[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#744009: marked as done (xl2tp connect issue kernel 3.2.0-4-amd64)



Your message dated Sat, 24 Apr 2021 23:39:07 -0700 (PDT)
with message-id <60850e8b.1c69fb81.8099f.ccd6@mx.google.com>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #744009,
regarding xl2tp connect issue kernel 3.2.0-4-amd64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
744009: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744009
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-3.2.0-4-amd64
Version: 3.2.54-2

Package: xl2tpd
Version: 1.3.1+dfsg-1

Using xl2tp as a l2tp client to connect, using the above amd64 bit kernel doesnt connect, using the same config and same xl2tp version on a i386 pc connects fine.

xl2tp debug output on amd64 kernel

xl2tpd[32225]: setsockopt recvref[30]: Protocol not available
xl2tpd[32225]: This binary does not support kernel L2TP.
xl2tpd[32225]: xl2tpd version xl2tpd-1.3.1 started on fw1.pta.fishwicks.co.za PID:32225
xl2tpd[32225]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[32225]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[32225]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[32225]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[32225]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[32225]: get_call: allocating new tunnel for host x.x.x.x, port 1701.
xl2tpd[32225]: Connecting to host x.x.x.x, port 1701
xl2tpd[32225]: control_finish: message type is (null)(0). Tunnel is 0, call is 0.
packet dump:
HEX: { C8 02 00 78 00 00 00 00 00 00 00 00 80 08 00 00 00 00 00 01 80 08 00 00 00 02 01 00 80 0A 00 00 00 03 00 00 00 03 80 0A 00 00 00 04 00 00 00 00 80 08 00 00 00 06 06 90 80 1D 00 00 00 07 66 77 31 2E 70 74 61 2E 66 69 73 68 77 69 63 6B 73 2E 63 6F 2E 7A 61 80 13 00 00 00 08 78 65 6C 65 72 61 6E 63 65 2E 63 6F 6D 80 08 00 00 00 09 86 87 80 08 00 00 00 0A 00 04 } ASCII: { x hostname.local xelerance.com }
xl2tpd[32225]: control_finish: sending SCCRQ
xl2tpd[32225]: network_thread: recv packet from x.x.x.x, size = 139, tunnel = 34439, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 8B 00 87 86 00 00 00 00 01 00 80 08 00 00 00 00 00 02 80 08 00 00 00 02 01 00 80 14 00 00 00 07 76 7A 62 5F 6C 32 74 70 5F 74 74 5F 6C 6F 80 0A 00 00 00 03 00 00 00 01 80 08 00 00 00 09 36 D4 80 08 00 00 00 0A 00 40 80 1D 00 00 00 0B 31 BF 15 22 92 BE 38 13 83 34 1A 78 3E 03 A9 8A 95 2E 61 C3 C6 58 43 00 08 00 00 00 06 20 15 00 1C 00 00 00 08 4A 75 6E 69 70 65 72 20 4E 65 74 77 6F 72 6B 73 2C 20 49 6E 63 2E } ASCII: { fvzb_l2tp_tt_lo 6 @ 1 " 8 4 x> .a XC Juniper Networks, Inc.}
xl2tpd[32225]: handle_avps: handling avp's for tunnel 34439, call 0
xl2tpd[32225]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
xl2tpd[32225]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[32225]: hostname_avp: peer reports hostname 'vzb_l2tp_tt_lo'
xl2tpd[32225]: framing_caps_avp: supported peer frames: sync
xl2tpd[32225]: assigned_tunnel_avp: using peer's tunnel 14036
xl2tpd[32225]: receive_window_size_avp: peer wants RWS of 64. Will use flow control.
xl2tpd[32225]: challenge_avp: challenge avp found
xl2tpd[32225]: firmware_rev_avp: peer reports firmware version 8213 (0x2015)
xl2tpd[32225]: vendor_avp: peer reports vendor 'Juniper Networks, Inc.'
xl2tpd[32225]: control_finish: message type is Start-Control-Connection-Reply(2). Tunnel is 14036, call is 0.
packet dump:
HEX: { C8 02 00 2A 36 D4 00 00 00 01 00 01 80 08 00 00 00 00 00 03 80 16 00 00 00 0D 90 19 50 7D 32 24 04 6E 0C 79 71 F3 B1 E9 A2 05 }
ASCII: {    *6                       P}2$ n yq     }
xl2tpd[32225]: control_finish: sending SCCCN
xl2tpd[32225]: Connection established to x.x.x.x, 1701. Local: 34439, Remote: 14036 (ref=0/0).
xl2tpd[32225]: Calling on tunnel 34439
xl2tpd[32225]: control_finish: message type is (null)(0). Tunnel is 14036, call is 0.
packet dump:
HEX: { C8 02 00 30 36 D4 00 00 00 02 00 01 80 08 00 00 00 00 00 0A 80 08 00 00 00 0E 99 14 80 0A 00 00 00 0F 00 00 00 01 80 0A 00 00 00 12 00 00 00 00 }
ASCII: {    06                                           }
xl2tpd[32225]: control_finish: sending ICRQ
xl2tpd[32225]: network_thread: recv packet from x.x.x.x, size = 88, tunnel = 34439, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 58 00 87 86 00 00 01 00 02 00 80 08 00 00 00 00 00 04 80 08 00 00 00 09 36 D4 80 3C 00 00 00 01 00 04 00 03 74 75 6E 6E 65 6C 20 72 65 63 65 69 76 65 20 73 63 63 63 6E 20 61 75 74 68 65 6E 74 69 63 61 74 65 20 66 61 69 6C 65 64 20 63 68 61 6C 6C 65 6E 67 65 } ASCII: { X 6 < tunnel receive scccn authenticate failed challenge}
xl2tpd[32225]: handle_avps: handling avp's for tunnel 34439, call 0
xl2tpd[32225]: message_type_avp: message type 4 (Stop-Control-Connection-Notification)
xl2tpd[32225]: assigned_tunnel_avp: using peer's tunnel 14036
xl2tpd[32225]: result_code_avp: peer closing for reason 4 (Requester is not authorized to establish a control channel), error = 3 (tunnel receive scccn authenticate failed challenge) xl2tpd[32225]: control_finish: message type is Stop-Control-Connection-Notification(4). Tunnel is 14036, call is 0. xl2tpd[32225]: control_finish: Connection closed to x.x.x.x, port 1701 (tunnel receive scccn authenticate failed challenge), Local: 34439, Remote: 14036
xl2tpd[32225]: build_fdset: closing down tunnel 34439
^Cxl2tpd[32225]: network_thread: select returned error 4 (Interrupted system call)
xl2tpd[32225]: death_handler: Fatal signal 2 received

xl2tpd debug output on i386 kernel

xl2tpd[16819]: setsockopt recvref[30]: Protocol not available
xl2tpd[16819]: This binary does not support kernel L2TP.
xl2tpd[16819]: xl2tpd version xl2tpd-1.3.1 started on fw1 PID:16819
xl2tpd[16819]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[16819]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[16819]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[16819]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[16819]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[16819]: get_call: allocating new tunnel for host x.x.x.x, port 1701.
xl2tpd[16819]: Connecting to host x.x.x.x, port 1701
xl2tpd[16819]: control_finish: message type is (null)(0). Tunnel is 0, call is 0.
packet dump:
HEX: { C8 02 00 64 00 00 00 00 00 00 00 00 80 08 00 00 00 00 00 01 80 08 00 00 00 02 01 00 80 0A 00 00 00 03 00 00 00 03 80 0A 00 00 00 04 00 00 00 00 80 08 00 00 00 06 06 90 80 09 00 00 00 07 66 77 31 80 13 00 00 00 08 78 65 6C 65 72 61 6E 63 65 2E 63 6F 6D 80 08 00 00 00 09 7F 72 80 08 00 00 00 0A 00 04 } ASCII: { d localhostname xelerance.com r }
xl2tpd[16819]: control_finish: sending SCCRQ
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 137, tunnel = 32626, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 89 00 72 7F 00 00 00 00 01 00 80 08 00 00 00 00 00 02 80 08 00 00 00 02 01 00 80 14 00 00 00 07 76 7A 62 5F 6C 32 74 70 5F 74 74 5F 6C 6F 80 0A 00 00 00 03 00 00 00 01 80 08 00 00 00 09 30 E5 80 08 00 00 00 0A 00 40 80 1B 00 00 00 0B 17 62 DA ED 04 45 5C D7 19 B0 C1 6A 33 2E 32 44 9B 13 F4 12 7C 00 08 00 00 00 06 20 15 00 1C 00 00 00 08 4A 75 6E 69 70 65 72 20 4E 65 74 77 6F 72 6B 73 2C 20 49 6E 63 2E } ASCII: { r vzb_l2tp_tt_lo 0 @ b E\ j3.2D | Juniper Networks, Inc.}
xl2tpd[16819]: handle_avps: handling avp's for tunnel 32626, call 0
xl2tpd[16819]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
xl2tpd[16819]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[16819]: hostname_avp: peer reports hostname 'vzb_l2tp_tt_lo'
xl2tpd[16819]: framing_caps_avp: supported peer frames: sync
xl2tpd[16819]: assigned_tunnel_avp: using peer's tunnel 12517
xl2tpd[16819]: receive_window_size_avp: peer wants RWS of 64. Will use flow control.
xl2tpd[16819]: challenge_avp: challenge avp found
xl2tpd[16819]: firmware_rev_avp: peer reports firmware version 8213 (0x2015)
xl2tpd[16819]: vendor_avp: peer reports vendor 'Juniper Networks, Inc.'
xl2tpd[16819]: control_finish: message type is Start-Control-Connection-Reply(2). Tunnel is 12517, call is 0.
packet dump:
HEX: { C8 02 00 2A 30 E5 00 00 00 01 00 01 80 08 00 00 00 00 00 03 80 16 00 00 00 0D 86 62 E9 F0 1A 07 09 03 47 F9 7A 0D 8E 99 70 89 }
ASCII: {    *0                      b      G z   p }
xl2tpd[16819]: control_finish: sending SCCCN
xl2tpd[16819]: Connection established to x.x.x.x, 1701. Local: 32626, Remote: 12517 (ref=0/0).
xl2tpd[16819]: Calling on tunnel 32626
xl2tpd[16819]: control_finish: message type is (null)(0). Tunnel is 12517, call is 0.
packet dump:
HEX: { C8 02 00 30 30 E5 00 00 00 02 00 01 80 08 00 00 00 00 00 0A 80 08 00 00 00 0E 45 87 80 0A 00 00 00 0F 00 00 00 01 80 0A 00 00 00 12 00 00 00 00 }
ASCII: {    00                     E                     }
xl2tpd[16819]: control_finish: sending ICRQ
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 28, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 C8 1C 00 72 7F 87 45 01 00 03 00 80 08 00 00 00 00 00 0B 80 08 00 00 00 0E 59 6C }
ASCII: {     r  E                  Yl}
xl2tpd[16819]: handle_avps: handling avp's for tunnel 32626, call 17799
xl2tpd[16819]: message_type_avp: message type 11 (Incoming-Call-Reply)
xl2tpd[16819]: assigned_call_avp: using peer's call 22892
xl2tpd[16819]: control_finish: message type is Incoming-Call-Reply(11). Tunnel is 12517, call is 22892.
packet dump:
HEX: { C8 02 00 32 30 E5 59 6C 00 03 00 02 80 08 00 00 00 00 00 0C 80 0A 00 00 00 18 00 00 00 00 80 0A 00 00 00 13 00 00 00 01 80 0A 00 00 00 26 00 00 00 00 }
ASCII: {    20 Yl                                     &    }
xl2tpd[16819]: control_finish: Sending ICCN
xl2tpd[16819]: Call established with x.x.x.x, Local: 17799, Remote: 22892, Serial: 1 (ref=0/0)
xl2tpd[16819]: start_pppd: I'm running:
xl2tpd[16819]: "/usr/sbin/pppd"
xl2tpd[16819]: "passive"
xl2tpd[16819]: "nodetach"
xl2tpd[16819]: ":"
xl2tpd[16819]: "refuse-chap"
xl2tpd[16819]: "auth"
xl2tpd[16819]: "require-pap"
xl2tpd[16819]: "name"
xl2tpd[16819]: "pap-username"
xl2tpd[16819]: "debug"
xl2tpd[16819]: "file"
xl2tpd[16819]: "/etc/ppp/options.l2tpd"
xl2tpd[16819]: "ipparam"
xl2tpd[16819]: "x.x.x.x"
xl2tpd[16819]: "/dev/pts/2"
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 24, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 01 8F 00 0E 03 04 C0 23 05 06 44 30 96 03 }
ASCII: {   r  E   !       #  D0  }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 12, tunnel = 32626, call = 0 ref=0 refhim=0
packet dump:
HEX: { 02 C8 0C 00 72 7F 00 00 02 00 04 00 }
ASCII: {     r       }
packet dump:
HEX: { 40 02 00 24 30 E5 59 6C FF 03 C0 21 01 01 00 18 01 04 05 AC 02 06 00 00 00 00 05 06 C4 4B 53 69 07 02 08 02 }
ASCII: { @  $0 Yl   !                 KSi    }
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 34, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 02 01 00 18 01 04 05 AC 02 06 00 00 00 00 05 06 C4 4B 53 69 07 02 08 02 }
ASCII: {   r  E   !                 KSi    }
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: select timeout
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 24, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 01 90 00 0E 03 04 C0 23 05 06 44 30 96 03 }
ASCII: {   r  E   !       #  D0  }
packet dump:
HEX: { 40 02 00 1A 30 E5 59 6C FF 03 C0 21 02 90 00 0E 03 04 C0 23 05 06 44 30 96 03 }
ASCII: { @   0 Yl   !       #  D0  }
packet dump:
HEX: { 40 02 00 14 30 E5 59 6C FF 03 C0 21 09 00 00 08 C4 4B 53 69 }
ASCII: { @   0 Yl   !     KSi}
packet dump:
HEX: { 40 02 00 41 30 E5 59 6C FF 03 C0 23 01 01 00 35 25 70 6B 66 6A 68 62 2E 6D 70 6C 73 40 61 75 63 6F 72 2E 63 6F 6D 40 64 73 6C 2E 75 75 6E 65 74 2E 63 6F 2E 7A 61 0A 49 62 4E 65 65 62 64 79 78 32 }
ASCII: { @  A0 Yl   #   5%pkfjhb.mpls@aucor.com@dsl.uunet.co.za IbNeebdyx2}
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 18, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 21 0A 00 00 08 44 30 96 03 }
ASCII: {   r  E   !    D0  }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 15, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 C0 23 02 01 00 05 00 }
ASCII: {   r  E   #     }
packet dump:
HEX: { 40 02 00 1C 30 E5 59 6C FF 03 80 21 01 01 00 10 02 06 00 2D 0F 01 03 06 00 00 00 00 }
ASCII: { @   0 Yl   !       -        }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 01 11 00 0A 03 06 AC 18 03 03 }
ASCII: {   r  E   !          }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 02 11 00 0A 03 06 AC 18 03 03 }
ASCII: { @   0 Yl   !          }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 04 01 00 0A 02 06 00 2D 0F 01 }
ASCII: {   r  E   !       -  }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 01 02 00 0A 03 06 00 00 00 00 }
ASCII: { @   0 Yl   !          }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 03 02 00 0A 03 06 C4 2F 02 B3 }
ASCII: {   r  E   !       /  }
packet dump:
HEX: { 40 02 00 16 30 E5 59 6C FF 03 80 21 01 03 00 0A 03 06 C4 2F 02 B3 }
ASCII: { @   0 Yl   !       /  }
xl2tpd[16819]: network_thread: recv packet from x.x.x.x, size = 20, tunnel = 32626, call = 17799 ref=0 refhim=0
packet dump:
HEX: { 02 00 72 7F 87 45 FF 03 80 21 02 03 00 0A 03 06 C4 2F 02 B3 }
ASCII: {   r  E   !       /  }
^Cxl2tpd[16819]: network_thread: select returned error 4 (Interrupted system call)
xl2tpd[16819]: death_handler: Fatal signal 2 received
packet dump:
HEX: { C8 02 00 34 30 E5 00 00 00 04 00 02 80 08 00 00 00 00 00 04 80 08 00 00 00 09 7F 72 80 18 00 00 00 01 00 01 00 00 53 65 72 76 65 72 20 63 6C 6F 73 69 6E 67 }
ASCII: {    40                      r          Server closing}
xl2tpd[16819]: Terminating pppd: sending TERM signal to pid 16820
xl2tpd[16819]: Connection 12517 closed to x.x.x.x, port 1701 (Server closing)



--
Thank you,

Mark Adrian Coetser

Connection reset by some moron with a backhoe

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: