Вопросы про racoon + l2tp для связи с Windows-XP
День добрый,
Захотел я тут сделать VPN-сервер для того что-бы диалап пользователи
могли безопасно доступатся до ресурсов локальной сети из своих
Windows-XP машин.
Установил racoon и l2tpd, сконфигурил, но что-то авторизация для PPP не
проходит (который используется в l2tp)
Вот что у меня в racoon.conf написанно:
path certificate "/etc/racoon/certs";
log info;
padding
{
maximum_length 20; # maximum padding length.
randomize off; # enable randomize length.
strict_check off; # enable strict check.
exclusive_tail off; # extract last one octet.
}
listen
{
isakmp 1.2.3.4 [500];
isakmp_natt 1.2.3.4 [4500];
}
timer
{
natt_keepalive 10 sec;
# These value can be changed per remote node.
counter 5; # maximum trying count to send.
interval 20 sec; # maximum interval to resend.
persend 1; # the number of packets per a send.
phase1 30 sec;
phase2 15 sec;
}
remote anonymous
{
exchange_mode main,aggressive;
doi ipsec_doi;
situation identity_only;
certificate_type x509 "ipsec-server.crt" "ipsec-server.key";
peers_certfile "ipsec-peer1.crt";
passive on;
generate_policy on;
nonce_size 16;
lifetime time 60 min; # sec,min,hour
initial_contact on;
#support_mip6 on;
proposal_check obey; # obey, strict or claim
proposal {
encryption_algorithm 3des;
hash_algorithm sha1;
authentication_method rsasig ;
dh_group 2 ;
}
}
sainfo anonymous
{
pfs_group 1;
lifetime time 30 sec;
encryption_algorithm 3des, des ;
authentication_algorithm hmac_sha1, hmac_md5;
compression_algorithm deflate ;
}
Собственно тут все вроде-бы как нормально работает:
Вот кусок tcpdump-лога
20:51:34.544235 IP peer129.isp-domain.tld.isakmp >
vpn.my-domain.tld.isakmp: isakmp: phase 1 I ident
20:51:34.545356 IP vpn.my-domain.tld.isakmp >
peer129.isp-domain.tld.isakmp: isakmp: phase 1 R ident
20:51:34.885407 IP peer129.isp-domain.tld.isakmp >
vpn.my-domain.tld.isakmp: isakmp: phase 1 I ident
20:51:34.896418 IP vpn.my-domain.tld.isakmp >
peer129.isp-domain.tld.isakmp: isakmp: phase 1 R ident
20:51:35.517154 IP peer129.isp-domain.tld.isakmp >
vpn.my-domain.tld.isakmp: isakmp: phase 1 I ident[E]
20:51:35.524958 IP vpn.my-domain.tld.isakmp >
peer129.isp-domain.tld.isakmp: isakmp: phase 1 R ident[E]
20:51:36.328294 IP peer129.isp-domain.tld.isakmp >
vpn.my-domain.tld.isakmp: isakmp: phase 2/others I oakley-quick[E]
20:51:36.329799 IP vpn.my-domain.tld.isakmp >
peer129.isp-domain.tld.isakmp: isakmp: phase 2/others R oakley-quick[E]
20:51:36.584142 IP peer129.isp-domain.tld.isakmp >
vpn.my-domain.tld.isakmp: isakmp: phase 2/others I oakley-quick[E]
20:51:36.620872 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x1), length 140
20:51:37.599535 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x2), length 140
20:51:37.600390 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x1), length 140
20:51:37.862130 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x3), length 60
20:51:37.862493 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x2), length 52
20:51:37.898856 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x4), length 92
20:51:37.899359 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x3), length 68
20:51:37.899398 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x4), length 52
20:51:37.911474 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x5), length 52
20:51:38.119351 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x6), length 92
20:51:38.120792 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x5), length 52
20:51:38.136013 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x6), length 84
20:51:38.154828 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x7), length 52
20:51:38.166822 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x8), length 76
20:51:38.167213 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x7), length 60
20:51:38.357957 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x9), length 60
20:51:38.358248 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x8), length 76
20:51:38.389063 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0xa), length 68
20:51:38.389310 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x9), length 68
20:51:38.577826 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0xb), length 60
20:51:38.578104 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0xa), length 76
20:51:38.792698 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0xc), length 60
20:51:38.792985 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0xb), length 76
20:51:38.986332 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0xd), length 60
20:51:38.986607 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0xc), length 76
20:51:40.082927 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0xe), length 60
20:51:40.083270 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0xd), length 76
20:51:40.275186 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0xf), length 60
20:51:40.275604 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0xe), length 76
20:51:40.485062 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x10), length 60
20:51:40.485290 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0xf), length 76
20:51:40.678696 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x11), length 60
20:51:40.679017 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x10), length 76
20:51:40.899317 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x12), length 60
20:51:40.899698 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x11), length 76
20:51:41.109690 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x13), length 60
20:51:41.110010 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x12), length 76
20:51:41.312320 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x14), length 68
20:51:41.312713 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x13), length 60
20:51:41.533812 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x15), length 76
20:51:41.534286 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x14), length 52
20:51:42.078110 IP peer129.isp-domain.tld > vpn.my-domain.tld:
ESP(spi=0x0e70e5dd,seq=0x16), length 76
20:51:42.078529 IP vpn.my-domain.tld > peer129.isp-domain.tld:
ESP(spi=0xc10ef44f,seq=0x15), length 52
20:51:42.281612 IP peer129.isp-domain.tld.isakmp >
vpn.my-domain.tld.isakmp: isakmp: phase 2/others I inf[E]
20:51:42.301977 IP peer129.isp-domain.tld.isakmp >
vpn.my-domain.tld.isakmp: isakmp: phase 2/others I inf[E]
То есть вроде-бы все проходит пучком - сертификаты подходят, трафик
шифруется и все такое...
Дальше вступает в работу L2TPD, его конфиг:
[global]
; Global parameters:
port = 1701 ; * Bind
to port 1701
[lns default]
ip range = 192.168.1.100 - 192.168.1.127
local ip = 192.168.1.3
; require chap = yes
; refuse pap = yes
; require authentication = yes
hostname = vpn
ppp debug = yes
pppoptfile = /etc/ppp/options.l2tpd
length bit = yes
Файл options.l2tpd
ipcp-accept-local
ipcp-accept-remote
ms-dns 192.168.1.3
ms-wins 192.168.1.3
auth
# require-eap
refuse-pap
refuse-chap
refuse-mschap
require-mschap-v2
idle 1800
mtu 1400
mru 1400
nodefaultroute
nodetach
debug
connect-delay 5000
В результате иммем следующий лог работы:
Apr 15 20:43:20 vpn l2tpd[14563]: ourtid = 18923, entropy_buf = 49eb
Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns =
0, Nr = 0
Apr 15 20:43:20 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel
18923, call 0
Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: message type 1
(Start-Control-Connection-Request)
Apr 15 20:43:20 vpn l2tpd[14563]: protocol_version_avp: peer is using
version 1, revision 0.
Apr 15 20:43:20 vpn l2tpd[14563]: framing_caps_avp: supported peer
frames: sync
Apr 15 20:43:20 vpn l2tpd[14563]: bearer_caps_avp: supported peer bearers:
Apr 15 20:43:20 vpn l2tpd[14563]: firmware_rev_avp: peer reports
firmware version 1280 (0x0500)
Apr 15 20:43:20 vpn l2tpd[14563]: hostname_avp: peer reports hostname
'nc6000'
Apr 15 20:43:20 vpn l2tpd[14563]: vendor_avp: peer reports vendor
'Microsoft'
Apr 15 20:43:20 vpn l2tpd[14563]: assigned_tunnel_avp: using peer's
tunnel 22
Apr 15 20:43:20 vpn l2tpd[14563]: receive_window_size_avp: peer wants
RWS of 8. Will use flow control.
Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns =
1, Nr = 1
Apr 15 20:43:20 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel
18923, call 0
Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: message type 3
(Start-Control-Connection-Connected)
Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns =
2, Nr = 1
Apr 15 20:43:20 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel
18923, call 0
Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: message type 10
(Incoming-Call-Request)
Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: new incoming call
Apr 15 20:43:20 vpn l2tpd[14563]: ourcid = 49908, entropy_buf = c2f4
Apr 15 20:43:20 vpn l2tpd[14563]: assigned_session_avp: assigned session
id: 1
Apr 15 20:43:20 vpn l2tpd[14563]: call_serno_avp: serial number is 0
Apr 15 20:43:20 vpn l2tpd[14563]: bearer_type_avp: peer bears: analog
Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns =
3, Nr = 1
Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 1, Ns =
3, Nr = 2
Apr 15 20:43:20 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel
18923, call 49908
Apr 15 20:43:20 vpn l2tpd[14563]: message_type_avp: message type 12
(Incoming-Call-Connected)
Apr 15 20:43:20 vpn l2tpd[14563]: tx_speed_avp: transmit baud rate is 41200
Apr 15 20:43:20 vpn l2tpd[14563]: frame_type_avp: peer uses:sync frames
Apr 15 20:43:20 vpn l2tpd[14563]: ignore_avp : Ignoring AVP
Apr 15 20:43:20 vpn l2tpd[14563]: start_pppd: I'm running:
Apr 15 20:43:20 vpn l2tpd[14563]: "/usr/sbin/pppd"
Apr 15 20:43:20 vpn l2tpd[14563]: "passive"
Apr 15 20:43:20 vpn l2tpd[14563]: "-detach"
Apr 15 20:43:20 vpn l2tpd[14563]: "192.168.1.3:192.168.1.100"
Apr 15 20:43:20 vpn l2tpd[14563]: "debug"
Apr 15 20:43:20 vpn l2tpd[14563]: "file"
Apr 15 20:43:20 vpn l2tpd[14563]: "/etc/ppp/options.l2tpd"
Apr 15 20:43:20 vpn l2tpd[14563]: "/dev/ttyp0"
Apr 15 20:43:20 vpn l2tpd[14563]:
Apr 15 20:43:20 vpn pppd[14589]: using channel 13
Apr 15 20:43:20 vpn pppd[14589]: sent [LCP ConfReq id=0x1 <mru 1400>
<asyncmap 0x0> <auth chap MS-v2> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:20 vpn l2tpd[14563]: check_control: control, cid = 0, Ns =
4, Nr = 2
Apr 15 20:43:20 vpn pppd[14589]: rcvd [LCP ConfReq id=0x0 <mru 1400>
<magic 0x7d6e514a> <pcomp> <accomp> <callback CBCP>]
Apr 15 20:43:20 vpn pppd[14589]: sent [LCP ConfRej id=0x0 <callback CBCP>]
Apr 15 20:43:21 vpn pppd[14589]: rcvd [LCP ConfNak id=0x1 <auth eap>]
Apr 15 20:43:21 vpn pppd[14589]: sent [LCP ConfReq id=0x2 <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:21 vpn pppd[14589]: rcvd [LCP ConfReq id=0x1 <mru 1400>
<magic 0x7d6e514a> <pcomp> <accomp>]
Apr 15 20:43:21 vpn pppd[14589]: sent [LCP ConfAck id=0x1 <mru 1400>
<magic 0x7d6e514a> <pcomp> <accomp>]
Apr 15 20:43:21 vpn pppd[14589]: rcvd [LCP ConfNak id=0x2 <auth eap>]
Apr 15 20:43:21 vpn pppd[14589]: sent [LCP ConfReq id=0x3 <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:22 vpn pppd[14589]: rcvd [LCP ConfNak id=0x3 <auth eap>]
Apr 15 20:43:22 vpn pppd[14589]: sent [LCP ConfReq id=0x4 <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:22 vpn pppd[14589]: rcvd [LCP ConfNak id=0x4 <auth eap>]
Apr 15 20:43:22 vpn pppd[14589]: sent [LCP ConfReq id=0x5 <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:22 vpn pppd[14589]: rcvd [LCP ConfNak id=0x5 <auth eap>]
Apr 15 20:43:22 vpn pppd[14589]: sent [LCP ConfReq id=0x6 <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:23 vpn pppd[14589]: rcvd [LCP ConfNak id=0x6 <auth eap>]
Apr 15 20:43:23 vpn pppd[14589]: sent [LCP ConfReq id=0x7 <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:23 vpn pppd[14589]: rcvd [LCP ConfNak id=0x7 <auth eap>]
Apr 15 20:43:23 vpn pppd[14589]: sent [LCP ConfReq id=0x8 <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:23 vpn pppd[14589]: rcvd [LCP ConfNak id=0x8 <auth eap>]
Apr 15 20:43:23 vpn pppd[14589]: sent [LCP ConfReq id=0x9 <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:23 vpn pppd[14589]: rcvd [LCP ConfNak id=0x9 <auth eap>]
Apr 15 20:43:23 vpn pppd[14589]: sent [LCP ConfReq id=0xa <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:24 vpn pppd[14589]: rcvd [LCP ConfNak id=0xa <auth eap>]
Apr 15 20:43:24 vpn pppd[14589]: sent [LCP ConfReq id=0xb <mru 1400>
<asyncmap 0x0> <magic 0x8e28e33> <pcomp> <accomp>]
Apr 15 20:43:24 vpn pppd[14589]: rcvd [LCP TermReq id=0x2
"}nQJ\000<\37777777715t\000\000\002\37777777734"]
Apr 15 20:43:24 vpn pppd[14589]: sent [LCP TermAck id=0x2]
Apr 15 20:43:24 vpn l2tpd[14563]: check_control: control, cid = 1, Ns =
4, Nr = 2
Apr 15 20:43:24 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel
18923, call 49908
Apr 15 20:43:24 vpn l2tpd[14563]: message_type_avp: message type 14
(Call-Disconnect-Notify)
Apr 15 20:43:24 vpn l2tpd[14563]: result_code_avp: peer closing for
reason 3 (Call disconnected for administrative reasons), error = 0 ()
Apr 15 20:43:24 vpn l2tpd[14563]: assigned_session_avp: assigned session
id: 1
Apr 15 20:43:24 vpn l2tpd[14563]: control_finish: Peer tried to
disconnect without specifying call ID
Apr 15 20:43:24 vpn l2tpd[14563]: check_control: control, cid = 0, Ns =
5, Nr = 2
Apr 15 20:43:24 vpn l2tpd[14563]: handle_avps: handling avp's for tunnel
18923, call 0
Apr 15 20:43:24 vpn l2tpd[14563]: message_type_avp: message type 4
(Stop-Control-Connection-Notification)
Apr 15 20:43:24 vpn l2tpd[14563]: assigned_tunnel_avp: using peer's
tunnel 22
Apr 15 20:43:24 vpn l2tpd[14563]: result_code_avp: peer closing for
reason 6 (Requester is being shut down), error = 0 ()
Да из эксперементов, если разрешить использование EAP для PPPD, то лог
pppd выглядит:
Apr 15 21:10:17 vpn pppd[15056]: using channel 15
Apr 15 21:10:17 vpn pppd[15056]: sent [LCP ConfReq id=0x1 <mru 1400>
<asyncmap 0x0> <auth eap> <magic 0xb9b65849> <pcomp> <accomp>]
Apr 15 21:10:17 vpn pppd[15056]: rcvd [LCP ConfReq id=0x0 <mru 1400>
<magic 0xe903653> <pcomp> <accomp> <callback CBCP>]
Apr 15 21:10:17 vpn pppd[15056]: sent [LCP ConfRej id=0x0 <callback CBCP>]
Apr 15 21:10:17 vpn pppd[15056]: rcvd [LCP ConfAck id=0x1 <mru 1400>
<asyncmap 0x0> <auth eap> <magic 0xb9b65849> <pcomp> <accomp>]
Apr 15 21:10:17 vpn pppd[15056]: rcvd [LCP ConfReq id=0x1 <mru 1400>
<magic 0xe903653> <pcomp> <accomp>]
Apr 15 21:10:17 vpn pppd[15056]: sent [LCP ConfAck id=0x1 <mru 1400>
<magic 0xe903653> <pcomp> <accomp>]
Apr 15 21:10:17 vpn pppd[15056]: sent [LCP EchoReq id=0x0 magic=0xb9b65849]
Apr 15 21:10:17 vpn pppd[15056]: sent [EAP Request id=0xd8 Identity
<Message "Name">]
Apr 15 21:10:18 vpn pppd[15056]: rcvd [LCP Ident id=0x2 magic=0xe903653
"MSRASV5.10"]
Apr 15 21:10:18 vpn pppd[15056]: rcvd [LCP Ident id=0x3 magic=0xe903653
"MSRAS-0-NC6000"]
Apr 15 21:10:18 vpn pppd[15056]: rcvd [LCP EchoRep id=0x0 magic=0xe903653]
Apr 15 21:10:18 vpn pppd[15056]: rcvd [EAP Response id=0xd8 Identity
<Name "nc6000">]
Apr 15 21:10:18 vpn pppd[15056]: sent [EAP Request id=0xd9 MD5-Challenge
<Value 17 04 36 0d 80 1d d7 05 c5 8f 3b f8 f3 ba a0 1d 8a a5 d8 47 df
Apr 15 21:10:18 vpn pppd[15056]: rcvd [EAP Response id=0xd9 Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:18 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:18 vpn pppd[15056]: sent [EAP Request id=0xda MD5-Challenge
<Value c0 12 29 1d 4a 05 1f b5 c0 58 52 65 0e c3 03 dd a6 78 72 67 72
Apr 15 21:10:18 vpn pppd[15056]: rcvd [EAP Response id=0xda Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:18 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:18 vpn pppd[15056]: sent [EAP Request id=0xdb MD5-Challenge
<Value 65 2c 6c 99 d4 f8 c6 c6 07 e8 01 8e da 2f ee 13 d0> <Name "vpn
Apr 15 21:10:18 vpn pppd[15056]: rcvd [EAP Response id=0xdb Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:18 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:18 vpn pppd[15056]: sent [EAP Request id=0xdc MD5-Challenge
<Value 68 69 98 c1 d1 fe 7a 45 66 44 71 82 6e 32 66 3e 3d> <Name "sou
Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xdc Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xdd MD5-Challenge
<Value 36 6f d7 54 ea 88 7b 77 4b d2 7c 41 84 8e 6e fd 2a 51 51 f1> <
Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xdd Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xde MD5-Challenge
<Value 74 b1 53 35 88 88 0f 34 a1 bc c9 8a e6 93 eb 6d b9 ec> <Name "
Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xde Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xdf MD5-Challenge
<Value 9a 75 42 9b eb 86 ac 2e 3e 7a 96 1e 28 b3 d7 af> <Name "vpn"
Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xdf Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xe0 MD5-Challenge
<Value dd f0 31 4f 67 66 36 be 7c c8 0b 46 4c bd 17 a8 cb e6 92> <Nam
Apr 15 21:10:19 vpn pppd[15056]: rcvd [EAP Response id=0xe0 Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:19 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:19 vpn pppd[15056]: sent [EAP Request id=0xe1 MD5-Challenge
<Value a2 ac b0 cf 3f 83 d3 30 9c 5b ed 7a 70 59 4d 50 72> <Name "vpn
Apr 15 21:10:20 vpn pppd[15056]: rcvd [EAP Response id=0xe1 Nak
<Suggested-type 0d (TLS)>]
Apr 15 21:10:20 vpn pppd[15056]: EAP: peer requesting unknown Type 13
Apr 15 21:10:20 vpn pppd[15056]: sent [EAP Failure id=0xe3]
Apr 15 21:10:20 vpn pppd[15056]: sent [LCP TermReq id=0x2
"Authentication failed"]
Apr 15 21:10:20 vpn pppd[15056]: rcvd [LCP TermAck id=0x2
"Authentication failed"]
Может кто боролся с этим ?
Или какие советы может дать ?
Искал в гугле на эту тему - ни чего не нашел, типа с такими-же конфигами
должен завестись и все.
--
Andrey Chernomyrdin
Reply to: