x21985742 d1 41 36 d1]
Sep 2 00:06:41 linux-vpn-client pppd[5266]: sent [LCP EchoRep id=0x2 magic=0xd14136d1 d1 41 36 d1]
Sep 2 00:06:42 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x5 user="ac-conn1" password=<hidden>]
Sep 2 00:06:42 linux-vpn-client pppd[5266]: rcvd [proto=0x205] 00 05 00
Sep 2 00:06:42 linux-vpn-client pppd[5266]: discarding proto 0x205 in phase 5
Sep 2 00:06:42 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 07 00 0a 03 06 ac 10 00 01
Sep 2 00:06:42 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:44 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 08 00 0a 03 06 ac 10 00 01
Sep 2 00:06:44 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:45 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x6 user="ac-conn1" password=<hidden>]
Sep 2 00:06:45 linux-vpn-client pppd[5266]: rcvd [proto=0x206] 00 05 00
Sep 2 00:06:45 linux-vpn-client pppd[5266]: discarding proto 0x206 in phase 5
Sep 2 00:06:46 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 09 00 0a 03 06 ac 10 00 01
Sep 2 00:06:46 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:48 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x7 user="ac-conn1" password=<hidden>]
Sep 2 00:06:48 linux-vpn-client pppd[5266]: rcvd [proto=0x207] 00 05 00
Sep 2 00:06:48 linux-vpn-client pppd[5266]: discarding proto 0x207 in phase 5
Sep 2 00:06:48 linux-vpn-client pppd[5266]: rcvd [proto=0x1] 0a 00 0a 03 06 ac 10 00 01
Sep 2 00:06:48 linux-vpn-client pppd[5266]: discarding proto 0x1 in phase 5
Sep 2 00:06:51 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x8 user="ac-conn1" password=<hidden>]
Sep 2 00:06:51 linux-vpn-client pppd[5266]: rcvd [proto=0x208] 00 05 00
Sep 2 00:06:51 linux-vpn-client pppd[5266]: discarding proto 0x208 in phase 5
Sep 2 00:06:52 linux-vpn-client pppd[5266]: rcvd [LCP EchoReq id=0x3 magic=0x21985742 d1 41 36 d1]
Sep 2 00:06:52 linux-vpn-client pppd[5266]: sent [LCP EchoRep id=0x3 magic=0xd14136d1 d1 41 36 d1]
Sep 2 00:06:54 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0x9 user="ac-conn1" password=<hidden>]
Sep 2 00:06:54 linux-vpn-client pppd[5266]: rcvd [proto=0x209] 00 05 00
Sep 2 00:06:54 linux-vpn-client pppd[5266]: discarding proto 0x209 in phase 5
Sep 2 00:06:57 linux-vpn-client pppd[5266]: sent [PAP AuthReq id=0xa user="ac-conn1" password=<hidden>]
Sep 2 00:06:57 linux-vpn-client pppd[5266]: rcvd [proto=0x20a] 00 05 00
Sep 2 00:06:57 linux-vpn-client pppd[5266]: discarding proto 0x20a in phase 5
Sep 2 00:07:00 linux-vpn-client pppd[5266]: sent [LCP EchoReq id=0x1 magic=0xd14136d1]
Sep 2 00:07:00 linux-vpn-client pppd[5266]: rcvd [LCP EchoRep id=0x1 magic=0x21985742]
Sep 2 00:07:00 linux-vpn-client pppd[5266]: No response to PAP authenticate-requests
Sep 2 00:07:00 linux-vpn-client pppd[5266]: sent [LCP TermReq id=0x3 "Failed to authenticate ourselves to peer"]
Sep 2 00:07:00 linux-vpn-client pppd[5266]: rcvd [LCP TermAck id=0x3]
Sep 2 00:07:00 linux-vpn-client pppd[5266]: Connection terminated.
Sep 2 00:07:01 linux-vpn-client pppd[5266]: Exit.
Sep 2 00:07:01 linux-vpn-client l2tpd[4302]: child_handler : pppd died for call 2
Sep 2 00:07:01 linux-vpn-client l2tpd[4302]: read_packet: Error 9 (Bad file descriptor)
Sep 2 00:07:01 linux-vpn-client syslog-ng[3107]: last message repeated 10 times
Sep 2 00:07:01 linux-vpn-client l2tpd[4302]: read_packet: Too many errors. Declaring call dead.
Sep 2 00:07:01 linux-vpn-client l2tpd[4302]: network_thread: tossing read packet, error = Bad file descriptor (9). Closing call.
Sep 2 00:07:01 linux-vpn-client l2tpd[4302]: call_close: Call 3643 to 172.16.0.1 disconnected
Sep 2 00:07:01 linux-vpn-client l2tpd[4302]: check_control: control, cid = 0, Ns = 4, Nr = 5
Sep 2 00:07:01 linux-vpn-client l2tpd[4302]: check_control: control, cid = 0, Ns = 4, Nr = 5
Sep 2 00:07:11 linux-vpn-client l2tpd[4302]: handle_avps: handling avp's for tunnel 16665, call 0
Sep 2 00:07:11 linux-vpn-client l2tpd[4302]: message_type_avp: message type 4 (Stop-Control-Connection-Notification)
Sep 2 00:07:11 linux-vpn-client l2tpd[4302]: result_code_avp: peer closing for reason 1 (General request to clear control connection), error = 0 ()
Sep 2 00:07:11 linux-vpn-client l2tpd[4302]: assigned_tunnel_avp: using peer's tunnel 38218
Sep 2 00:07:11 linux-vpn-client l2tpd[4302]: control_finish: Peer tried to disconnect with invalid TID (38218 != 16665)
Sep 2 00:07:35 linux-vpn-client l2tpd[4302]: control_xmit: Maximum retries exceeded for tunnel 16665. Closing.
Sep 2 00:07:35 linux-vpn-client l2tpd[4302]: call_close : Connection 38218 closed to 172.16.0.1, port 1701 (Timeout)
Sep 2 00:07:40 linux-vpn-client l2tpd[4302]: control_xmit: Unable to deliver closing message for tunnel 16665. Destroying anyway.
Sep 2 00:08:02 linux-vpn-client l2tpd[4302]: do_control: Got message d L2TPserver (12 bytes long)
Sep 2 00:08:02 linux-vpn-client l2tpd[4302]: do_control: Session 'L2TPserver' not up
I would like to know if there is an option or something I have to add to a script or to my pap.secrets or whatever so I can force the client not to demand an authorization by the server.
I hope someone is able to solve my problem.
Thanks
Hennes
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20080911/0758b365/attachment-0001.html
More information about the Users
mailing list