[Openswan Users] Help request for IPSec/L2TP starting daemon

mfemm at tiscali.it mfemm at tiscali.it
Wed Sep 17 13:10:17 EDT 2008


Dear all,
I'm trying to establish an IPsec\l2tpd VPN Roadwarrior 
connection to an Openswan
gateway to a public IP address NAT(141.250.x.
y) for my BSC thesis.
The server machine is a Linux Debian 2.4.27 with 
Openswan 2.4.6(netkey).
By the gateway I need to assign to roadwarriors 
these two virtual ip
address(a.b.c.51 and a.b.c.52), while the internal 
IP address(over the ppp
interface) of the gateway is a.b.c.56.
Here are 
the configuration files:

ipsec.conf
 
config setup
        interfaces=%
defaultroute
        virtual_private=%v4:192.168.0.0/16,%v4:10.1.0.0/16

        klipsdebug=none
        plutodebug=none
conn prova
        
left=%defaultroute
        leftnexthop=141.250.40.30
        right=%any

        pfs=no
        rightsubnet=vhost:%no,%priv
        
rightprotoport=17/%any
        leftprotoport=17/1701
        
authby=secret
        type=tunnel
        auto=start


l2tpd.conf

ip 
range = a.b.c.51 - a.b.c.52
local ip = 141.250.40.56
length bit = 
yes                                                
 require chap = yes

 refuse pap = yes
name = nameserver
pppoptfile=/etc/ppp/options.l2tpd.
lns


option.l2tp.lns

ms-dns a.b.c.93
ms-dns a.b.c.93
auth
crtscts

lock 
mru 1200
 mtu 1200
proxyarp
ipcp-accept-local
ipcp-accept-remote


Now, with WinXP client I got this problem: i can establish the IPsec 
tunnel without
problem, but during l2tpd negotiation ERROR 678 occurs.
I've checked many times
username and passwords, but they're right.

During negotiation with winXP client,sniffing both in server machine 
than in client
machine, I see the right packets exchanging during IPsec 
phases, but then I can only
see ESP packets from client to server, but 
no response from this last one.

with Linux client I got pretty much 
the same problem: once the IPsec tunnel is
established, I can't finish 
the l2tpd negotiation.
Here's the syslog

 Sep 16 18:31:34 localhost 
l2tpd[7736]: This binary does not support kernel L2TP. 
Sep 16 18:31:34 
localhost l2tpd[7736]: l2tpd version 0.69 started on attila PID:7736 

Sep 16 18:31:34 localhost l2tpd[7736]: Linux version 2.4.27-3-386 on a 
i686,
listening on IP address 0.0.0.0, port 1701 
Sep 16 18:33:09 
localhost l2tpd[7736]: ourtid = 46577, entropy_buf = b5f1 
Sep 16 18:33:
09 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 0, Nr = 
0 
Sep 16 18:33:09 localhost l2tpd[7736]: handle_avps: handling avp's 
for tunnel 46577,
call 0 
Sep 16 18:33:09 localhost l2tpd[7736]: 
message_type_avp: message type 1
(Start-Control-Connection-Request) 

Sep 16 18:33:09 localhost l2tpd[7736]: protocol_version_avp: peer is 
using version
1, revision 0. 
Sep 16 18:33:09 localhost l2tpd[7736]: 
framing_caps_avp: supported peer frames:async
sync 
Sep 16 18:33:09 
localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:  
Sep 
16 18:33:09 localhost l2tpd[7736]: firmware_rev_avp: peer reports 
firmware
version 1680 (0x0690) 
Sep 16 18:33:09 localhost l2tpd[7736]: 
hostname_avp: peer reports hostname
'eugenio-laptop' 
Sep 16 18:33:09 
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com' 

Sep 16 18:33:09 localhost l2tpd[7736]: assigned_tunnel_avp: using 
peer's tunnel 61026 
Sep 16 18:33:09 localhost l2tpd[7736]: 
receive_window_size_avp: peer wants RWS of 4.
 Will use flow control. 

Sep 16 18:33:10 localhost l2tpd[7736]: ourtid = 36682, entropy_buf = 
8f4a 
Sep 16 18:33:10 localhost l2tpd[7736]: check_control: control, 
cid = 0, Ns = 0, Nr = 0 
Sep 16 18:33:10 localhost l2tpd[7736]: 
handle_avps: handling avp's for tunnel 36682,
call 0 
Sep 16 18:33:10 
localhost l2tpd[7736]: message_type_avp: message type 1
(Start-Control-
Connection-Request) 
Sep 16 18:33:10 localhost l2tpd[7736]: 
protocol_version_avp: peer is using version
1, revision 0. 
Sep 16 18:
33:10 localhost l2tpd[7736]: framing_caps_avp: supported peer frames:
async
sync 
Sep 16 18:33:10 localhost l2tpd[7736]: bearer_caps_avp: 
supported peer bearers:  
Sep 16 18:33:10 localhost l2tpd[7736]: 
firmware_rev_avp: peer reports firmware
version 1680 (0x0690) 
Sep 16 
18:33:10 localhost l2tpd[7736]: hostname_avp: peer reports hostname

'eugenio-laptop' 
Sep 16 18:33:10 localhost l2tpd[7736]: vendor_avp: 
peer reports vendor 'xelerance.com' 
Sep 16 18:33:10 localhost l2tpd
[7736]: assigned_tunnel_avp: using peer's tunnel 61026 
Sep 16 18:33:10 
localhost l2tpd[7736]: receive_window_size_avp: peer wants RWS of 4.
 
Will use flow control. 
Sep 16 18:33:10 localhost l2tpd[7736]: 
control_finish: Peer requested tunnel 61026
twice, ignoring second 
one. 
Sep 16 18:33:11 localhost l2tpd[7736]: ourtid = 21671, 
entropy_buf = 54a7 
Sep 16 18:33:11 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:33:11 
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 21671,

call 0 
Sep 16 18:33:11 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:33:11 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:33:11 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:33:11 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:33:11 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:33:11 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:33:11 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:33:
11 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
61026 
Sep 16 18:33:11 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:33:11 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 61026
twice, 
ignoring second one. 
Sep 16 18:33:12 localhost l2tpd[7736]: ourtid = 
59594, entropy_buf = e8ca 
Sep 16 18:33:12 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:33:12 
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 59594,

call 0 
Sep 16 18:33:12 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:33:12 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:33:12 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:33:12 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:33:12 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:33:12 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:33:12 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:33:
12 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
61026 
Sep 16 18:33:12 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:33:12 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 61026
twice, 
ignoring second one. 
Sep 16 18:33:13 localhost l2tpd[7736]: ourtid = 
63165, entropy_buf = f6bd 
Sep 16 18:33:13 localhost l2tpd[7736]: 
ourcid = 39106, entropy_buf = 98c2 
Sep 16 18:33:13 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:33:
13 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 63165,

call 39106 
Sep 16 18:33:13 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:33:13 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:33:13 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:33:13 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:33:13 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:33:13 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:33:13 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:33:
13 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
61026 
Sep 16 18:33:13 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:33:13 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 61026
twice, 
ignoring second one. 
Sep 16 18:33:14 localhost l2tpd[7736]: ourtid = 
19333, entropy_buf = 4b85 
Sep 16 18:33:14 localhost l2tpd[7736]: 
ourcid = 50841, entropy_buf = c699 
Sep 16 18:33:14 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:33:
14 localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:33:14 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:33:14 localhost 
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 46577.  
Closing. 
Sep 16 18:33:14 localhost l2tpd[7736]: call_close : 
Connection 61026 closed to
10.1.1.16, port 1701 (Timeout) 
Sep 16 18:33:
15 localhost l2tpd[7736]: ourtid = 48466, entropy_buf = bd52 
Sep 16 18:
33:15 localhost l2tpd[7736]: ourcid = 62798, entropy_buf = f54e 
Sep 16 
18:33:15 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 
1, Nr = 0 
Sep 16 18:33:15 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:33:15 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:33:16 localhost l2tpd[7736]: ourtid = 38687, 
entropy_buf = 971f 
Sep 16 18:33:16 localhost l2tpd[7736]: ourcid = 
48604, entropy_buf = bddc 
Sep 16 18:33:16 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:33:16 
localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:33:16 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:33:17 localhost 
l2tpd[7736]: ourtid = 12198, entropy_buf = 2fa6 
Sep 16 18:33:17 
localhost l2tpd[7736]: ourcid = 31580, entropy_buf = 7b5c 
Sep 16 18:33:
17 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr = 
0 
Sep 16 18:33:17 localhost l2tpd[7736]: check_control: Received out 
of order control
packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:33:
17 localhost l2tpd[7736]: handle_packet: bad control packet! 
Sep 16 18:
33:18 localhost l2tpd[7736]: ourtid = 29673, entropy_buf = 73e9 
Sep 16 
18:33:18 localhost l2tpd[7736]: ourcid = 30859, entropy_buf = 788b 
Sep 
16 18:33:18 localhost l2tpd[7736]: check_control: control, cid = 0, Ns 
= 1, Nr = 0 
Sep 16 18:33:18 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:33:18 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:33:19 localhost l2tpd[7736]: control_xmit: Unable to 
deliver closing
message for tunnel 46577. Destroying anyway. 
Sep 16 18:
33:49 localhost l2tpd[7736]: ourtid = 38628, entropy_buf = 96e4 
Sep 16 
18:33:49 localhost l2tpd[7736]: ourcid = 47116, entropy_buf = b80c 
Sep 
16 18:33:49 localhost l2tpd[7736]: check_control: control, cid = 0, Ns 
= 0, Nr = 0 
Sep 16 18:33:49 localhost l2tpd[7736]: handle_avps: 
handling avp's for tunnel 38628,
call 47116 
Sep 16 18:33:49 localhost 
l2tpd[7736]: message_type_avp: message type 1
(Start-Control-Connection-
Request) 
Sep 16 18:33:49 localhost l2tpd[7736]: protocol_version_avp: 
peer is using version
1, revision 0. 
Sep 16 18:33:49 localhost l2tpd
[7736]: framing_caps_avp: supported peer frames:async
sync 
Sep 16 18:
33:49 localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:  

Sep 16 18:33:49 localhost l2tpd[7736]: firmware_rev_avp: peer reports 
firmware
version 1680 (0x0690) 
Sep 16 18:33:49 localhost l2tpd[7736]: 
hostname_avp: peer reports hostname
'eugenio-laptop' 
Sep 16 18:33:49 
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com' 

Sep 16 18:33:49 localhost l2tpd[7736]: assigned_tunnel_avp: using 
peer's tunnel 19744 
Sep 16 18:33:49 localhost l2tpd[7736]: 
receive_window_size_avp: peer wants RWS of 4.
 Will use flow control. 

Sep 16 18:33:50 localhost l2tpd[7736]: ourtid = 59643, entropy_buf = 
e8fb 
Sep 16 18:33:50 localhost l2tpd[7736]: check_control: control, 
cid = 0, Ns = 0, Nr = 0 
Sep 16 18:33:50 localhost l2tpd[7736]: 
handle_avps: handling avp's for tunnel 59643,
call 0 
Sep 16 18:33:50 
localhost l2tpd[7736]: message_type_avp: message type 1
(Start-Control-
Connection-Request) 
Sep 16 18:33:50 localhost l2tpd[7736]: 
protocol_version_avp: peer is using version
1, revision 0. 
Sep 16 18:
33:50 localhost l2tpd[7736]: framing_caps_avp: supported peer frames:
async
sync 
Sep 16 18:33:50 localhost l2tpd[7736]: bearer_caps_avp: 
supported peer bearers:  
Sep 16 18:33:50 localhost l2tpd[7736]: 
firmware_rev_avp: peer reports firmware
version 1680 (0x0690) 
Sep 16 
18:33:50 localhost l2tpd[7736]: hostname_avp: peer reports hostname

'eugenio-laptop' 
Sep 16 18:33:50 localhost l2tpd[7736]: vendor_avp: 
peer reports vendor 'xelerance.com' 
Sep 16 18:33:50 localhost l2tpd
[7736]: assigned_tunnel_avp: using peer's tunnel 19744 
Sep 16 18:33:50 
localhost l2tpd[7736]: receive_window_size_avp: peer wants RWS of 4.
 
Will use flow control. 
Sep 16 18:33:50 localhost l2tpd[7736]: 
control_finish: Peer requested tunnel 19744
twice, ignoring second 
one. 
Sep 16 18:33:51 localhost l2tpd[7736]: ourtid = 46522, 
entropy_buf = b5ba 
Sep 16 18:33:51 localhost l2tpd[7736]: ourcid = 
30746, entropy_buf = 781a 
Sep 16 18:33:51 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:33:51 
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 46522,

call 30746 
Sep 16 18:33:51 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:33:51 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:33:51 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:33:51 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:33:51 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:33:51 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:33:51 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:33:
51 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
19744 
Sep 16 18:33:51 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:33:51 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 19744
twice, 
ignoring second one. 
Sep 16 18:33:52 localhost l2tpd[7736]: ourtid = 
54743, entropy_buf = d5d7 
Sep 16 18:33:52 localhost l2tpd[7736]: 
ourcid = 19455, entropy_buf = 4bff 
Sep 16 18:33:52 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:33:
52 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 54743,

call 19455 
Sep 16 18:33:52 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:33:52 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:33:52 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:33:52 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:33:52 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:33:52 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:33:52 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:33:
52 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
19744 
Sep 16 18:33:52 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:33:52 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 19744
twice, 
ignoring second one. 
Sep 16 18:33:53 localhost l2tpd[7736]: ourtid = 
25872, entropy_buf = 6510 
Sep 16 18:33:53 localhost l2tpd[7736]: 
ourcid = 16552, entropy_buf = 40a8 
Sep 16 18:33:53 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:33:
53 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 25872,

call 16552 
Sep 16 18:33:53 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:33:53 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:33:53 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:33:53 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:33:53 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:33:53 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:33:53 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:33:
53 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
19744 
Sep 16 18:33:53 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:33:53 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 19744
twice, 
ignoring second one. 
Sep 16 18:33:54 localhost l2tpd[7736]: ourtid = 
53770, entropy_buf = d20a 
Sep 16 18:33:54 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:33:54 
localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:33:54 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:33:54 localhost 
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 38628.  
Closing. 
Sep 16 18:33:54 localhost l2tpd[7736]: call_close : 
Connection 19744 closed to
10.1.1.16, port 1701 (Timeout) 
Sep 16 18:33:
55 localhost l2tpd[7736]: ourtid = 21746, entropy_buf = 54f2 
Sep 16 18:
33:55 localhost l2tpd[7736]: ourcid = 1616, entropy_buf = 650 
Sep 16 
18:33:55 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 
1, Nr = 0 
Sep 16 18:33:55 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:33:55 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:33:56 localhost l2tpd[7736]: ourtid = 48033, 
entropy_buf = bba1 
Sep 16 18:33:56 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:33:56 
localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:33:56 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:33:57 localhost 
l2tpd[7736]: ourtid = 35316, entropy_buf = 89f4 
Sep 16 18:33:57 
localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0 

Sep 16 18:33:57 localhost l2tpd[7736]: check_control: Received out of 
order control
packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:33:57 
localhost l2tpd[7736]: handle_packet: bad control packet! 
Sep 16 18:33:
58 localhost l2tpd[7736]: ourtid = 28891, entropy_buf = 70db 
Sep 16 18:
33:58 localhost l2tpd[7736]: ourcid = 61186, entropy_buf = ef02 
Sep 16 
18:33:58 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 
1, Nr = 0 
Sep 16 18:33:58 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:33:58 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:33:59 localhost l2tpd[7736]: control_xmit: Unable to 
deliver closing
message for tunnel 38628. Destroying anyway. 
Sep 16 18:
34:29 localhost l2tpd[7736]: ourtid = 24649, entropy_buf = 6049 
Sep 16 
18:34:29 localhost l2tpd[7736]: ourcid = 28185, entropy_buf = 6e19 
Sep 
16 18:34:29 localhost l2tpd[7736]: check_control: control, cid = 0, Ns 
= 0, Nr = 0 
Sep 16 18:34:29 localhost l2tpd[7736]: handle_avps: 
handling avp's for tunnel 24649,
call 28185 
Sep 16 18:34:29 localhost 
l2tpd[7736]: message_type_avp: message type 1
(Start-Control-Connection-
Request) 
Sep 16 18:34:29 localhost l2tpd[7736]: protocol_version_avp: 
peer is using version
1, revision 0. 
Sep 16 18:34:29 localhost l2tpd
[7736]: framing_caps_avp: supported peer frames:async
sync 
Sep 16 18:
34:29 localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:  

Sep 16 18:34:29 localhost l2tpd[7736]: firmware_rev_avp: peer reports 
firmware
version 1680 (0x0690) 
Sep 16 18:34:29 localhost l2tpd[7736]: 
hostname_avp: peer reports hostname
'eugenio-laptop' 
Sep 16 18:34:29 
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com' 

Sep 16 18:34:29 localhost l2tpd[7736]: assigned_tunnel_avp: using 
peer's tunnel 62809 
Sep 16 18:34:29 localhost l2tpd[7736]: 
receive_window_size_avp: peer wants RWS of 4.
 Will use flow control. 

Sep 16 18:34:30 localhost l2tpd[7736]: ourtid = 40729, entropy_buf = 
9f19 
Sep 16 18:34:30 localhost l2tpd[7736]: ourcid = 28981, 
entropy_buf = 7135 
Sep 16 18:34:30 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:34:30 
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 40729,

call 28981 
Sep 16 18:34:30 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:34:30 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:34:30 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:34:30 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:34:30 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:34:30 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:34:30 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:34:
30 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
62809 
Sep 16 18:34:30 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:34:30 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 62809
twice, 
ignoring second one. 
Sep 16 18:34:31 localhost l2tpd[7736]: ourtid = 
50806, entropy_buf = c676 
Sep 16 18:34:31 localhost l2tpd[7736]: 
ourcid = 61809, entropy_buf = f171 
Sep 16 18:34:31 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:34:
31 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 50806,

call 61809 
Sep 16 18:34:31 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:34:31 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:34:31 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:34:31 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:34:31 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:34:31 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:34:31 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:34:
31 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
62809 
Sep 16 18:34:31 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:34:31 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 62809
twice, 
ignoring second one. 
Sep 16 18:34:32 localhost l2tpd[7736]: ourtid = 
11102, entropy_buf = 2b5e 
Sep 16 18:34:32 localhost l2tpd[7736]: 
ourcid = 6793, entropy_buf = 1a89 
Sep 16 18:34:32 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:34:
32 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 11102,

call 6793 
Sep 16 18:34:32 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:34:32 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:34:32 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:34:32 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:34:32 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:34:32 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:34:32 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:34:
32 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
62809 
Sep 16 18:34:32 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:34:32 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 62809
twice, 
ignoring second one. 
Sep 16 18:34:33 localhost l2tpd[7736]: ourtid = 
23853, entropy_buf = 5d2d 
Sep 16 18:34:33 localhost l2tpd[7736]: 
ourcid = 30279, entropy_buf = 7647 
Sep 16 18:34:33 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:34:
33 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 23853,

call 30279 
Sep 16 18:34:33 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:34:33 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:34:33 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:34:33 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:34:33 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:34:33 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:34:33 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:34:
33 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
62809 
Sep 16 18:34:33 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:34:33 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 62809
twice, 
ignoring second one. 
Sep 16 18:34:34 localhost l2tpd[7736]: ourtid = 
26741, entropy_buf = 6875 
Sep 16 18:34:34 localhost l2tpd[7736]: 
ourcid = 53138, entropy_buf = cf92 
Sep 16 18:34:34 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:34:
34 localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:34:34 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:34:34 localhost 
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 24649.  
Closing. 
Sep 16 18:34:34 localhost l2tpd[7736]: call_close : 
Connection 62809 closed to
10.1.1.16, port 1701 (Timeout) 
Sep 16 18:34:
35 localhost l2tpd[7736]: ourtid = 4070, entropy_buf = fe6 
Sep 16 18:
34:35 localhost l2tpd[7736]: ourcid = 49480, entropy_buf = c148 
Sep 16 
18:34:35 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 
1, Nr = 0 
Sep 16 18:34:35 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:34:35 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:34:36 localhost l2tpd[7736]: ourtid = 43095, 
entropy_buf = a857 
Sep 16 18:34:36 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:34:36 
localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:34:36 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:34:37 localhost 
l2tpd[7736]: ourtid = 59354, entropy_buf = e7da 
Sep 16 18:34:37 
localhost l2tpd[7736]: ourcid = 3100, entropy_buf = c1c 
Sep 16 18:34:
37 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr = 
0 
Sep 16 18:34:37 localhost l2tpd[7736]: check_control: Received out 
of order control
packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:34:
37 localhost l2tpd[7736]: handle_packet: bad control packet! 
Sep 16 18:
34:38 localhost l2tpd[7736]: ourtid = 62734, entropy_buf = f50e 
Sep 16 
18:34:38 localhost l2tpd[7736]: ourcid = 48223, entropy_buf = bc5f 
Sep 
16 18:34:38 localhost l2tpd[7736]: check_control: control, cid = 0, Ns 
= 1, Nr = 0 
Sep 16 18:34:38 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:34:38 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:34:39 localhost l2tpd[7736]: control_xmit: Unable to 
deliver closing
message for tunnel 24649. Destroying anyway. 
Sep 16 18:
35:09 localhost l2tpd[7736]: ourtid = 32714, entropy_buf = 7fca 
Sep 16 
18:35:09 localhost l2tpd[7736]: ourcid = 9284, entropy_buf = 2444 
Sep 
16 18:35:09 localhost l2tpd[7736]: check_control: control, cid = 0, Ns 
= 0, Nr = 0 
Sep 16 18:35:09 localhost l2tpd[7736]: handle_avps: 
handling avp's for tunnel 32714,
call 9284 
Sep 16 18:35:09 localhost 
l2tpd[7736]: message_type_avp: message type 1
(Start-Control-Connection-
Request) 
Sep 16 18:35:09 localhost l2tpd[7736]: protocol_version_avp: 
peer is using version
1, revision 0. 
Sep 16 18:35:09 localhost l2tpd
[7736]: framing_caps_avp: supported peer frames:async
sync 
Sep 16 18:
35:09 localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:  

Sep 16 18:35:09 localhost l2tpd[7736]: firmware_rev_avp: peer reports 
firmware
version 1680 (0x0690) 
Sep 16 18:35:09 localhost l2tpd[7736]: 
hostname_avp: peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:09 
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com' 

Sep 16 18:35:09 localhost l2tpd[7736]: assigned_tunnel_avp: using 
peer's tunnel 45732 
Sep 16 18:35:09 localhost l2tpd[7736]: 
receive_window_size_avp: peer wants RWS of 4.
 Will use flow control. 

Sep 16 18:35:10 localhost l2tpd[7736]: ourtid = 57153, entropy_buf = 
df41 
Sep 16 18:35:10 localhost l2tpd[7736]: ourcid = 33832, 
entropy_buf = 8428 
Sep 16 18:35:10 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:35:10 
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 57153,

call 33832 
Sep 16 18:35:10 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:35:10 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:35:10 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:35:10 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:35:10 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:35:10 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:10 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:35:
10 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
45732 
Sep 16 18:35:10 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:35:10 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 45732
twice, 
ignoring second one. 
Sep 16 18:35:11 localhost l2tpd[7736]: ourtid = 
1496, entropy_buf = 5d8 
Sep 16 18:35:11 localhost l2tpd[7736]: ourcid 
= 25447, entropy_buf = 6367 
Sep 16 18:35:11 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:35:11 
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 1496,

call 25447 
Sep 16 18:35:11 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:35:11 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:35:11 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:35:11 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:35:11 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:35:11 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:11 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:35:
11 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
45732 
Sep 16 18:35:11 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:35:11 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 45732
twice, 
ignoring second one. 
Sep 16 18:35:12 localhost l2tpd[7736]: ourtid = 
47166, entropy_buf = b83e 
Sep 16 18:35:12 localhost l2tpd[7736]: 
ourcid = 28630, entropy_buf = 6fd6 
Sep 16 18:35:12 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:35:
12 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 47166,

call 28630 
Sep 16 18:35:12 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:35:12 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:35:12 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:35:12 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:35:12 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:35:12 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:12 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:35:
12 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
45732 
Sep 16 18:35:12 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:35:12 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 45732
twice, 
ignoring second one. 
Sep 16 18:35:13 localhost l2tpd[7736]: ourtid = 
23583, entropy_buf = 5c1f 
Sep 16 18:35:13 localhost l2tpd[7736]: 
ourcid = 39265, entropy_buf = 9961 
Sep 16 18:35:13 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:35:
13 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 23583,

call 39265 
Sep 16 18:35:13 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:35:13 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:35:13 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:35:13 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:35:13 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:35:13 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:13 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:35:
13 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
45732 
Sep 16 18:35:13 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:35:13 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 45732
twice, 
ignoring second one. 
Sep 16 18:35:14 localhost l2tpd[7736]: ourtid = 
49309, entropy_buf = c09d 
Sep 16 18:35:14 localhost l2tpd[7736]: 
ourcid = 26051, entropy_buf = 65c3 
Sep 16 18:35:14 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:35:
14 localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:35:14 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:35:14 localhost 
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 32714.  
Closing. 
Sep 16 18:35:14 localhost l2tpd[7736]: call_close : 
Connection 45732 closed to
10.1.1.16, port 1701 (Timeout) 
Sep 16 18:35:
15 localhost l2tpd[7736]: ourtid = 62029, entropy_buf = f24d 
Sep 16 18:
35:15 localhost l2tpd[7736]: ourcid = 9935, entropy_buf = 26cf 
Sep 16 
18:35:15 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 
1, Nr = 0 
Sep 16 18:35:15 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:35:15 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:35:16 localhost l2tpd[7736]: ourtid = 56736, 
entropy_buf = dda0 
Sep 16 18:35:16 localhost l2tpd[7736]: ourcid = 
33796, entropy_buf = 8404 
Sep 16 18:35:16 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:35:16 
localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:35:16 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:35:17 localhost 
l2tpd[7736]: ourtid = 24976, entropy_buf = 6190 
Sep 16 18:35:17 
localhost l2tpd[7736]: ourcid = 37771, entropy_buf = 938b 
Sep 16 18:35:
17 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr = 
0 
Sep 16 18:35:17 localhost l2tpd[7736]: check_control: Received out 
of order control
packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:35:
17 localhost l2tpd[7736]: handle_packet: bad control packet! 
Sep 16 18:
35:18 localhost l2tpd[7736]: ourtid = 36360, entropy_buf = 8e08 
Sep 16 
18:35:18 localhost l2tpd[7736]: ourcid = 15331, entropy_buf = 3be3 
Sep 
16 18:35:18 localhost l2tpd[7736]: check_control: control, cid = 0, Ns 
= 1, Nr = 0 
Sep 16 18:35:18 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:35:18 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:35:19 localhost l2tpd[7736]: control_xmit: Unable to 
deliver closing
message for tunnel 32714. Destroying anyway. 
Sep 16 18:
35:49 localhost l2tpd[7736]: ourtid = 27725, entropy_buf = 6c4d 
Sep 16 
18:35:49 localhost l2tpd[7736]: ourcid = 48270, entropy_buf = bc8e 
Sep 
16 18:35:49 localhost l2tpd[7736]: check_control: control, cid = 0, Ns 
= 0, Nr = 0 
Sep 16 18:35:49 localhost l2tpd[7736]: handle_avps: 
handling avp's for tunnel 27725,
call 48270 
Sep 16 18:35:49 localhost 
l2tpd[7736]: message_type_avp: message type 1
(Start-Control-Connection-
Request) 
Sep 16 18:35:49 localhost l2tpd[7736]: protocol_version_avp: 
peer is using version
1, revision 0. 
Sep 16 18:35:49 localhost l2tpd
[7736]: framing_caps_avp: supported peer frames:async
sync 
Sep 16 18:
35:49 localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:  

Sep 16 18:35:49 localhost l2tpd[7736]: firmware_rev_avp: peer reports 
firmware
version 1680 (0x0690) 
Sep 16 18:35:49 localhost l2tpd[7736]: 
hostname_avp: peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:49 
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com' 

Sep 16 18:35:49 localhost l2tpd[7736]: assigned_tunnel_avp: using 
peer's tunnel 28503 
Sep 16 18:35:49 localhost l2tpd[7736]: 
receive_window_size_avp: peer wants RWS of 4.
 Will use flow control. 

Sep 16 18:35:50 localhost l2tpd[7736]: ourtid = 9974, entropy_buf = 
26f6 
Sep 16 18:35:50 localhost l2tpd[7736]: ourcid = 38262, 
entropy_buf = 9576 
Sep 16 18:35:50 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:35:50 
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 9974,

call 38262 
Sep 16 18:35:50 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:35:50 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:35:50 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:35:50 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:35:50 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:35:50 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:50 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:35:
50 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
28503 
Sep 16 18:35:50 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:35:50 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 28503
twice, 
ignoring second one. 
Sep 16 18:35:51 localhost l2tpd[7736]: ourtid = 
47292, entropy_buf = b8bc 
Sep 16 18:35:51 localhost l2tpd[7736]: 
ourcid = 9471, entropy_buf = 24ff 
Sep 16 18:35:51 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:35:
51 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 47292,

call 9471 
Sep 16 18:35:51 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:35:51 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:35:51 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:35:51 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:35:51 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:35:51 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:51 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:35:
51 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
28503 
Sep 16 18:35:51 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:35:51 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 28503
twice, 
ignoring second one. 
Sep 16 18:35:52 localhost l2tpd[7736]: ourtid = 
63214, entropy_buf = f6ee 
Sep 16 18:35:52 localhost l2tpd[7736]: 
ourcid = 16068, entropy_buf = 3ec4 
Sep 16 18:35:52 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:35:
52 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 63214,

call 16068 
Sep 16 18:35:52 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:35:52 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:35:52 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:35:52 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:35:52 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:35:52 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:52 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:35:
52 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
28503 
Sep 16 18:35:52 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:35:52 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 28503
twice, 
ignoring second one. 
Sep 16 18:35:53 localhost l2tpd[7736]: ourtid = 
21928, entropy_buf = 55a8 
Sep 16 18:35:53 localhost l2tpd[7736]: 
ourcid = 3099, entropy_buf = c1b 
Sep 16 18:35:53 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0 
Sep 16 18:35:
53 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 21928,

call 3099 
Sep 16 18:35:53 localhost l2tpd[7736]: message_type_avp: 
message type 1
(Start-Control-Connection-Request) 
Sep 16 18:35:53 
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1, 
revision 0. 
Sep 16 18:35:53 localhost l2tpd[7736]: framing_caps_avp: 
supported peer frames:async
sync 
Sep 16 18:35:53 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:  
Sep 16 18:35:53 
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version 
1680 (0x0690) 
Sep 16 18:35:53 localhost l2tpd[7736]: hostname_avp: 
peer reports hostname
'eugenio-laptop' 
Sep 16 18:35:53 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com' 
Sep 16 18:35:
53 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel 
28503 
Sep 16 18:35:53 localhost l2tpd[7736]: receive_window_size_avp: 
peer wants RWS of 4.
 Will use flow control. 
Sep 16 18:35:53 localhost 
l2tpd[7736]: control_finish: Peer requested tunnel 28503
twice, 
ignoring second one. 
Sep 16 18:35:54 localhost l2tpd[7736]: ourtid = 
12875, entropy_buf = 324b 
Sep 16 18:35:54 localhost l2tpd[7736]: 
ourcid = 8447, entropy_buf = 20ff 
Sep 16 18:35:54 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:35:
54 localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:35:54 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:35:54 localhost 
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 27725.  
Closing. 
Sep 16 18:35:54 localhost l2tpd[7736]: call_close : 
Connection 28503 closed to
10.1.1.16, port 1701 (Timeout) 
Sep 16 18:35:
55 localhost l2tpd[7736]: ourtid = 52958, entropy_buf = cede 
Sep 16 18:
35:55 localhost l2tpd[7736]: ourcid = 34625, entropy_buf = 8741 
Sep 16 
18:35:55 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 
1, Nr = 0 
Sep 16 18:35:55 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:35:55 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:35:56 localhost l2tpd[7736]: ourtid = 2928, 
entropy_buf = b70 
Sep 16 18:35:56 localhost l2tpd[7736]: ourcid = 
46205, entropy_buf = b47d 
Sep 16 18:35:56 localhost l2tpd[7736]: 
check_control: control, cid = 0, Ns = 1, Nr = 0 
Sep 16 18:35:56 
localhost l2tpd[7736]: check_control: Received out of order control

packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:35:56 localhost l2tpd
[7736]: handle_packet: bad control packet! 
Sep 16 18:35:57 localhost 
l2tpd[7736]: ourtid = 30482, entropy_buf = 7712 
Sep 16 18:35:57 
localhost l2tpd[7736]: ourcid = 2984, entropy_buf = ba8 
Sep 16 18:35:
57 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr = 
0 
Sep 16 18:35:57 localhost l2tpd[7736]: check_control: Received out 
of order control
packet on tunnel -1 (got 1, expected 0) 
Sep 16 18:35:
57 localhost l2tpd[7736]: handle_packet: bad control packet! 
Sep 16 18:
35:58 localhost l2tpd[7736]: ourtid = 20679, entropy_buf = 50c7 
Sep 16 
18:35:58 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 
1, Nr = 0 
Sep 16 18:35:58 localhost l2tpd[7736]: check_control: 
Received out of order control
packet on tunnel -1 (got 1, expected 0) 

Sep 16 18:35:58 localhost l2tpd[7736]: handle_packet: bad control 
packet! 
Sep 16 18:35:59 localhost l2tpd[7736]: control_xmit: Unable to 
deliver closing
message for tunnel 27725. Destroying anyway. 

Can 
somebody help me to solve this problem?

PS. Does somebody know a right 
command to start the xl2tpd daemon(the client machine
uses xl2tpd)?
Because often the daemon doesn't want to startup.

Thank you all in 
advance.


_______________________________________________

Tiscali Photo

Promo Estate 2008. Non perdere tempo! Tutto a 0.12 € 

http://photo.tiscali.it/


More information about the Users mailing list