[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Вопросы про racoon + l2tp для связи с Windows-XP



День добрый,

Захотел я тут сделать VPN-сервер для того что-бы диалап пользователи могли безопасно доступатся до ресурсов локальной сети из своих Windows-XP машин. Установил racoon и l2tpd, сконфигурил, но что-то авторизация для PPP не проходит (который используется в l2tp)
Вот что у меня в racoon.conf написанно:

path certificate "/etc/racoon/certs";
log info;
padding
{
       maximum_length 20;      # maximum padding length.
       randomize off;          # enable randomize length.
       strict_check off;       # enable strict check.
       exclusive_tail off;     # extract last one octet.
}
listen
{
       isakmp 1.2.3.4 [500];
       isakmp_natt 1.2.3.4 [4500];
}
timer
{
       natt_keepalive 10 sec;
       # These value can be changed per remote node.
       counter 5;              # maximum trying count to send.
       interval 20 sec;        # maximum interval to resend.
       persend 1;              # the number of packets per a send.

       phase1 30 sec;
       phase2 15 sec;
}
remote anonymous
{
       exchange_mode main,aggressive;
       doi ipsec_doi;
       situation identity_only;

       certificate_type x509 "ipsec-server.crt" "ipsec-server.key";
       peers_certfile "ipsec-peer1.crt";
       passive on;
       generate_policy on;

       nonce_size 16;
       lifetime time 60 min;   # sec,min,hour
       initial_contact on;
       #support_mip6 on;
       proposal_check obey;    # obey, strict or claim

       proposal {
               encryption_algorithm 3des;
               hash_algorithm sha1;
               authentication_method rsasig ;
               dh_group 2 ;
       }
}

sainfo anonymous
{
       pfs_group 1;
       lifetime time 30 sec;
       encryption_algorithm 3des, des ;
       authentication_algorithm hmac_sha1, hmac_md5;
       compression_algorithm deflate ;
}
Собственно тут все вроде-бы как нормально работает:
Вот кусок tcpdump-лога
20:51:34.544235 IP peer129.isp-domain.tld.isakmp > vpn.my-domain.tld.isakmp: isakmp: phase 1 I ident 20:51:34.545356 IP vpn.my-domain.tld.isakmp > peer129.isp-domain.tld.isakmp: isakmp: phase 1 R ident 20:51:34.885407 IP peer129.isp-domain.tld.isakmp > vpn.my-domain.tld.isakmp: isakmp: phase 1 I ident 20:51:34.896418 IP vpn.my-domain.tld.isakmp > peer129.isp-domain.tld.isakmp: isakmp: phase 1 R ident 20:51:35.517154 IP peer129.isp-domain.tld.isakmp > vpn.my-domain.tld.isakmp: isakmp: phase 1 I ident[E] 20:51:35.524958 IP vpn.my-domain.tld.isakmp > peer129.isp-domain.tld.isakmp: isakmp: phase 1 R ident[E] 20:51:36.328294 IP peer129.isp-domain.tld.isakmp > vpn.my-domain.tld.isakmp: isakmp: phase 2/others I oakley-quick[E] 20:51:36.329799 IP vpn.my-domain.tld.isakmp > peer129.isp-domain.tld.isakmp: isakmp: phase 2/others R oakley-quick[E] 20:51:36.584142 IP peer129.isp-domain.tld.isakmp > vpn.my-domain.tld.isakmp: isakmp: phase 2/others I oakley-quick[E] 20:51:36.620872 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x1), length 140 20:51:37.599535 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x2), length 140 20:51:37.600390 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x1), length 140 20:51:37.862130 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x3), length 60 20:51:37.862493 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x2), length 52 20:51:37.898856 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x4), length 92 20:51:37.899359 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x3), length 68 20:51:37.899398 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x4), length 52 20:51:37.911474 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x5), length 52 20:51:38.119351 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x6), length 92 20:51:38.120792 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x5), length 52 20:51:38.136013 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x6), length 84 20:51:38.154828 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x7), length 52 20:51:38.166822 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x8), length 76 20:51:38.167213 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x7), length 60 20:51:38.357957 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x9), length 60 20:51:38.358248 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x8), length 76 20:51:38.389063 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0xa), length 68 20:51:38.389310 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x9), length 68 20:51:38.577826 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0xb), length 60 20:51:38.578104 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0xa), length 76 20:51:38.792698 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0xc), length 60 20:51:38.792985 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0xb), length 76 20:51:38.986332 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0xd), length 60 20:51:38.986607 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0xc), length 76 20:51:40.082927 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0xe), length 60 20:51:40.083270 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0xd), length 76 20:51:40.275186 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0xf), length 60 20:51:40.275604 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0xe), length 76 20:51:40.485062 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x10), length 60 20:51:40.485290 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0xf), length 76 20:51:40.678696 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x11), length 60 20:51:40.679017 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x10), length 76 20:51:40.899317 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x12), length 60 20:51:40.899698 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x11), length 76 20:51:41.109690 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x13), length 60 20:51:41.110010 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x12), length 76 20:51:41.312320 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x14), length 68 20:51:41.312713 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x13), length 60 20:51:41.533812 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x15), length 76 20:51:41.534286 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x14), length 52 20:51:42.078110 IP peer129.isp-domain.tld > vpn.my-domain.tld: ESP(spi=0x0e70e5dd,seq=0x16), length 76 20:51:42.078529 IP vpn.my-domain.tld > peer129.isp-domain.tld: ESP(spi=0xc10ef44f,seq=0x15), length 52 20:51:42.281612 IP peer129.isp-domain.tld.isakmp > vpn.my-domain.tld.isakmp: isakmp: phase 2/others I inf[E] 20:51:42.301977 IP peer129.isp-domain.tld.isakmp > vpn.my-domain.tld.isakmp: isakmp: phase 2/others I inf[E]

То есть вроде-бы все проходит пучком - сертификаты подходят, трафик шифруется и все такое...
Дальше вступает в работу L2TPD, его конфиг:
[global] ; Global parameters: port = 1701 ; * Bind to port 1701

[lns default]
ip range = 192.168.1.100 - 192.168.1.127
local ip = 192.168.1.3
; require chap = yes
; refuse pap = yes
; require authentication = yes
hostname = vpn
ppp debug = yes
pppoptfile = /etc/ppp/options.l2tpd
length bit = yes

Файл options.l2tpd
ipcp-accept-local
ipcp-accept-remote
ms-dns  192.168.1.3
ms-wins 192.168.1.3
auth
# require-eap
refuse-pap
refuse-chap
refuse-mschap
require-mschap-v2
idle 1800
mtu 1400
mru 1400
nodefaultroute
nodetach
debug
connect-delay 5000

В результате иммем следующий лог работы:
Apr 15 20:43:20 vpn l2tpd[14563]: ourtid = 18923, entropy_buf = 49eb
Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns = 0, Nr = 0 Apr 15 20:43:20 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel 18923, call 0 Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: message type 1 (Start-Control-Connection-Request) Apr 15 20:43:20 vpn l2tpd[14563]: protocol_version_avp: peer is using version 1, revision 0. Apr 15 20:43:20 vpn l2tpd[14563]: framing_caps_avp: supported peer frames: sync
Apr 15 20:43:20 vpn l2tpd[14563]: bearer_caps_avp: supported peer bearers:
Apr 15 20:43:20 vpn l2tpd[14563]: firmware_rev_avp: peer reports firmware version 1280 (0x0500) Apr 15 20:43:20 vpn l2tpd[14563]: hostname_avp: peer reports hostname 'nc6000' Apr 15 20:43:20 vpn l2tpd[14563]: vendor_avp: peer reports vendor 'Microsoft' Apr 15 20:43:20 vpn l2tpd[14563]: assigned_tunnel_avp: using peer's tunnel 22 Apr 15 20:43:20 vpn l2tpd[14563]: receive_window_size_avp: peer wants RWS of 8. Will use flow control. Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns = 1, Nr = 1 Apr 15 20:43:20 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel 18923, call 0 Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: message type 3 (Start-Control-Connection-Connected) Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns = 2, Nr = 1 Apr 15 20:43:20 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel 18923, call 0 Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: message type 10 (Incoming-Call-Request)
Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: new incoming call
Apr 15 20:43:20 vpn l2tpd[14563]: ourcid = 49908, entropy_buf = c2f4
Apr 15 20:43:20 vpn l2tpd[14563]: assigned_session_avp: assigned session id: 1
Apr 15 20:43:20 vpn l2tpd[14563]: call_serno_avp: serial number is 0
Apr 15 20:43:20 vpn l2tpd[14563]: bearer_type_avp: peer bears: analog
Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns = 3, Nr = 1 Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 1, Ns = 3, Nr = 2 Apr 15 20:43:20 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel 18923, call 49908 Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: message type 12 (Incoming-Call-Connected)
Apr 15 20:43:20 vpn l2tpd[14563]: tx_speed_avp: transmit baud rate is 41200
Apr 15 20:43:20 vpn l2tpd[14563]: frame_type_avp: peer uses:sync frames
Apr 15 20:43:20 vpn l2tpd[14563]: ignore_avp : Ignoring AVP
Apr 15 20:43:20 vpn l2tpd[14563]: start_pppd: I'm running: Apr 15 20:43:20 vpn l2tpd[14563]: "/usr/sbin/pppd"
Apr 15 20:43:20 vpn l2tpd[14563]: "passive"
Apr 15 20:43:20 vpn l2tpd[14563]: "-detach"
Apr 15 20:43:20 vpn l2tpd[14563]: "192.168.1.3:192.168.1.100"
Apr 15 20:43:20 vpn l2tpd[14563]: "debug"
Apr 15 20:43:20 vpn l2tpd[14563]: "file"
Apr 15 20:43:20 vpn l2tpd[14563]: "/etc/ppp/options.l2tpd"
Apr 15 20:43:20 vpn l2tpd[14563]: "/dev/ttyp0"
Apr 15 20:43:20 vpn l2tpd[14563]:
Apr 15 20:43:20 vpn pppd[14589]: using channel 13
Apr 15 20:43:20 vpn pppd[14589]: sent [LCP ConfReq id=0x1 <mru 1400> <asyncmap 0x0> <auth chap MS-v2> <magic 0x8e28e33> <pcomp> <accomp>] Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns = 4, Nr = 2 Apr 15 20:43:20 vpn pppd[14589]: rcvd [LCP ConfReq id=0x0 <mru 1400> <magic 0x7d6e514a> <pcomp> <accomp> <callback CBCP>]
Apr 15 20:43:20 vpn pppd[14589]: sent [LCP ConfRej id=0x0 <callback CBCP>]
Apr 15 20:43:21 vpn pppd[14589]: rcvd [LCP ConfNak id=0x1 <auth eap>]
Apr 15 20:43:21 vpn pppd[14589]: sent [LCP ConfReq id=0x2 <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>] Apr 15 20:43:21 vpn pppd[14589]: rcvd [LCP ConfReq id=0x1 <mru 1400> <magic 0x7d6e514a> <pcomp> <accomp>] Apr 15 20:43:21 vpn pppd[14589]: sent [LCP ConfAck id=0x1 <mru 1400> <magic 0x7d6e514a> <pcomp> <accomp>]
Apr 15 20:43:21 vpn pppd[14589]: rcvd [LCP ConfNak id=0x2 <auth eap>]
Apr 15 20:43:21 vpn pppd[14589]: sent [LCP ConfReq id=0x3 <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:22 vpn pppd[14589]: rcvd [LCP ConfNak id=0x3 <auth eap>]
Apr 15 20:43:22 vpn pppd[14589]: sent [LCP ConfReq id=0x4 <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:22 vpn pppd[14589]: rcvd [LCP ConfNak id=0x4 <auth eap>]
Apr 15 20:43:22 vpn pppd[14589]: sent [LCP ConfReq id=0x5 <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:22 vpn pppd[14589]: rcvd [LCP ConfNak id=0x5 <auth eap>]
Apr 15 20:43:22 vpn pppd[14589]: sent [LCP ConfReq id=0x6 <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:23 vpn pppd[14589]: rcvd [LCP ConfNak id=0x6 <auth eap>]
Apr 15 20:43:23 vpn pppd[14589]: sent [LCP ConfReq id=0x7 <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:23 vpn pppd[14589]: rcvd [LCP ConfNak id=0x7 <auth eap>]
Apr 15 20:43:23 vpn pppd[14589]: sent [LCP ConfReq id=0x8 <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:23 vpn pppd[14589]: rcvd [LCP ConfNak id=0x8 <auth eap>]
Apr 15 20:43:23 vpn pppd[14589]: sent [LCP ConfReq id=0x9 <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:23 vpn pppd[14589]: rcvd [LCP ConfNak id=0x9 <auth eap>]
Apr 15 20:43:23 vpn pppd[14589]: sent [LCP ConfReq id=0xa <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:24 vpn pppd[14589]: rcvd [LCP ConfNak id=0xa <auth eap>]
Apr 15 20:43:24 vpn pppd[14589]: sent [LCP ConfReq id=0xb <mru 1400> <asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>] Apr 15 20:43:24 vpn pppd[14589]: rcvd [LCP TermReq id=0x2 "}nQJ\000<\37777777715t\000\000\002\37777777734"]
Apr 15 20:43:24 vpn pppd[14589]: sent [LCP TermAck id=0x2]
Apr 15 20:43:24 vpn l2tpd[14563]: check_control: control, cid = 1, Ns = 4, Nr = 2 Apr 15 20:43:24 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel 18923, call 49908 Apr 15 20:43:24 vpn l2tpd[14563]: message_type_avp: message type 14 (Call-Disconnect-Notify) Apr 15 20:43:24 vpn l2tpd[14563]: result_code_avp: peer closing for reason 3 (Call disconnected for administrative reasons), error = 0 () Apr 15 20:43:24 vpn l2tpd[14563]: assigned_session_avp: assigned session id: 1 Apr 15 20:43:24 vpn l2tpd[14563]: control_finish: Peer tried to disconnect without specifying call ID Apr 15 20:43:24 vpn l2tpd[14563]: check_control: control, cid = 0, Ns = 5, Nr = 2 Apr 15 20:43:24 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel 18923, call 0 Apr 15 20:43:24 vpn l2tpd[14563]: message_type_avp: message type 4 (Stop-Control-Connection-Notification) Apr 15 20:43:24 vpn l2tpd[14563]: assigned_tunnel_avp: using peer's tunnel 22 Apr 15 20:43:24 vpn l2tpd[14563]: result_code_avp: peer closing for reason 6 (Requester is being shut down), error = 0 ()

Да из эксперементов, если разрешить использование EAP для PPPD, то лог pppd выглядит:

Apr 15 21:10:17 vpn pppd[15056]: using channel 15
Apr 15 21:10:17 vpn pppd[15056]: sent [LCP ConfReq id=0x1 <mru 1400> <asyncmap 0x0> <auth eap> <magic 0xb9b65849> <pcomp> <accomp>] Apr 15 21:10:17 vpn pppd[15056]: rcvd [LCP ConfReq id=0x0 <mru 1400> <magic 0xe903653> <pcomp> <accomp> <callback CBCP>]
Apr 15 21:10:17 vpn pppd[15056]: sent [LCP ConfRej id=0x0 <callback CBCP>]
Apr 15 21:10:17 vpn pppd[15056]: rcvd [LCP ConfAck id=0x1 <mru 1400> <asyncmap 0x0> <auth eap> <magic 0xb9b65849> <pcomp> <accomp>] Apr 15 21:10:17 vpn pppd[15056]: rcvd [LCP ConfReq id=0x1 <mru 1400> <magic 0xe903653> <pcomp> <accomp>] Apr 15 21:10:17 vpn pppd[15056]: sent [LCP ConfAck id=0x1 <mru 1400> <magic 0xe903653> <pcomp> <accomp>]
Apr 15 21:10:17 vpn pppd[15056]: sent [LCP EchoReq id=0x0 magic=0xb9b65849]
Apr 15 21:10:17 vpn pppd[15056]: sent [EAP Request id=0xd8 Identity <Message "Name">] Apr 15 21:10:18 vpn pppd[15056]: rcvd [LCP Ident id=0x2 magic=0xe903653 "MSRASV5.10"] Apr 15 21:10:18 vpn pppd[15056]: rcvd [LCP Ident id=0x3 magic=0xe903653 "MSRAS-0-NC6000"]
Apr 15 21:10:18 vpn pppd[15056]: rcvd [LCP EchoRep id=0x0 magic=0xe903653]
Apr 15 21:10:18 vpn pppd[15056]: rcvd [EAP Response id=0xd8 Identity <Name "nc6000">] Apr 15 21:10:18 vpn pppd[15056]: sent [EAP Request id=0xd9 MD5-Challenge <Value 17 04 36 0d 80 1d d7 05 c5 8f 3b f8 f3 ba a0 1d 8a a5 d8 47 df Apr 15 21:10:18 vpn pppd[15056]: rcvd [EAP Response id=0xd9 Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:18 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:18 vpn pppd[15056]: sent [EAP Request id=0xda MD5-Challenge <Value c0 12 29 1d 4a 05 1f b5 c0 58 52 65 0e c3 03 dd a6 78 72 67 72 Apr 15 21:10:18 vpn pppd[15056]: rcvd [EAP Response id=0xda Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:18 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:18 vpn pppd[15056]: sent [EAP Request id=0xdb MD5-Challenge <Value 65 2c 6c 99 d4 f8 c6 c6 07 e8 01 8e da 2f ee 13 d0> <Name "vpn Apr 15 21:10:18 vpn pppd[15056]: rcvd [EAP Response id=0xdb Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:18 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:18 vpn pppd[15056]: sent [EAP Request id=0xdc MD5-Challenge <Value 68 69 98 c1 d1 fe 7a 45 66 44 71 82 6e 32 66 3e 3d> <Name "sou Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xdc Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xdd MD5-Challenge <Value 36 6f d7 54 ea 88 7b 77 4b d2 7c 41 84 8e 6e fd 2a 51 51 f1> < Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xdd Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xde MD5-Challenge <Value 74 b1 53 35 88 88 0f 34 a1 bc c9 8a e6 93 eb 6d b9 ec> <Name " Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xde Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xdf MD5-Challenge <Value 9a 75 42 9b eb 86 ac 2e 3e 7a 96 1e 28 b3 d7 af> <Name "vpn" Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xdf Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xe0 MD5-Challenge <Value dd f0 31 4f 67 66 36 be 7c c8 0b 46 4c bd 17 a8 cb e6 92> <Nam Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xe0 Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xe1 MD5-Challenge <Value a2 ac b0 cf 3f 83 d3 30 9c 5b ed 7a 70 59 4d 50 72> <Name "vpn Apr 15 21:10:20 vpn pppd[15056]: rcvd [EAP Response id=0xe1 Nak <Suggested-type 0d (TLS)>]
Apr 15 21:10:20 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:20 vpn pppd[15056]: sent [EAP Failure id=0xe3]
Apr 15 21:10:20 vpn pppd[15056]: sent [LCP TermReq id=0x2 "Authentication failed"] Apr 15 21:10:20 vpn pppd[15056]: rcvd [LCP TermAck id=0x2 "Authentication failed"]


Может кто боролся с этим ?
Или какие советы может дать ?

Искал в гугле на эту тему - ни чего не нашел, типа с такими-же конфигами должен завестись и все.

--
Andrey Chernomyrdin



Reply to: