[Openswan Users] Help request for IPSec/L2TP starting daemon
mfemm at tiscali.it
mfemm at tiscali.it
Wed Sep 17 13:10:17 EDT 2008
Dear all,
I'm trying to establish an IPsec\l2tpd VPN Roadwarrior
connection to an Openswan
gateway to a public IP address NAT(141.250.x.
y) for my BSC thesis.
The server machine is a Linux Debian 2.4.27 with
Openswan 2.4.6(netkey).
By the gateway I need to assign to roadwarriors
these two virtual ip
address(a.b.c.51 and a.b.c.52), while the internal
IP address(over the ppp
interface) of the gateway is a.b.c.56.
Here are
the configuration files:
ipsec.conf
config setup
interfaces=%
defaultroute
virtual_private=%v4:192.168.0.0/16,%v4:10.1.0.0/16
klipsdebug=none
plutodebug=none
conn prova
left=%defaultroute
leftnexthop=141.250.40.30
right=%any
pfs=no
rightsubnet=vhost:%no,%priv
rightprotoport=17/%any
leftprotoport=17/1701
authby=secret
type=tunnel
auto=start
l2tpd.conf
ip
range = a.b.c.51 - a.b.c.52
local ip = 141.250.40.56
length bit =
yes
require chap = yes
refuse pap = yes
name = nameserver
pppoptfile=/etc/ppp/options.l2tpd.
lns
option.l2tp.lns
ms-dns a.b.c.93
ms-dns a.b.c.93
auth
crtscts
lock
mru 1200
mtu 1200
proxyarp
ipcp-accept-local
ipcp-accept-remote
Now, with WinXP client I got this problem: i can establish the IPsec
tunnel without
problem, but during l2tpd negotiation ERROR 678 occurs.
I've checked many times
username and passwords, but they're right.
During negotiation with winXP client,sniffing both in server machine
than in client
machine, I see the right packets exchanging during IPsec
phases, but then I can only
see ESP packets from client to server, but
no response from this last one.
with Linux client I got pretty much
the same problem: once the IPsec tunnel is
established, I can't finish
the l2tpd negotiation.
Here's the syslog
Sep 16 18:31:34 localhost
l2tpd[7736]: This binary does not support kernel L2TP.
Sep 16 18:31:34
localhost l2tpd[7736]: l2tpd version 0.69 started on attila PID:7736
Sep 16 18:31:34 localhost l2tpd[7736]: Linux version 2.4.27-3-386 on a
i686,
listening on IP address 0.0.0.0, port 1701
Sep 16 18:33:09
localhost l2tpd[7736]: ourtid = 46577, entropy_buf = b5f1
Sep 16 18:33:
09 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 0, Nr =
0
Sep 16 18:33:09 localhost l2tpd[7736]: handle_avps: handling avp's
for tunnel 46577,
call 0
Sep 16 18:33:09 localhost l2tpd[7736]:
message_type_avp: message type 1
(Start-Control-Connection-Request)
Sep 16 18:33:09 localhost l2tpd[7736]: protocol_version_avp: peer is
using version
1, revision 0.
Sep 16 18:33:09 localhost l2tpd[7736]:
framing_caps_avp: supported peer frames:async
sync
Sep 16 18:33:09
localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:
Sep
16 18:33:09 localhost l2tpd[7736]: firmware_rev_avp: peer reports
firmware
version 1680 (0x0690)
Sep 16 18:33:09 localhost l2tpd[7736]:
hostname_avp: peer reports hostname
'eugenio-laptop'
Sep 16 18:33:09
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:33:09 localhost l2tpd[7736]: assigned_tunnel_avp: using
peer's tunnel 61026
Sep 16 18:33:09 localhost l2tpd[7736]:
receive_window_size_avp: peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:10 localhost l2tpd[7736]: ourtid = 36682, entropy_buf =
8f4a
Sep 16 18:33:10 localhost l2tpd[7736]: check_control: control,
cid = 0, Ns = 0, Nr = 0
Sep 16 18:33:10 localhost l2tpd[7736]:
handle_avps: handling avp's for tunnel 36682,
call 0
Sep 16 18:33:10
localhost l2tpd[7736]: message_type_avp: message type 1
(Start-Control-
Connection-Request)
Sep 16 18:33:10 localhost l2tpd[7736]:
protocol_version_avp: peer is using version
1, revision 0.
Sep 16 18:
33:10 localhost l2tpd[7736]: framing_caps_avp: supported peer frames:
async
sync
Sep 16 18:33:10 localhost l2tpd[7736]: bearer_caps_avp:
supported peer bearers:
Sep 16 18:33:10 localhost l2tpd[7736]:
firmware_rev_avp: peer reports firmware
version 1680 (0x0690)
Sep 16
18:33:10 localhost l2tpd[7736]: hostname_avp: peer reports hostname
'eugenio-laptop'
Sep 16 18:33:10 localhost l2tpd[7736]: vendor_avp:
peer reports vendor 'xelerance.com'
Sep 16 18:33:10 localhost l2tpd
[7736]: assigned_tunnel_avp: using peer's tunnel 61026
Sep 16 18:33:10
localhost l2tpd[7736]: receive_window_size_avp: peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:10 localhost l2tpd[7736]:
control_finish: Peer requested tunnel 61026
twice, ignoring second
one.
Sep 16 18:33:11 localhost l2tpd[7736]: ourtid = 21671,
entropy_buf = 54a7
Sep 16 18:33:11 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:33:11
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 21671,
call 0
Sep 16 18:33:11 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:33:11
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:33:11 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:33:11 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:33:11
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:33:11 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:33:11 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:33:
11 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
61026
Sep 16 18:33:11 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:11 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 61026
twice,
ignoring second one.
Sep 16 18:33:12 localhost l2tpd[7736]: ourtid =
59594, entropy_buf = e8ca
Sep 16 18:33:12 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:33:12
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 59594,
call 0
Sep 16 18:33:12 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:33:12
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:33:12 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:33:12 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:33:12
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:33:12 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:33:12 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:33:
12 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
61026
Sep 16 18:33:12 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:12 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 61026
twice,
ignoring second one.
Sep 16 18:33:13 localhost l2tpd[7736]: ourtid =
63165, entropy_buf = f6bd
Sep 16 18:33:13 localhost l2tpd[7736]:
ourcid = 39106, entropy_buf = 98c2
Sep 16 18:33:13 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:33:
13 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 63165,
call 39106
Sep 16 18:33:13 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:33:13
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:33:13 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:33:13 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:33:13
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:33:13 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:33:13 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:33:
13 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
61026
Sep 16 18:33:13 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:13 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 61026
twice,
ignoring second one.
Sep 16 18:33:14 localhost l2tpd[7736]: ourtid =
19333, entropy_buf = 4b85
Sep 16 18:33:14 localhost l2tpd[7736]:
ourcid = 50841, entropy_buf = c699
Sep 16 18:33:14 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:33:
14 localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:14 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:33:14 localhost
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 46577.
Closing.
Sep 16 18:33:14 localhost l2tpd[7736]: call_close :
Connection 61026 closed to
10.1.1.16, port 1701 (Timeout)
Sep 16 18:33:
15 localhost l2tpd[7736]: ourtid = 48466, entropy_buf = bd52
Sep 16 18:
33:15 localhost l2tpd[7736]: ourcid = 62798, entropy_buf = f54e
Sep 16
18:33:15 localhost l2tpd[7736]: check_control: control, cid = 0, Ns =
1, Nr = 0
Sep 16 18:33:15 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:15 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:33:16 localhost l2tpd[7736]: ourtid = 38687,
entropy_buf = 971f
Sep 16 18:33:16 localhost l2tpd[7736]: ourcid =
48604, entropy_buf = bddc
Sep 16 18:33:16 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:33:16
localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:16 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:33:17 localhost
l2tpd[7736]: ourtid = 12198, entropy_buf = 2fa6
Sep 16 18:33:17
localhost l2tpd[7736]: ourcid = 31580, entropy_buf = 7b5c
Sep 16 18:33:
17 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr =
0
Sep 16 18:33:17 localhost l2tpd[7736]: check_control: Received out
of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:
17 localhost l2tpd[7736]: handle_packet: bad control packet!
Sep 16 18:
33:18 localhost l2tpd[7736]: ourtid = 29673, entropy_buf = 73e9
Sep 16
18:33:18 localhost l2tpd[7736]: ourcid = 30859, entropy_buf = 788b
Sep
16 18:33:18 localhost l2tpd[7736]: check_control: control, cid = 0, Ns
= 1, Nr = 0
Sep 16 18:33:18 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:18 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:33:19 localhost l2tpd[7736]: control_xmit: Unable to
deliver closing
message for tunnel 46577. Destroying anyway.
Sep 16 18:
33:49 localhost l2tpd[7736]: ourtid = 38628, entropy_buf = 96e4
Sep 16
18:33:49 localhost l2tpd[7736]: ourcid = 47116, entropy_buf = b80c
Sep
16 18:33:49 localhost l2tpd[7736]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Sep 16 18:33:49 localhost l2tpd[7736]: handle_avps:
handling avp's for tunnel 38628,
call 47116
Sep 16 18:33:49 localhost
l2tpd[7736]: message_type_avp: message type 1
(Start-Control-Connection-
Request)
Sep 16 18:33:49 localhost l2tpd[7736]: protocol_version_avp:
peer is using version
1, revision 0.
Sep 16 18:33:49 localhost l2tpd
[7736]: framing_caps_avp: supported peer frames:async
sync
Sep 16 18:
33:49 localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:33:49 localhost l2tpd[7736]: firmware_rev_avp: peer reports
firmware
version 1680 (0x0690)
Sep 16 18:33:49 localhost l2tpd[7736]:
hostname_avp: peer reports hostname
'eugenio-laptop'
Sep 16 18:33:49
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:33:49 localhost l2tpd[7736]: assigned_tunnel_avp: using
peer's tunnel 19744
Sep 16 18:33:49 localhost l2tpd[7736]:
receive_window_size_avp: peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:50 localhost l2tpd[7736]: ourtid = 59643, entropy_buf =
e8fb
Sep 16 18:33:50 localhost l2tpd[7736]: check_control: control,
cid = 0, Ns = 0, Nr = 0
Sep 16 18:33:50 localhost l2tpd[7736]:
handle_avps: handling avp's for tunnel 59643,
call 0
Sep 16 18:33:50
localhost l2tpd[7736]: message_type_avp: message type 1
(Start-Control-
Connection-Request)
Sep 16 18:33:50 localhost l2tpd[7736]:
protocol_version_avp: peer is using version
1, revision 0.
Sep 16 18:
33:50 localhost l2tpd[7736]: framing_caps_avp: supported peer frames:
async
sync
Sep 16 18:33:50 localhost l2tpd[7736]: bearer_caps_avp:
supported peer bearers:
Sep 16 18:33:50 localhost l2tpd[7736]:
firmware_rev_avp: peer reports firmware
version 1680 (0x0690)
Sep 16
18:33:50 localhost l2tpd[7736]: hostname_avp: peer reports hostname
'eugenio-laptop'
Sep 16 18:33:50 localhost l2tpd[7736]: vendor_avp:
peer reports vendor 'xelerance.com'
Sep 16 18:33:50 localhost l2tpd
[7736]: assigned_tunnel_avp: using peer's tunnel 19744
Sep 16 18:33:50
localhost l2tpd[7736]: receive_window_size_avp: peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:50 localhost l2tpd[7736]:
control_finish: Peer requested tunnel 19744
twice, ignoring second
one.
Sep 16 18:33:51 localhost l2tpd[7736]: ourtid = 46522,
entropy_buf = b5ba
Sep 16 18:33:51 localhost l2tpd[7736]: ourcid =
30746, entropy_buf = 781a
Sep 16 18:33:51 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:33:51
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 46522,
call 30746
Sep 16 18:33:51 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:33:51
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:33:51 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:33:51 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:33:51
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:33:51 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:33:51 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:33:
51 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
19744
Sep 16 18:33:51 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:51 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 19744
twice,
ignoring second one.
Sep 16 18:33:52 localhost l2tpd[7736]: ourtid =
54743, entropy_buf = d5d7
Sep 16 18:33:52 localhost l2tpd[7736]:
ourcid = 19455, entropy_buf = 4bff
Sep 16 18:33:52 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:33:
52 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 54743,
call 19455
Sep 16 18:33:52 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:33:52
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:33:52 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:33:52 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:33:52
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:33:52 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:33:52 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:33:
52 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
19744
Sep 16 18:33:52 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:52 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 19744
twice,
ignoring second one.
Sep 16 18:33:53 localhost l2tpd[7736]: ourtid =
25872, entropy_buf = 6510
Sep 16 18:33:53 localhost l2tpd[7736]:
ourcid = 16552, entropy_buf = 40a8
Sep 16 18:33:53 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:33:
53 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 25872,
call 16552
Sep 16 18:33:53 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:33:53
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:33:53 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:33:53 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:33:53
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:33:53 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:33:53 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:33:
53 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
19744
Sep 16 18:33:53 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:33:53 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 19744
twice,
ignoring second one.
Sep 16 18:33:54 localhost l2tpd[7736]: ourtid =
53770, entropy_buf = d20a
Sep 16 18:33:54 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:33:54
localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:54 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:33:54 localhost
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 38628.
Closing.
Sep 16 18:33:54 localhost l2tpd[7736]: call_close :
Connection 19744 closed to
10.1.1.16, port 1701 (Timeout)
Sep 16 18:33:
55 localhost l2tpd[7736]: ourtid = 21746, entropy_buf = 54f2
Sep 16 18:
33:55 localhost l2tpd[7736]: ourcid = 1616, entropy_buf = 650
Sep 16
18:33:55 localhost l2tpd[7736]: check_control: control, cid = 0, Ns =
1, Nr = 0
Sep 16 18:33:55 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:55 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:33:56 localhost l2tpd[7736]: ourtid = 48033,
entropy_buf = bba1
Sep 16 18:33:56 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:33:56
localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:56 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:33:57 localhost
l2tpd[7736]: ourtid = 35316, entropy_buf = 89f4
Sep 16 18:33:57
localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:33:57 localhost l2tpd[7736]: check_control: Received out of
order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:57
localhost l2tpd[7736]: handle_packet: bad control packet!
Sep 16 18:33:
58 localhost l2tpd[7736]: ourtid = 28891, entropy_buf = 70db
Sep 16 18:
33:58 localhost l2tpd[7736]: ourcid = 61186, entropy_buf = ef02
Sep 16
18:33:58 localhost l2tpd[7736]: check_control: control, cid = 0, Ns =
1, Nr = 0
Sep 16 18:33:58 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:33:58 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:33:59 localhost l2tpd[7736]: control_xmit: Unable to
deliver closing
message for tunnel 38628. Destroying anyway.
Sep 16 18:
34:29 localhost l2tpd[7736]: ourtid = 24649, entropy_buf = 6049
Sep 16
18:34:29 localhost l2tpd[7736]: ourcid = 28185, entropy_buf = 6e19
Sep
16 18:34:29 localhost l2tpd[7736]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Sep 16 18:34:29 localhost l2tpd[7736]: handle_avps:
handling avp's for tunnel 24649,
call 28185
Sep 16 18:34:29 localhost
l2tpd[7736]: message_type_avp: message type 1
(Start-Control-Connection-
Request)
Sep 16 18:34:29 localhost l2tpd[7736]: protocol_version_avp:
peer is using version
1, revision 0.
Sep 16 18:34:29 localhost l2tpd
[7736]: framing_caps_avp: supported peer frames:async
sync
Sep 16 18:
34:29 localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:34:29 localhost l2tpd[7736]: firmware_rev_avp: peer reports
firmware
version 1680 (0x0690)
Sep 16 18:34:29 localhost l2tpd[7736]:
hostname_avp: peer reports hostname
'eugenio-laptop'
Sep 16 18:34:29
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:34:29 localhost l2tpd[7736]: assigned_tunnel_avp: using
peer's tunnel 62809
Sep 16 18:34:29 localhost l2tpd[7736]:
receive_window_size_avp: peer wants RWS of 4.
Will use flow control.
Sep 16 18:34:30 localhost l2tpd[7736]: ourtid = 40729, entropy_buf =
9f19
Sep 16 18:34:30 localhost l2tpd[7736]: ourcid = 28981,
entropy_buf = 7135
Sep 16 18:34:30 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:34:30
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 40729,
call 28981
Sep 16 18:34:30 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:34:30
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:34:30 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:34:30 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:34:30
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:34:30 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:34:30 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:34:
30 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
62809
Sep 16 18:34:30 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:34:30 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 62809
twice,
ignoring second one.
Sep 16 18:34:31 localhost l2tpd[7736]: ourtid =
50806, entropy_buf = c676
Sep 16 18:34:31 localhost l2tpd[7736]:
ourcid = 61809, entropy_buf = f171
Sep 16 18:34:31 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:34:
31 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 50806,
call 61809
Sep 16 18:34:31 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:34:31
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:34:31 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:34:31 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:34:31
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:34:31 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:34:31 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:34:
31 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
62809
Sep 16 18:34:31 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:34:31 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 62809
twice,
ignoring second one.
Sep 16 18:34:32 localhost l2tpd[7736]: ourtid =
11102, entropy_buf = 2b5e
Sep 16 18:34:32 localhost l2tpd[7736]:
ourcid = 6793, entropy_buf = 1a89
Sep 16 18:34:32 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:34:
32 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 11102,
call 6793
Sep 16 18:34:32 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:34:32
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:34:32 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:34:32 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:34:32
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:34:32 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:34:32 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:34:
32 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
62809
Sep 16 18:34:32 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:34:32 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 62809
twice,
ignoring second one.
Sep 16 18:34:33 localhost l2tpd[7736]: ourtid =
23853, entropy_buf = 5d2d
Sep 16 18:34:33 localhost l2tpd[7736]:
ourcid = 30279, entropy_buf = 7647
Sep 16 18:34:33 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:34:
33 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 23853,
call 30279
Sep 16 18:34:33 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:34:33
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:34:33 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:34:33 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:34:33
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:34:33 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:34:33 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:34:
33 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
62809
Sep 16 18:34:33 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:34:33 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 62809
twice,
ignoring second one.
Sep 16 18:34:34 localhost l2tpd[7736]: ourtid =
26741, entropy_buf = 6875
Sep 16 18:34:34 localhost l2tpd[7736]:
ourcid = 53138, entropy_buf = cf92
Sep 16 18:34:34 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:34:
34 localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:34:34 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:34:34 localhost
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 24649.
Closing.
Sep 16 18:34:34 localhost l2tpd[7736]: call_close :
Connection 62809 closed to
10.1.1.16, port 1701 (Timeout)
Sep 16 18:34:
35 localhost l2tpd[7736]: ourtid = 4070, entropy_buf = fe6
Sep 16 18:
34:35 localhost l2tpd[7736]: ourcid = 49480, entropy_buf = c148
Sep 16
18:34:35 localhost l2tpd[7736]: check_control: control, cid = 0, Ns =
1, Nr = 0
Sep 16 18:34:35 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:34:35 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:34:36 localhost l2tpd[7736]: ourtid = 43095,
entropy_buf = a857
Sep 16 18:34:36 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:34:36
localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:34:36 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:34:37 localhost
l2tpd[7736]: ourtid = 59354, entropy_buf = e7da
Sep 16 18:34:37
localhost l2tpd[7736]: ourcid = 3100, entropy_buf = c1c
Sep 16 18:34:
37 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr =
0
Sep 16 18:34:37 localhost l2tpd[7736]: check_control: Received out
of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:34:
37 localhost l2tpd[7736]: handle_packet: bad control packet!
Sep 16 18:
34:38 localhost l2tpd[7736]: ourtid = 62734, entropy_buf = f50e
Sep 16
18:34:38 localhost l2tpd[7736]: ourcid = 48223, entropy_buf = bc5f
Sep
16 18:34:38 localhost l2tpd[7736]: check_control: control, cid = 0, Ns
= 1, Nr = 0
Sep 16 18:34:38 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:34:38 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:34:39 localhost l2tpd[7736]: control_xmit: Unable to
deliver closing
message for tunnel 24649. Destroying anyway.
Sep 16 18:
35:09 localhost l2tpd[7736]: ourtid = 32714, entropy_buf = 7fca
Sep 16
18:35:09 localhost l2tpd[7736]: ourcid = 9284, entropy_buf = 2444
Sep
16 18:35:09 localhost l2tpd[7736]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Sep 16 18:35:09 localhost l2tpd[7736]: handle_avps:
handling avp's for tunnel 32714,
call 9284
Sep 16 18:35:09 localhost
l2tpd[7736]: message_type_avp: message type 1
(Start-Control-Connection-
Request)
Sep 16 18:35:09 localhost l2tpd[7736]: protocol_version_avp:
peer is using version
1, revision 0.
Sep 16 18:35:09 localhost l2tpd
[7736]: framing_caps_avp: supported peer frames:async
sync
Sep 16 18:
35:09 localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:09 localhost l2tpd[7736]: firmware_rev_avp: peer reports
firmware
version 1680 (0x0690)
Sep 16 18:35:09 localhost l2tpd[7736]:
hostname_avp: peer reports hostname
'eugenio-laptop'
Sep 16 18:35:09
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:09 localhost l2tpd[7736]: assigned_tunnel_avp: using
peer's tunnel 45732
Sep 16 18:35:09 localhost l2tpd[7736]:
receive_window_size_avp: peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:10 localhost l2tpd[7736]: ourtid = 57153, entropy_buf =
df41
Sep 16 18:35:10 localhost l2tpd[7736]: ourcid = 33832,
entropy_buf = 8428
Sep 16 18:35:10 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:35:10
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 57153,
call 33832
Sep 16 18:35:10 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:35:10
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:35:10 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:35:10 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:10
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:35:10 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:35:10 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:
10 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
45732
Sep 16 18:35:10 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:10 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 45732
twice,
ignoring second one.
Sep 16 18:35:11 localhost l2tpd[7736]: ourtid =
1496, entropy_buf = 5d8
Sep 16 18:35:11 localhost l2tpd[7736]: ourcid
= 25447, entropy_buf = 6367
Sep 16 18:35:11 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:35:11
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 1496,
call 25447
Sep 16 18:35:11 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:35:11
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:35:11 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:35:11 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:11
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:35:11 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:35:11 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:
11 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
45732
Sep 16 18:35:11 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:11 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 45732
twice,
ignoring second one.
Sep 16 18:35:12 localhost l2tpd[7736]: ourtid =
47166, entropy_buf = b83e
Sep 16 18:35:12 localhost l2tpd[7736]:
ourcid = 28630, entropy_buf = 6fd6
Sep 16 18:35:12 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:35:
12 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 47166,
call 28630
Sep 16 18:35:12 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:35:12
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:35:12 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:35:12 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:12
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:35:12 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:35:12 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:
12 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
45732
Sep 16 18:35:12 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:12 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 45732
twice,
ignoring second one.
Sep 16 18:35:13 localhost l2tpd[7736]: ourtid =
23583, entropy_buf = 5c1f
Sep 16 18:35:13 localhost l2tpd[7736]:
ourcid = 39265, entropy_buf = 9961
Sep 16 18:35:13 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:35:
13 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 23583,
call 39265
Sep 16 18:35:13 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:35:13
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:35:13 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:35:13 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:13
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:35:13 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:35:13 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:
13 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
45732
Sep 16 18:35:13 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:13 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 45732
twice,
ignoring second one.
Sep 16 18:35:14 localhost l2tpd[7736]: ourtid =
49309, entropy_buf = c09d
Sep 16 18:35:14 localhost l2tpd[7736]:
ourcid = 26051, entropy_buf = 65c3
Sep 16 18:35:14 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:35:
14 localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:14 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:35:14 localhost
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 32714.
Closing.
Sep 16 18:35:14 localhost l2tpd[7736]: call_close :
Connection 45732 closed to
10.1.1.16, port 1701 (Timeout)
Sep 16 18:35:
15 localhost l2tpd[7736]: ourtid = 62029, entropy_buf = f24d
Sep 16 18:
35:15 localhost l2tpd[7736]: ourcid = 9935, entropy_buf = 26cf
Sep 16
18:35:15 localhost l2tpd[7736]: check_control: control, cid = 0, Ns =
1, Nr = 0
Sep 16 18:35:15 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:15 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:35:16 localhost l2tpd[7736]: ourtid = 56736,
entropy_buf = dda0
Sep 16 18:35:16 localhost l2tpd[7736]: ourcid =
33796, entropy_buf = 8404
Sep 16 18:35:16 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:35:16
localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:16 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:35:17 localhost
l2tpd[7736]: ourtid = 24976, entropy_buf = 6190
Sep 16 18:35:17
localhost l2tpd[7736]: ourcid = 37771, entropy_buf = 938b
Sep 16 18:35:
17 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr =
0
Sep 16 18:35:17 localhost l2tpd[7736]: check_control: Received out
of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:
17 localhost l2tpd[7736]: handle_packet: bad control packet!
Sep 16 18:
35:18 localhost l2tpd[7736]: ourtid = 36360, entropy_buf = 8e08
Sep 16
18:35:18 localhost l2tpd[7736]: ourcid = 15331, entropy_buf = 3be3
Sep
16 18:35:18 localhost l2tpd[7736]: check_control: control, cid = 0, Ns
= 1, Nr = 0
Sep 16 18:35:18 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:18 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:35:19 localhost l2tpd[7736]: control_xmit: Unable to
deliver closing
message for tunnel 32714. Destroying anyway.
Sep 16 18:
35:49 localhost l2tpd[7736]: ourtid = 27725, entropy_buf = 6c4d
Sep 16
18:35:49 localhost l2tpd[7736]: ourcid = 48270, entropy_buf = bc8e
Sep
16 18:35:49 localhost l2tpd[7736]: check_control: control, cid = 0, Ns
= 0, Nr = 0
Sep 16 18:35:49 localhost l2tpd[7736]: handle_avps:
handling avp's for tunnel 27725,
call 48270
Sep 16 18:35:49 localhost
l2tpd[7736]: message_type_avp: message type 1
(Start-Control-Connection-
Request)
Sep 16 18:35:49 localhost l2tpd[7736]: protocol_version_avp:
peer is using version
1, revision 0.
Sep 16 18:35:49 localhost l2tpd
[7736]: framing_caps_avp: supported peer frames:async
sync
Sep 16 18:
35:49 localhost l2tpd[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:49 localhost l2tpd[7736]: firmware_rev_avp: peer reports
firmware
version 1680 (0x0690)
Sep 16 18:35:49 localhost l2tpd[7736]:
hostname_avp: peer reports hostname
'eugenio-laptop'
Sep 16 18:35:49
localhost l2tpd[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:49 localhost l2tpd[7736]: assigned_tunnel_avp: using
peer's tunnel 28503
Sep 16 18:35:49 localhost l2tpd[7736]:
receive_window_size_avp: peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:50 localhost l2tpd[7736]: ourtid = 9974, entropy_buf =
26f6
Sep 16 18:35:50 localhost l2tpd[7736]: ourcid = 38262,
entropy_buf = 9576
Sep 16 18:35:50 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:35:50
localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 9974,
call 38262
Sep 16 18:35:50 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:35:50
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:35:50 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:35:50 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:50
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:35:50 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:35:50 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:
50 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
28503
Sep 16 18:35:50 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:50 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 28503
twice,
ignoring second one.
Sep 16 18:35:51 localhost l2tpd[7736]: ourtid =
47292, entropy_buf = b8bc
Sep 16 18:35:51 localhost l2tpd[7736]:
ourcid = 9471, entropy_buf = 24ff
Sep 16 18:35:51 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:35:
51 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 47292,
call 9471
Sep 16 18:35:51 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:35:51
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:35:51 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:35:51 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:51
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:35:51 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:35:51 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:
51 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
28503
Sep 16 18:35:51 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:51 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 28503
twice,
ignoring second one.
Sep 16 18:35:52 localhost l2tpd[7736]: ourtid =
63214, entropy_buf = f6ee
Sep 16 18:35:52 localhost l2tpd[7736]:
ourcid = 16068, entropy_buf = 3ec4
Sep 16 18:35:52 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:35:
52 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 63214,
call 16068
Sep 16 18:35:52 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:35:52
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:35:52 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:35:52 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:52
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:35:52 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:35:52 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:
52 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
28503
Sep 16 18:35:52 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:52 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 28503
twice,
ignoring second one.
Sep 16 18:35:53 localhost l2tpd[7736]: ourtid =
21928, entropy_buf = 55a8
Sep 16 18:35:53 localhost l2tpd[7736]:
ourcid = 3099, entropy_buf = c1b
Sep 16 18:35:53 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 0, Nr = 0
Sep 16 18:35:
53 localhost l2tpd[7736]: handle_avps: handling avp's for tunnel 21928,
call 3099
Sep 16 18:35:53 localhost l2tpd[7736]: message_type_avp:
message type 1
(Start-Control-Connection-Request)
Sep 16 18:35:53
localhost l2tpd[7736]: protocol_version_avp: peer is using version
1,
revision 0.
Sep 16 18:35:53 localhost l2tpd[7736]: framing_caps_avp:
supported peer frames:async
sync
Sep 16 18:35:53 localhost l2tpd
[7736]: bearer_caps_avp: supported peer bearers:
Sep 16 18:35:53
localhost l2tpd[7736]: firmware_rev_avp: peer reports firmware
version
1680 (0x0690)
Sep 16 18:35:53 localhost l2tpd[7736]: hostname_avp:
peer reports hostname
'eugenio-laptop'
Sep 16 18:35:53 localhost l2tpd
[7736]: vendor_avp: peer reports vendor 'xelerance.com'
Sep 16 18:35:
53 localhost l2tpd[7736]: assigned_tunnel_avp: using peer's tunnel
28503
Sep 16 18:35:53 localhost l2tpd[7736]: receive_window_size_avp:
peer wants RWS of 4.
Will use flow control.
Sep 16 18:35:53 localhost
l2tpd[7736]: control_finish: Peer requested tunnel 28503
twice,
ignoring second one.
Sep 16 18:35:54 localhost l2tpd[7736]: ourtid =
12875, entropy_buf = 324b
Sep 16 18:35:54 localhost l2tpd[7736]:
ourcid = 8447, entropy_buf = 20ff
Sep 16 18:35:54 localhost l2tpd
[7736]: check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:35:
54 localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:54 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:35:54 localhost
l2tpd[7736]: control_xmit: Maximum retries exceeded for
tunnel 27725.
Closing.
Sep 16 18:35:54 localhost l2tpd[7736]: call_close :
Connection 28503 closed to
10.1.1.16, port 1701 (Timeout)
Sep 16 18:35:
55 localhost l2tpd[7736]: ourtid = 52958, entropy_buf = cede
Sep 16 18:
35:55 localhost l2tpd[7736]: ourcid = 34625, entropy_buf = 8741
Sep 16
18:35:55 localhost l2tpd[7736]: check_control: control, cid = 0, Ns =
1, Nr = 0
Sep 16 18:35:55 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:55 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:35:56 localhost l2tpd[7736]: ourtid = 2928,
entropy_buf = b70
Sep 16 18:35:56 localhost l2tpd[7736]: ourcid =
46205, entropy_buf = b47d
Sep 16 18:35:56 localhost l2tpd[7736]:
check_control: control, cid = 0, Ns = 1, Nr = 0
Sep 16 18:35:56
localhost l2tpd[7736]: check_control: Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:56 localhost l2tpd
[7736]: handle_packet: bad control packet!
Sep 16 18:35:57 localhost
l2tpd[7736]: ourtid = 30482, entropy_buf = 7712
Sep 16 18:35:57
localhost l2tpd[7736]: ourcid = 2984, entropy_buf = ba8
Sep 16 18:35:
57 localhost l2tpd[7736]: check_control: control, cid = 0, Ns = 1, Nr =
0
Sep 16 18:35:57 localhost l2tpd[7736]: check_control: Received out
of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:
57 localhost l2tpd[7736]: handle_packet: bad control packet!
Sep 16 18:
35:58 localhost l2tpd[7736]: ourtid = 20679, entropy_buf = 50c7
Sep 16
18:35:58 localhost l2tpd[7736]: check_control: control, cid = 0, Ns =
1, Nr = 0
Sep 16 18:35:58 localhost l2tpd[7736]: check_control:
Received out of order control
packet on tunnel -1 (got 1, expected 0)
Sep 16 18:35:58 localhost l2tpd[7736]: handle_packet: bad control
packet!
Sep 16 18:35:59 localhost l2tpd[7736]: control_xmit: Unable to
deliver closing
message for tunnel 27725. Destroying anyway.
Can
somebody help me to solve this problem?
PS. Does somebody know a right
command to start the xl2tpd daemon(the client machine
uses xl2tpd)?
Because often the daemon doesn't want to startup.
Thank you all in
advance.
_______________________________________________
Tiscali Photo
Promo Estate 2008. Non perdere tempo! Tutto a 0.12 €
http://photo.tiscali.it/
More information about the Users
mailing list