[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#744009: xl2tp connect issue kernel 3.2.0-4-amd64



Package: linux-image-3.2.0-4-amd64
Version: 3.2.54-2

Package: xl2tpd
Version: 1.3.1+dfsg-1

Using xl2tp as a l2tp client to connect, using the above amd64 bit kernel doesnt connect, using the same config and same xl2tp version on a i386 pc connects fine.

xl2tp debug output on amd64 kernel

xl2tpd[32225]: setsockopt recvref[30]: Protocol not available
xl2tpd[32225]: This binary does not support kernel L2TP.
xl2tpd[32225]: xl2tpd version xl2tpd-1.3.1 started on fw1.pta.fishwicks.co.za PID:32225
xl2tpd[32225]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[32225]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[32225]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[32225]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[32225]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[32225]: get_call: allocating new tunnel for host x.x.x.x, port 1701.
xl2tpd[32225]: Connecting to host x.x.x.x, port 1701
xl2tpd[32225]: control_finish: message type is (null)(0). Tunnel is 0, call is 0.
packet dump:
HEX: { C8 02 00 78 00 00 00 00 00 00 00 00 80 08 00 00 00 00 00 01 80 08 00 00 00 02 01 00 80 0A 00 00 00 03 00 00 00 03 80 0A 00 00 00 04 00 00 00 00 80 08 00 00 00 06 06 90 80 1D 00 00 00 07 66 77 31 2E 70 74 61 2E 66 69 73 68 77 69 63 6B 73 2E 63 6F 2E 7A 61 80 13 00 00 00 08 78 65 6C 65 72 61 6E 63 65 2E 63 6F 6D 80 08 00 00 00 09 86 87 80 08 00 00 00 0A 00 04 } ASCII: { x hostname.local xelerance.com }
xl2tpd[32225]: control_finish: sending SCCRQ
xl2tpd[32225]: network_thread: recv packet from x.x.x.x, size = 139, tunnel = 34439, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 8B 00 87 86 00 00 00 00 01 00 80 08 00 00 00 00 00 02 80 08 00 00 00 02 01 00 80 14 00 00 00 07 76 7A 62 5F 6C 32 74 70 5F 74 74 5F 6C 6F 80 0A 00 00 00 03 00 00 00 01 80 08 00 00 00 09 36 D4 80 08 00 00 00 0A 00 40 80 1D 00 00 00 0B 31 BF 15 22 92 BE 38 13 83 34 1A 78 3E 03 A9 8A 95 2E 61 C3 C6 58 43 00 08 00 00 00 06 20 15 00 1C 00 00 00 08 4A 75 6E 69 70 65 72 20 4E 65 74 77 6F 72 6B 73 2C 20 49 6E 63 2E } ASCII: { fvzb_l2tp_tt_lo 6 @ 1 " 8 4 x> .a XC Juniper Networks, Inc.}
xl2tpd[32225]: handle_avps: handling avp's for tunnel 34439, call 0
xl2tpd[32225]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
xl2tpd[32225]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[32225]: hostname_avp: peer reports hostname 'vzb_l2tp_tt_lo'
xl2tpd[32225]: framing_caps_avp: supported peer frames: sync
xl2tpd[32225]: assigned_tunnel_avp: using peer's tunnel 14036
xl2tpd[32225]: receive_window_size_avp: peer wants RWS of 64. Will use flow control.
xl2tpd[32225]: challenge_avp: challenge avp found
xl2tpd[32225]: firmware_rev_avp: peer reports firmware version 8213 (0x2015)
xl2tpd[32225]: vendor_avp: peer reports vendor 'Juniper Networks, Inc.'
xl2tpd[32225]: control_finish: message type is Start-Control-Connection-Reply(2). Tunnel is 14036, call is 0.
packet dump:
HEX: { C8 02 00 2A 36 D4 00 00 00 01 00 01 80 08 00 00 00 00 00 03 80 16 00 00 00 0D 90 19 50 7D 32 24 04 6E 0C 79 71 F3 B1 E9 A2 05 }
ASCII: {    *6                       P}2$ n yq     }
xl2tpd[32225]: control_finish: sending SCCCN
xl2tpd[32225]: Connection established to x.x.x.x, 1701. Local: 34439, Remote: 14036 (ref=0/0).
xl2tpd[32225]: Calling on tunnel 34439
xl2tpd[32225]: control_finish: message type is (null)(0). Tunnel is 14036, call is 0.
packet dump:
HEX: { C8 02 00 30 36 D4 00 00 00 02 00 01 80 08 00 00 00 00 00 0A 80 08 00 00 00 0E 99 14 80 0A 00 00 00 0F 00 00 00 01 80 0A 00 00 00 12 00 00 00 00 }
ASCII: {    06                                           }
xl2tpd[32225]: control_finish: sending ICRQ
xl2tpd[32225]: network_thread: recv packet from x.x.x.x, size = 88, tunnel = 34439, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 58 00 87 86 00 00 01 00 02 00 80 08 00 00 00 00 00 04 80 08 00 00 00 09 36 D4 80 3C 00 00 00 01 00 04 00 03 74 75 6E 6E 65 6C 20 72 65 63 65 69 76 65 20 73 63 63 63 6E 20 61 75 74 68 65 6E 74 69 63 61 74 65 20 66 61 69 6C 65 64 20 63 68 61 6C 6C 65 6E 67 65 } ASCII: { X 6 < tunnel receive scccn authenticate failed challenge}
xl2tpd[32225]: handle_avps: handling avp's for tunnel 34439, call 0
xl2tpd[32225]: message_type_avp: message type 4 (Stop-Control-Connection-Notification)
xl2tpd[32225]: assigned_tunnel_avp: using peer's tunnel 14036
xl2tpd[32225]: result_code_avp: peer closing for reason 4 (Requester is not authorized to establish a control channel), error = 3 (tunnel receive scccn authenticate failed challenge) xl2tpd[32225]: control_finish: message type is Stop-Control-Connection-Notification(4). Tunnel is 14036, call is 0. xl2tpd[32225]: control_finish: Connection closed to x.x.x.x, port 1701 (tunnel receive scccn authenticate failed challenge), Local: 34439, Remote: 14036
xl2tpd[32225]: build_fdset: closing down tunnel 34439
^Cxl2tpd[32225]: network_thread: select returned error 4 (Interrupted system call)
xl2tpd[32225]: death_handler: Fatal signal 2 received

xl2tpd debug output on i386 kernel

xl2tpd[16819]: setsockopt recvref[30]: Protocol not available
xl2tpd[16819]: This binary does not support kernel L2TP.
xl2tpd[16819]: xl2tpd version xl2tpd-1.3.1 started on fw1 PID:16819
xl2tpd[16819]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[16819]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[16819]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[16819]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[16819]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[16819]: get_call: allocating new tunnel for host x.x.x.x, port 1701.
xl2tpd[16819]: Connecting to host x.x.x.x, port 1701
xl2tpd[16819]: control_finish: message type is (null)(0). Tunnel is 0, call is 0.
packet dump:
HEX: { C8 02 00 64 00 00 00 00 00 00 00 00 80 08 00 00 00 00 00 01 80 08 00 00 00 02 01 00 80 0A 00 00 00 03 00 00 00 03 80 0A 00 00 00 04 00 00 00 00 80 08 00 00 00 06 06 90 80 09 00 00 00 07 66 77 31 80 13 00 00 00 08 78 65 6C 65 72 61 6E 63 65 2E 63 6F 6D 80 08 00 00 00 09 7F 72 80 08 00 00 00 0A 00 04 } ASCII: { d localhostname xelerance.com r }
xl2tpd[16819]: control_finish: sending SCCRQ
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 137, tunnel = 32626, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 89 00 72 7F 00 00 00 00 01 00 80 08 00 00 00 00 00 02 80 08 00 00 00 02 01 00 80 14 00 00 00 07 76 7A 62 5F 6C 32 74 70 5F 74 74 5F 6C 6F 80 0A 00 00 00 03 00 00 00 01 80 08 00 00 00 09 30 E5 80 08 00 00 00 0A 00 40 80 1B 00 00 00 0B 17 62 DA ED 04 45 5C D7 19 B0 C1 6A 33 2E 32 44 9B 13 F4 12 7C 00 08 00 00 00 06 20 15 00 1C 00 00 00 08 4A 75 6E 69 70 65 72 20 4E 65 74 77 6F 72 6B 73 2C 20 49 6E 63 2E } ASCII: { r vzb_l2tp_tt_lo 0 @ b E\ j3.2D | Juniper Networks, Inc.}
xl2tpd[16819]: handle_avps: handling avp's for tunnel 32626, call 0
xl2tpd[16819]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
xl2tpd[16819]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[16819]: hostname_avp: peer reports hostname 'vzb_l2tp_tt_lo'
xl2tpd[16819]: framing_caps_avp: supported peer frames: sync
xl2tpd[16819]: assigned_tunnel_avp: using peer's tunnel 12517
xl2tpd[16819]: receive_window_size_avp: peer wants RWS of 64. Will use flow control.
xl2tpd[16819]: challenge_avp: challenge avp found
xl2tpd[16819]: firmware_rev_avp: peer reports firmware version 8213 (0x2015)
xl2tpd[16819]: vendor_avp: peer reports vendor 'Juniper Networks, Inc.'
xl2tpd[16819]: control_finish: message type is Start-Control-Connection-Reply(2). Tunnel is 12517, call is 0.
packet dump:
HEX: { C8 02 00 2A 30 E5 00 00 00 01 00 01 80 08 00 00 00 00 00 03 80 16 00 00 00 0D 86 62 E9 F0 1A 07 09 03 47 F9 7A 0D 8E 99 70 89 }
ASCII: {    *0                      b      G z   p }
xl2tpd[16819]: control_finish: sending SCCCN
xl2tpd[16819]: Connection established to x.x.x.x, 1701. Local: 32626, Remote: 12517 (ref=0/0).
xl2tpd[16819]: Calling on tunnel 32626
xl2tpd[16819]: control_finish: message type is (null)(0). Tunnel is 12517, call is 0.
packet dump:
HEX: { C8 02 00 30 30 E5 00 00 00 02 00 01 80 08 00 00 00 00 00 0A 80 08 00 00 00 0E 45 87 80 0A 00 00 00 0F 00 00 00 01 80 0A 00 00 00 12 00 00 00 00 }
ASCII: {    00                     E                     }
xl2tpd[16819]: control_finish: sending ICRQ
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 28, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 C8 1C 00 72 7F 87 45 01 00 03 00 80 08 00 00 00 00 00 0B 80 08 00 00 00 0E 59 6C }
ASCII: {     r  E                  Yl}
xl2tpd[16819]: handle_avps: handling avp's for tunnel 32626, call 17799
xl2tpd[16819]: message_type_avp: message type 11 (Incoming-Call-Reply)
xl2tpd[16819]: assigned_call_avp: using peer's call 22892
xl2tpd[16819]: control_finish: message type is Incoming-Call-Reply(11). Tunnel is 12517, call is 22892.
packet dump:
HEX: { C8 02 00 32 30 E5 59 6C 00 03 00 02 80 08 00 00 00 00 00 0C 80 0A 00 00 00 18 00 00 00 00 80 0A 00 00 00 13 00 00 00 01 80 0A 00 00 00 26 00 00 00 00 }
ASCII: {    20 Yl                                     &    }
xl2tpd[16819]: control_finish: Sending ICCN
xl2tpd[16819]: Call established with x.x.x.x, Local: 17799, Remote: 22892, Serial: 1 (ref=0/0)
xl2tpd[16819]: start_pppd: I'm running:
xl2tpd[16819]: "/usr/sbin/pppd"
xl2tpd[16819]: "passive"
xl2tpd[16819]: "nodetach"
xl2tpd[16819]: ":"
xl2tpd[16819]: "refuse-chap"
xl2tpd[16819]: "auth"
xl2tpd[16819]: "require-pap"
xl2tpd[16819]: "name"
xl2tpd[16819]: "pap-username"
xl2tpd[16819]: "debug"
xl2tpd[16819]: "file"
xl2tpd[16819]: "/etc/ppp/options.l2tpd"
xl2tpd[16819]: "ipparam"
xl2tpd[16819]: "x.x.x.x"
xl2tpd[16819]: "/dev/pts/2"
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 24, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 01 8F 00 0E 03 04 C0 23 05 06 44 30 96 03 }
ASCII: {   r  E   !       #  D0  }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 12, tunnel = 32626, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 0C 00 72 7F 00 00 02 00 04 00 }
ASCII: {     r       }
packet dump:
HEX: { 40 02 00 24 30 E5 59 6C FF 03 C0 21 01 01 00 18 01 04 05 AC 02 06 00 00 00 00 05 06 C4 4B 53 69 07 02 08 02 }
ASCII: { @  $0 Yl   !                 KSi    }
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 34, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 02 01 00 18 01 04 05 AC 02 06 00 00 00 00 05 06 C4 4B 53 69 07 02 08 02 }
ASCII: {   r  E   !                 KSi    }
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 24, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 01 90 00 0E 03 04 C0 23 05 06 44 30 96 03 }
ASCII: {   r  E   !       #  D0  }
packet dump:
HEX: { 40 02 00 1A 30 E5 59 6C FF 03 C0 21 02 90 00 0E 03 04 C0 23 05 06 44 30 96 03 }
ASCII: { @   0 Yl   !       #  D0  }
packet dump:
HEX: { 40 02 00 14 30 E5 59 6C FF 03 C0 21 09 00 00 08 C4 4B 53 69 }
ASCII: { @   0 Yl   !     KSi}
packet dump:
HEX: { 40 02 00 41 30 E5 59 6C FF 03 C0 23 01 01 00 35 25 70 6B 66 6A 68 62 2E 6D 70 6C 73 40 61 75 63 6F 72 2E 63 6F 6D 40 64 73 6C 2E 75 75 6E 65 74 2E 63 6F 2E 7A 61 0A 49 62 4E 65 65 62 64 79 78 32 }
ASCII: { @  A0 Yl   #   5%pkfjhb.mpls@aucor.com@dsl.uunet.co.za IbNeebdyx2}
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 18, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 0A 00 00 08 44 30 96 03 }
ASCII: {   r  E   !    D0  }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 15, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 23 02 01 00 05 00 }
ASCII: {   r  E   #     }
packet dump:
HEX: { 40 02 00 1C 30 E5 59 6C FF 03 80 21 01 01 00 10 02 06 00 2D 0F 01 03 06 00 00 00 00 }
ASCII: { @   0 Yl   !       -        }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 01 11 00 0A 03 06 AC 18 03 03 }
ASCII: {   r  E   !          }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 02 11 00 0A 03 06 AC 18 03 03 }
ASCII: { @   0 Yl   !          }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 04 01 00 0A 02 06 00 2D 0F 01 }
ASCII: {   r  E   !       -  }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 01 02 00 0A 03 06 00 00 00 00 }
ASCII: { @   0 Yl   !          }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 03 02 00 0A 03 06 C4 2F 02 B3 }
ASCII: {   r  E   !       /  }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 01 03 00 0A 03 06 C4 2F 02 B3 }
ASCII: { @   0 Yl   !       /  }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 02 03 00 0A 03 06 C4 2F 02 B3 }
ASCII: {   r  E   !       /  }
^Cxl2tpd[16819]: network_thread: select returned error 4 (Interrupted system call)
xl2tpd[16819]: death_handler: Fatal signal 2 received
packet dump:
HEX: { C8 02 00 34 30 E5 00 00 00 04 00 02 80 08 00 00 00 00 00 04 80 08 00 00 00 09 7F 72 80 18 00 00 00 01 00 01 00 00 53 65 72 76 65 72 20 63 6C 6F 73 69 6E 67 }
ASCII: {    40                      r          Server closing}
xl2tpd[16819]: Terminating pppd: sending TERM signal to pid 16820
xl2tpd[16819]: Connection 12517 closed to x.x.x.x, port 1701 (Server closing)



--
Thank you,

Mark Adrian Coetser

Connection reset by some moron with a backhoe


Reply to: