[Openswan Users] OpenSWAN + xl2tpd failing tunnel transmission

Jim Lake jlake at boingo.com
Mon Apr 18 17:05:09 EDT 2011


Updated configs, same results.

Any more ideas? :)

Thanks!

----
xl2tpd -D
-----
xl2tpd[28444]: IPsec SAref does not work with L2TP kernel mode yet, enabling forceuserspace=yes
xl2tpd[28444]: setsockopt recvref[22]: Protocol not available
xl2tpd[28444]: This binary does not support kernel L2TP.
xl2tpd[28444]: xl2tpd version xl2tpd-1.2.8 started on vpn-test PID:28444
xl2tpd[28444]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[28444]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[28444]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[28444]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[28444]: Listening on IP address 10.170.91.102, port 1701
xl2tpd[28444]: network_thread: recv packet from 204.147.92.175, size = 60, tunnel = 0, call = 0 ref=0 refhim=0
xl2tpd[28444]: get_call: allocating new tunnel for host 204.147.92.175, port 61031.
xl2tpd[28444]: handle_avps: handling avp's for tunnel 63055, call 0
xl2tpd[28444]: message_type_avp: message type 1 (Start-Control-Connection-Request)
xl2tpd[28444]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[28444]: framing_caps_avp: supported peer frames: async sync
xl2tpd[28444]: hostname_avp: peer reports hostname ''
xl2tpd[28444]: assigned_tunnel_avp: using peer's tunnel 15
xl2tpd[28444]: receive_window_size_avp: peer wants RWS of 4.  Will use flow control.
xl2tpd[28444]: control_finish: message type is Start-Control-Connection-Request(1).  Tunnel is 15, call is 0.
xl2tpd[28444]: control_finish: sending SCCRP
xl2tpd[28444]: network_thread: recv packet from 204.147.92.175, size = 60, tunnel = 0, call = 0 ref=0 refhim=0
xl2tpd[28444]: get_call: allocating new tunnel for host 204.147.92.175, port 61031.
xl2tpd[28444]: handle_avps: handling avp's for tunnel 46315, call 0
xl2tpd[28444]: message_type_avp: message type 1 (Start-Control-Connection-Request)
xl2tpd[28444]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[28444]: framing_caps_avp: supported peer frames: async sync
xl2tpd[28444]: hostname_avp: peer reports hostname ''
xl2tpd[28444]: assigned_tunnel_avp: using peer's tunnel 15
xl2tpd[28444]: receive_window_size_avp: peer wants RWS of 4.  Will use flow control.
xl2tpd[28444]: control_finish: message type is Start-Control-Connection-Request(1).  Tunnel is 15, call is 0.
xl2tpd[28444]: control_finish: Peer requested tunnel 15 twice, ignoring second one.
xl2tpd[28444]: build_fdset: closing down tunnel 46315
xl2tpd[28444]: network_thread: recv packet from 204.147.92.175, size = 60, tunnel = 0, call = 0 ref=0 refhim=0
xl2tpd[28444]: get_call: allocating new tunnel for host 204.147.92.175, port 61031.
xl2tpd[28444]: handle_avps: handling avp's for tunnel 40788, call 28398
xl2tpd[28444]: message_type_avp: message type 1 (Start-Control-Connection-Request)
xl2tpd[28444]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[28444]: framing_caps_avp: supported peer frames: async sync
xl2tpd[28444]: hostname_avp: peer reports hostname ''
xl2tpd[28444]: assigned_tunnel_avp: using peer's tunnel 15
xl2tpd[28444]: receive_window_size_avp: peer wants RWS of 4.  Will use flow control.
xl2tpd[28444]: control_finish: message type is Start-Control-Connection-Request(1).  Tunnel is 15, call is 0.
xl2tpd[28444]: control_finish: Peer requested tunnel 15 twice, ignoring second one.
xl2tpd[28444]: build_fdset: closing down tunnel 40788
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: recv packet from 204.147.92.175, size = 60, tunnel = 0, call = 0 ref=0 refhim=0
xl2tpd[28444]: get_call: allocating new tunnel for host 204.147.92.175, port 61031.
xl2tpd[28444]: handle_avps: handling avp's for tunnel 22314, call 21624
xl2tpd[28444]: message_type_avp: message type 1 (Start-Control-Connection-Request)
xl2tpd[28444]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[28444]: framing_caps_avp: supported peer frames: async sync
xl2tpd[28444]: hostname_avp: peer reports hostname ''
xl2tpd[28444]: assigned_tunnel_avp: using peer's tunnel 15
xl2tpd[28444]: receive_window_size_avp: peer wants RWS of 4.  Will use flow control.
xl2tpd[28444]: control_finish: message type is Start-Control-Connection-Request(1).  Tunnel is 15, call is 0.
xl2tpd[28444]: control_finish: Peer requested tunnel 15 twice, ignoring second one.
xl2tpd[28444]: build_fdset: closing down tunnel 22314
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: Maximum retries exceeded for tunnel 63055.  Closing.
xl2tpd[28444]: network_thread: recv packet from 204.147.92.175, size = 60, tunnel = 0, call = 0 ref=0 refhim=0
xl2tpd[28444]: get_call: allocating new tunnel for host 204.147.92.175, port 61031.
xl2tpd[28444]: handle_avps: handling avp's for tunnel 27969, call 0
xl2tpd[28444]: message_type_avp: message type 1 (Start-Control-Connection-Request)
xl2tpd[28444]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[28444]: framing_caps_avp: supported peer frames: async sync
xl2tpd[28444]: hostname_avp: peer reports hostname ''
xl2tpd[28444]: assigned_tunnel_avp: using peer's tunnel 15
xl2tpd[28444]: receive_window_size_avp: peer wants RWS of 4.  Will use flow control.
xl2tpd[28444]: control_finish: message type is Start-Control-Connection-Request(1).  Tunnel is 15, call is 0.
xl2tpd[28444]: control_finish: Peer requested tunnel 15 twice, ignoring second one.
xl2tpd[28444]: build_fdset: closing down tunnel 27969
xl2tpd[28444]: build_fdset: closing down tunnel 63055
xl2tpd[28444]: Connection 15 closed to 204.147.92.175, port 61031 (Timeout)
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: recv packet from 204.147.92.175, size = 60, tunnel = 0, call = 0 ref=0 refhim=0
xl2tpd[28444]: get_call: allocating new tunnel for host 204.147.92.175, port 61031.
xl2tpd[28444]: handle_avps: handling avp's for tunnel 22314, call 21624
xl2tpd[28444]: message_type_avp: message type 1 (Start-Control-Connection-Request)
xl2tpd[28444]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[28444]: framing_caps_avp: supported peer frames: async sync
xl2tpd[28444]: hostname_avp: peer reports hostname ''
xl2tpd[28444]: assigned_tunnel_avp: using peer's tunnel 15
xl2tpd[28444]: receive_window_size_avp: peer wants RWS of 4.  Will use flow control.
xl2tpd[28444]: control_finish: message type is Start-Control-Connection-Request(1).  Tunnel is 15, call is 0.
xl2tpd[28444]: control_finish: Peer requested tunnel 15 twice, ignoring second one.
xl2tpd[28444]: build_fdset: closing down tunnel 22314
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: Maximum retries exceeded for tunnel 63055.  Closing.
xl2tpd[28444]: network_thread: recv packet from 204.147.92.175, size = 60, tunnel = 0, call = 0 ref=0 refhim=0
xl2tpd[28444]: get_call: allocating new tunnel for host 204.147.92.175, port 61031.
xl2tpd[28444]: handle_avps: handling avp's for tunnel 27969, call 0
xl2tpd[28444]: message_type_avp: message type 1 (Start-Control-Connection-Request)
xl2tpd[28444]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[28444]: framing_caps_avp: supported peer frames: async sync
xl2tpd[28444]: hostname_avp: peer reports hostname ''
xl2tpd[28444]: assigned_tunnel_avp: using peer's tunnel 15
xl2tpd[28444]: receive_window_size_avp: peer wants RWS of 4.  Will use flow control.
xl2tpd[28444]: control_finish: message type is Start-Control-Connection-Request(1).  Tunnel is 15, call is 0.
xl2tpd[28444]: control_finish: Peer requested tunnel 15 twice, ignoring second one.
xl2tpd[28444]: build_fdset: closing down tunnel 27969
xl2tpd[28444]: build_fdset: closing down tunnel 63055
xl2tpd[28444]: Connection 15 closed to 204.147.92.175, port 61031 (Timeout)
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: network_thread: select timeout
xl2tpd[28444]: Unable to deliver closing message for tunnel 63055. Destroying anyway.
xl2tpd[28444]: network_thread: select returned error 4 (Interrupted system call)
xl2tpd[28444]: death_handler: Fatal signal 2 received




-----

Updated configs
-----

ipsec.conf
-----
config setup
         nat_traversal=yes
         virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!10.170.90.0/23,%v4:!172.16.1.0/24
         oe=off
         protostack=netkey
#         nhelpers=0

conn L2TP
         authby=secret
         auto=add
         pfs=no
         type=transport
         rekey=no
         left=10.170.91.102
         leftid=50.18.124.10
         leftnexthop=%defaultroute
         leftprotoport=17/1701
         right=%any
         rightsubnet=vhost:%priv,%no,%all
         rightprotoport=17/%any
         forceencaps=yes

----
xl2tpd.conf
----
[global]
listen-addr = 10.170.91.102
ipsec saref = no
debug tunnel = yes
debug avp = yes
debug network = yes
debug state = yes

[lns default]
ip range = 172.16.1.100-172.16.1.200
local ip = 172.16.1.1
refuse chap = yes
refuse pap = yes
require authentication = yes
ppp debug = yes
pppoptfile = /etc/ppp/options.xl2tpd
length bit = yes
----
options.xl2tpd
----
ipcp-accept-local
ipcp-accept-remote
noccp
auth
#crtscts
idle 1800
mtu 1200
mru 1200
nodefaultroute
debug
dump
lock
proxyarp
name l2tpd
connect-delay 5000
ms-dns 4.2.2.1
----

Jim Lake

________________________________________
From: Paul Wouters [paul at xelerance.com]
Sent: Monday, April 18, 2011 1:38 PM
To: Jim Lake
Cc: users at openswan.org
Subject: Re: [Openswan Users] OpenSWAN + xl2tpd failing tunnel transmission

On Mon, 18 Apr 2011, Jim Lake wrote:

> As far as I can tell, my IPSec is coming up fine.  The xl2tpd, though, can't seem to get a tunnel up and going.  I have no idea what's wrong.

> # basic configuration
> config setup
>          nat_traversal=yes
>          virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16

You should exclude the range used by your NATed server here (10.170.91.0/24 ?)

> conn L2TP
>          authby=secret
>          auto=add
>          pfs=no
>          type=transport
>          rekey=no
>
>          left=10.170.91.102
>          leftid=50.18.124.10
>          leftnexthop=%defaultroute
>          leftprotoport=17/1701
>
>          right=%any
>          rightsubnet=vhost:%priv,%no,%all
>          rightprotoport=17/0
>          forceencaps=yes

I hope you don't have actual blanc lines there? That would mess things up.
Use rightprotoport=17/%any

> ----
> xl2tpd.conf
> ----
> [global]
> ipsec saref = no
> debug tunnel = yes
> debug avp = yes
> debug network = yes
> debug state = yes

Explicitely specify the listen-addr address in [global] in xl2tpd.conf? I
think you want:

   listen-addr = 10.170.91.102

> [lns default]
> ip range = 172.16.1.100-172.16.1.200
> local ip = 172.16.1.1

These should then also be excluded from virtual_private=

> mtu 1410
> mru 1410

Note most clients use an mtu/mru of 1200 for L2TP.

Paul


More information about the Users mailing list