bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-18 07:36 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-09-18 07:36 MET ------- There are still some problems with the PPtP helper, I'm currently trying to fix these. Can you attach a tcpdump of a failed attempt please? -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-18 07:36 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-09-18 07:36 MET ------- There are still some problems with the PPtP helper, I'm currently trying to fix these. Can you attach a tcpdump of a failed attempt please? -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the reporter.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-19 02:33 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-09-19 02:33 MET ------- (In reply to comment #1)> There are still some problems with the PPtP helper, I'm currently trying tofix> these. Can you attach a tcpdump of a failed attempt please?Yep, certainly: # tcpdump -vv -i eth0 tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 09:37:17.404823 IP (tos 0x0, ttl 128, id 18838, offset 0, flags [DF], proto 6, length: 48) 192.168.77.100.1484 > 192.168.77.101.1723: S [tcp sum ok] 2074060463:2074060463(0) win 64512 <mss 1460,nop,nop,sackOK> 09:37:17.458621 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 6, length: 48) 192.168.77.101.1723 > 192.168.77.100.1484: S [tcp sum ok] 3986707529:3986707529(0) ack 2074060464 win 5840 <mss 1460,nop,nop,sackOK> 09:37:17.404944 IP (tos 0x0, ttl 128, id 18839, offset 0, flags [DF], proto 6, length: 196) 192.168.77.100.1484 > 192.168.77.101.1723: P 1:157(156) ack 1 win 64512: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRQ PROTO_VER(1.0) FRAME_CAP(A) BEARER_CAP(A) MAX_CHAN(0) FIRM_REV(2600) [|pptp] 09:37:17.404976 IP (tos 0x0, ttl 64, id 25301, offset 0, flags [DF], proto 6, length: 40) 192.168.77.101.1723 > 192.168.77.100.1484: . [tcp sum ok] 1:1(0) ack 157 win 6432 09:37:17.405538 IP (tos 0x0, ttl 64, id 13983, offset 0, flags [DF], proto 17, length: 73) 192.168.77.101.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 20323+ PTR? 101.77.168.192.in-addr.arpa. (45) 09:37:17.406864 IP (tos 0x0, ttl 64, id 25302, offset 0, flags [DF], proto 6, length: 196) 192.168.77.101.1723 > 192.168.77.100.1484: P 1:157(156) ack 157 win 6432: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRP PROTO_VER(1.0) RESULT_CODE(1:Successful channel establishment) ERR_CODE(0:None) FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) [|pptp] 09:37:17.407073 IP (tos 0x0, ttl 128, id 18840, offset 0, flags [DF], proto 6, length: 208) 192.168.77.100.1484 > 192.168.77.101.1723: P 157:325(168) ack 157 win 64356: pptp Length=168 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRQ CALL_ID(16384) CALL_SER_NUM(56177) MIN_BPS(300) MAX_BPS(100000000) BEARER_TYPE (Any) FRAME_TYPE(E) RECV_WIN(64) PROC_DELAY(0) PHONE_NO_LEN(0) [|pptp] 09:37:17.425468 IP (tos 0x0, ttl 252, id 1239, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.101.32769: 20323 NXDomain q: PTR? 101.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-addr.arpa. (122) 09:37:17.438260 IP (tos 0x0, ttl 64, id 13986, offset 0, flags [DF], proto 17, length: 73) 192.168.77.101.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 20521+ PTR? 100.77.168.192.in-addr.arpa. (45) 09:37:17.438771 IP (tos 0x0, ttl 64, id 25303, offset 0, flags [DF], proto 6, length: 72) 192.168.77.101.1723 > 192.168.77.100.1484: P [tcp sum ok] 157:189 (32) ack 325 win 7504: pptp Length=32 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRP CALL_ID(256) PEER_CALL_ID(16384) RESULT_CODE(1:Connected) ERR_CODE(0:None) CAUSE_CODE(0) CONN_SPEED(100000000) RECV_WIN(64) PROC_DELAY(0) PHY_CHAN_ID(0) 09:37:17.438831 IP (tos 0x0, ttl 64, id 13986, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 0 gre-ppp- payload 09:37:17.442873 IP (tos 0x0, ttl 128, id 18841, offset 0, flags [DF], proto 6, length: 64) 192.168.77.100.1484 > 192.168.77.101.1723: P [tcp sum ok] 325:349 (24) ack 189 win 64324: pptp Length=24 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SLI PEER_CALL_ID(256) SEND_ACCM(0xffffffff) RECV_ACCM(0xffffffff) 09:37:17.445866 IP (tos 0x0, ttl 128, id 18842, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 0 gre-ppp- payload 09:37:17.446016 IP (tos 0x0, ttl 64, id 13987, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 1 ack 0 gre- ppp-payload 09:37:17.458391 IP (tos 0x0, ttl 252, id 1240, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.101.32769: 20521 NXDomain q: PTR? 100.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-addr.arpa. (122) 09:37:17.458958 IP (tos 0x0, ttl 64, id 13988, offset 0, flags [DF], proto 17, length: 71) 192.168.77.101.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 60947+ PTR? 20.20.21.203.in-addr.arpa. (43) 09:37:17.480558 IP (tos 0x0, ttl 64, id 25304, offset 0, flags [DF], proto 6, length: 40) 192.168.77.101.1723 > 192.168.77.100.1484: . [tcp sum ok] 189:189 (0) ack 349 win 7504 09:37:17.490967 IP (tos 0x0, ttl 252, id 1241, offset 0, flags [DF], proto 17, length: 432) dnscache01.westnet.com.au.domain > 192.168.77.101.32769: 60947 q: PTR? 20.20.21.203.in-addr.arpa. 1/6/9 20.20.21.203.in-addr.arpa.[|domain] 09:37:19.439942 IP (tos 0x0, ttl 128, id 18843, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 1 gre-ppp- payload 09:37:19.440205 IP (tos 0x0, ttl 64, id 13988, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 2 ack 1 gre- ppp-payload 09:37:20.440644 IP (tos 0x0, ttl 64, id 13989, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 3 gre-ppp- payload 09:37:22.437480 IP (tos 0x0, ttl 128, id 18844, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 2 gre-ppp- payload 09:37:22.437764 IP (tos 0x0, ttl 64, id 13990, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 4 ack 2 gre- ppp-payload 09:37:23.450629 IP (tos 0x0, ttl 64, id 13991, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 5 gre-ppp- payload 09:37:26.437747 IP (tos 0x0, ttl 128, id 18845, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 3 gre-ppp- payload 09:37:26.438028 IP (tos 0x0, ttl 64, id 13992, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 6 ack 3 gre- ppp-payload 09:37:26.490585 IP (tos 0x0, ttl 64, id 13993, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 7 gre-ppp- payload 09:37:29.490604 IP (tos 0x0, ttl 64, id 13994, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 8 gre-ppp- payload 09:37:30.437725 IP (tos 0x0, ttl 128, id 18850, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 4 gre-ppp- payload 09:37:30.438011 IP (tos 0x0, ttl 64, id 13995, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 9 ack 4 gre- ppp-payload 09:37:32.490638 IP (tos 0x0, ttl 64, id 13996, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 10 gre-ppp- payload 09:37:34.437723 IP (tos 0x0, ttl 128, id 18851, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 5 gre-ppp- payload 09:37:34.438003 IP (tos 0x0, ttl 64, id 13997, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 11 ack 5 gre- ppp-payload 09:37:35.500630 IP (tos 0x0, ttl 64, id 13998, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 12 gre-ppp- payload 09:37:38.437800 IP (tos 0x0, ttl 128, id 18852, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 6 gre-ppp- payload 09:37:38.438079 IP (tos 0x0, ttl 64, id 13999, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 13 ack 6 gre- ppp-payload 09:37:38.510613 IP (tos 0x0, ttl 64, id 14000, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 14 gre-ppp- payload 09:37:41.510640 IP (tos 0x0, ttl 64, id 14001, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 15 gre-ppp- payload 09:37:42.437931 IP (tos 0x0, ttl 128, id 18853, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 7 gre-ppp- payload 09:37:42.438217 IP (tos 0x0, ttl 64, id 14002, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 16 ack 7 gre- ppp-payload 09:37:44.520641 IP (tos 0x0, ttl 64, id 14003, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 17 gre-ppp- payload 09:37:46.438131 IP (tos 0x0, ttl 128, id 18854, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 8 gre-ppp- payload 09:37:46.438419 IP (tos 0x0, ttl 64, id 14004, offset 0, flags [DF], proto 47, length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 18 ack 8 gre- ppp-payload 09:37:47.624275 IP (tos 0x0, ttl 64, id 14005, offset 0, flags [DF], proto 47, length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 19 gre-ppp- payload 09:37:47.737442 IP (tos 0x0, ttl 64, id 25305, offset 0, flags [DF], proto 6, length: 40) 192.168.77.101.1723 > 192.168.77.100.1484: F [tcp sum ok] 189:189 (0) ack 349 win 7504 09:37:47.737602 IP (tos 0x0, ttl 128, id 18855, offset 0, flags [DF], proto 6, length: 40) 192.168.77.100.1484 > 192.168.77.101.1723: F [tcp sum ok] 349:349 (0) ack 190 win 64324 09:37:47.737642 IP (tos 0x0, ttl 64, id 25306, offset 0, flags [DF], proto 6, length: 40) 192.168.77.101.1723 > 192.168.77.100.1484: . [tcp sum ok] 190:190 (0) ack 350 win 7504 47 packets captured 47 packets received by filter 0 packets dropped by kernel -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-21 09:45 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-09-21 09:45 MET ------- I've just submitted my first batch of PPTP fixes. I'm attaching a backport to 2.6.17-stable, please try if it changes anything. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-21 09:45 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-09-21 09:45 MET ------- I've just submitted my first batch of PPTP fixes. I'm attaching a backport to 2.6.17-stable, please try if it changes anything. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the reporter.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-21 09:45 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-09-21 09:45 MET ------- Created an attachment (id=269) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=269&action=view) backport of PPTP fixes -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the reporter.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-21 09:45 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-09-21 09:45 MET ------- Created an attachment (id=269) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=269&action=view) backport of PPTP fixes -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-24 08:28 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-09-24 08:27 MET ------- (In reply to comment #4)> Created an attachment (id=269)--> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=269&action=view) [edit]> backport of PPTP fixesI've applied the patches. Unfortunately I still get the same problem. Here is a new tcpdump: tcpdump -vv -i eth0 tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 14:59:27.320305 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 17, length: 157) 192.168.77.254.2944 > 192.168.77.255.snmptrap: { SNMPv1 { Trap (35) E:3955.2.2.1 10.128.34.222 enterpriseSpecific s=1 12 [|snmp] } } 14:59:27.322609 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 17, length: 156) 192.168.77.254.2944 > 192.168.77.255.snmptrap: { SNMPv1 { Trap (35) E:3955.2.2.1 10.128.34.222 enterpriseSpecific s=1 12 [|snmp] } } 14:59:27.338080 arp who-has 192.168.77.254 tell 192.168.77.102 14:59:27.338511 arp reply 192.168.77.254 is-at 00:16:b6:0a:74:2a 14:59:27.338518 IP (tos 0x0, ttl 64, id 14138, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 59115+ PTR? 255.77.168.192.in-addr.arpa. (45) 14:59:27.357260 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 17, length: 155) 192.168.77.254.2944 > 192.168.77.255.snmptrap: { SNMPv1 { Trap (35) E:3955.2.2.1 10.128.34.222 enterpriseSpecific s=1 12 [|snmp] } } 14:59:27.380507 IP (tos 0x0, ttl 252, id 58705, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 59115 NXDomain q: PTR? 255.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 14:59:27.380649 IP (tos 0x0, ttl 64, id 14143, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 39483+ PTR? 254.77.168.192.in-addr.arpa. (45) 14:59:27.403759 IP (tos 0x0, ttl 252, id 58706, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 39483 NXDomain q: PTR? 254.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 14:59:27.404068 IP (tos 0x0, ttl 64, id 14145, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 58375+ PTR? 102.77.168.192.in-addr.arpa. (45) 14:59:27.425878 IP (tos 0x0, ttl 252, id 58707, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 58375 NXDomain q: PTR? 102.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 14:59:27.437687 IP (tos 0x0, ttl 64, id 14148, offset 0, flags [DF], proto 17, length: 71) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 11039+ PTR? 20.20.21.203.in-addr.arpa. (43) 14:59:27.461919 IP (tos 0x0, ttl 252, id 58708, offset 0, flags [DF], proto 17, length: 432) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 11039 q: PTR? 20.20.21.203.in-addr.arpa. 1/6/9 20.20.21.203.in-addr.arpa. [|domain] 14:59:30.516753 IP (tos 0x0, ttl 128, id 3105, offset 0, flags [DF], proto 6, length: 48) 192.168.77.100.1129 > 192.168.77.102.1723: S [tcp sum ok] 824300613:824300613(0) win 64512 <mss 1460,nop,nop,sackOK> 14:59:30.516823 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 6, length: 48) 192.168.77.102.1723 > 192.168.77.100.1129: S [tcp sum ok] 4048616351:4048616351(0) ack 824300614 win 5840 <mss 1460,nop,nop,sackOK> 14:59:30.516977 IP (tos 0x0, ttl 128, id 3106, offset 0, flags [DF], proto 6, length: 196) 192.168.77.100.1129 > 192.168.77.102.1723: P 1:157(156) ack 1 win 64512: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRQ PROTO_VER(1.0) FRAME_CAP(A) BEARER_CAP(A) MAX_CHAN(0) FIRM_REV(2600) [|pptp] 14:59:30.517011 IP (tos 0x0, ttl 64, id 50136, offset 0, flags [DF], proto 6, length: 40) 192.168.77.102.1723 > 192.168.77.100.1129: . [tcp sum ok] 1:1(0) ack 157 win 6432 14:59:30.517101 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 23887+ PTR? 100.77.168.192.in-addr.arpa. (45) 14:59:30.518433 IP (tos 0x0, ttl 64, id 50137, offset 0, flags [DF], proto 6, length: 196) 192.168.77.102.1723 > 192.168.77.100.1129: P 1:157(156) ack 157 win 6432: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRP PROTO_VER(1.0) RESULT_CODE(1:Successful channel establishment) ERR_CODE (0:None) FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) [|pptp] 14:59:30.518630 IP (tos 0x0, ttl 128, id 3107, offset 0, flags [DF], proto 6, length: 208) 192.168.77.100.1129 > 192.168.77.102.1723: P 157:325(168) ack 157 win 64356: pptp Length=168 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRQ CALL_ID(32768) CALL_SER_NUM(57238) MIN_BPS(300) MAX_BPS(100000000) BEARER_TYPE (Any) FRAME_TYPE(E) RECV_WIN(64) PROC_DELAY(0) PHONE_NO_LEN(0) [|pptp] 14:59:30.543322 IP (tos 0x0, ttl 252, id 58709, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 23887 NXDomain q: PTR? 100.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 14:59:30.553074 IP (tos 0x0, ttl 64, id 50138, offset 0, flags [DF], proto 6, length: 72) 192.168.77.102.1723 > 192.168.77.100.1129: P [tcp sum ok] 157:189 (32) ack 325 win 7504: pptp Length=32 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRP CALL_ID(384) PEER_CALL_ID(32768) RESULT_CODE(1:Connected) ERR_CODE(0:None) CAUSE_CODE(0) CONN_SPEED(100000000) RECV_WIN(64) PROC_DELAY (0) PHY_CHAN_ID(0) 14:59:30.553140 IP (tos 0x0, ttl 64, id 14460, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 0 gre-ppp- payload 14:59:30.557073 IP (tos 0x0, ttl 128, id 3108, offset 0, flags [DF], proto 6, length: 64) 192.168.77.100.1129 > 192.168.77.102.1723: P [tcp sum ok] 325:349 (24) ack 189 win 64324: pptp Length=24 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SLI PEER_CALL_ID(384) SEND_ACCM(0xffffffff) RECV_ACCM(0xffffffff) 14:59:30.560091 IP (tos 0x0, ttl 128, id 3109, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 0 gre-ppp- payload 14:59:30.588113 IP (tos 0x0, ttl 64, id 50139, offset 0, flags [DF], proto 6, length: 40) 192.168.77.102.1723 > 192.168.77.100.1129: . [tcp sum ok] 189:189 (0) ack 349 win 7504 14:59:30.729699 IP (tos 0x0, ttl 64, id 14461, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 1 ack 0 gre-ppp-payload 14:59:32.371978 arp who-has 192.168.77.102 tell 192.168.77.254 14:59:32.372015 arp reply 192.168.77.102 is-at 00:07:e9:92:a9:bf 14:59:32.550563 IP (tos 0x0, ttl 128, id 3112, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 1 gre-ppp- payload 14:59:32.550831 IP (tos 0x0, ttl 64, id 14462, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 2 ack 1 gre-ppp-payload 14:59:33.558183 IP (tos 0x0, ttl 64, id 14463, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 3 gre-ppp- payload 14:59:35.550643 IP (tos 0x0, ttl 128, id 3113, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 2 gre-ppp- payload 14:59:35.550953 IP (tos 0x0, ttl 64, id 14464, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 4 ack 2 gre-ppp-payload 14:59:36.568163 IP (tos 0x0, ttl 64, id 14465, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 5 gre-ppp- payload 14:59:39.550760 IP (tos 0x0, ttl 128, id 3114, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 3 gre-ppp- payload 14:59:39.551020 IP (tos 0x0, ttl 64, id 14466, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 6 ack 3 gre-ppp-payload 14:59:39.598129 IP (tos 0x0, ttl 64, id 14467, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 7 gre-ppp- payload 14:59:42.598157 IP (tos 0x0, ttl 64, id 14468, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 8 gre-ppp- payload 14:59:43.550881 IP (tos 0x0, ttl 128, id 3115, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 4 gre-ppp- payload 14:59:43.551141 IP (tos 0x0, ttl 64, id 14469, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 9 ack 4 gre-ppp-payload 14:59:45.598195 IP (tos 0x0, ttl 64, id 14470, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 10 gre-ppp- payload 14:59:47.550946 IP (tos 0x0, ttl 128, id 3116, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 5 gre-ppp- payload 14:59:47.551212 IP (tos 0x0, ttl 64, id 14471, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 11 ack 5 gre-ppp-payload 14:59:48.608188 IP (tos 0x0, ttl 64, id 14472, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 12 gre-ppp- payload 14:59:51.550980 IP (tos 0x0, ttl 128, id 3117, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 6 gre-ppp- payload 14:59:51.551243 IP (tos 0x0, ttl 64, id 14473, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 13 ack 6 gre-ppp-payload 14:59:51.608231 IP (tos 0x0, ttl 64, id 14474, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 14 gre-ppp- payload 14:59:54.618184 IP (tos 0x0, ttl 64, id 14475, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 15 gre-ppp- payload 14:59:55.553627 IP (tos 0x0, ttl 128, id 3118, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 7 gre-ppp- payload 14:59:55.553892 IP (tos 0x0, ttl 64, id 14476, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 16 ack 7 gre-ppp-payload 14:59:56.548082 arp who-has 192.168.77.100 tell 192.168.77.102 14:59:56.548196 arp reply 192.168.77.100 is-at 00:0b:db:b9:9f:d5 14:59:57.628154 IP (tos 0x0, ttl 64, id 14477, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 17 gre-ppp- payload 14:59:59.551145 IP (tos 0x0, ttl 128, id 3119, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 8 gre-ppp- payload 14:59:59.551437 IP (tos 0x0, ttl 64, id 14478, offset 0, flags [DF], proto 47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 18 ack 8 gre-ppp-payload 15:00:00.759733 IP (tos 0x0, ttl 64, id 14479, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 19 gre-ppp- payload 15:00:00.874355 IP (tos 0x0, ttl 64, id 50140, offset 0, flags [DF], proto 6, length: 40) 192.168.77.102.1723 > 192.168.77.100.1129: F [tcp sum ok] 189:189 (0) ack 349 win 7504 15:00:00.874509 IP (tos 0x0, ttl 128, id 3120, offset 0, flags [DF], proto 6, length: 40) 192.168.77.100.1129 > 192.168.77.102.1723: F [tcp sum ok] 349:349 (0) ack 190 win 64324 15:00:00.874546 IP (tos 0x0, ttl 64, id 50141, offset 0, flags [DF], proto 6, length: 40) 192.168.77.102.1723 > 192.168.77.100.1129: . [tcp sum ok] 190:190 (0) ack 350 win 7504 60 packets captured 60 packets received by filter 0 packets dropped by kernel -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-24 12:34 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-09-24 12:34 MET ------- It looks fine, the call is established and PPP/GRE packets go in both directions. Please also attach a ppp log from both sides with the "debug" option enabled. 14:59:45.598195 IP (tos 0x0, ttl 64, id 14470, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 10 gre-ppp- payload 14:59:47.550946 IP (tos 0x0, ttl 128, id 3116, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 5 gre-ppp- payload -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-24 12:34 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-09-24 12:34 MET ------- It looks fine, the call is established and PPP/GRE packets go in both directions. Please also attach a ppp log from both sides with the "debug" option enabled. 14:59:45.598195 IP (tos 0x0, ttl 64, id 14470, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 10 gre-ppp- payload 14:59:47.550946 IP (tos 0x0, ttl 128, id 3116, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 5 gre-ppp- payload -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the reporter.
bugzilla-daemon@bugzilla.netfilter.org
2006-Sep-25 11:46 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-09-25 11:46 MET ------- (In reply to comment #6)> It looks fine, the call is established and PPP/GRE packets go in bothdirections.> Please also attach a ppp log from both sides with the "debug" option enabled.The PPP/GRE packets going in both directions are "PPP LC Configuration Request and PPP LC Configuration Reject packets" alternately. I've attached the PPP log from the Poptop server (after enabling debug in pptpd.conf). I've also attached a tcpdump of a successful connection (without ip_nat_pptp loaded) and the corresponding PPP log. The Windows XP clients do not have any useful logging that I am aware of. The error message they display is "Disconnected. Error 619. A connection to the remote computer could not be established so the port was closed." Since I applied the new patches I have found that loading then unloading the ip_nat_pptp module freezes the server and it has to be hard reset. Prior to applying the patches I could load and unload it multiple times without problems. PPP Log: Sep 25 18:32:52 localhost pptpd[5514]: CTRL: Client 192.168.77.100 control connection started Sep 25 18:32:52 localhost pptpd[5514]: CTRL: Starting call (launching pppd, opening GRE) Sep 25 18:32:52 localhost pppd[5515]: Plugin /usr/lib/pptpd/pptpd-logwtmp.so loaded. Sep 25 18:32:52 localhost pppd[5515]: pppd 2.4.3 started by root, uid 0 Sep 25 18:32:52 localhost pppd[5515]: Using interface ppp0 Sep 25 18:32:52 localhost pppd[5515]: Connect: ppp0 <--> /dev/pts/1 Sep 25 18:33:22 localhost pppd[5515]: LCP: timeout sending Config-Requests Sep 25 18:33:22 localhost pppd[5515]: Connection terminated. Sep 25 18:33:22 localhost pppd[5515]: Using interface ppp0 Sep 25 18:33:22 localhost pppd[5515]: Connect: ppp0 <--> /dev/pts/1 Sep 25 18:33:22 localhost pppd[5515]: tcflush failed: Bad file descriptor Sep 25 18:33:22 localhost pppd[5515]: tcsetattr: Invalid argument (line 1016) Sep 25 18:33:22 localhost pppd[5515]: Exit. Sep 25 18:33:22 localhost pptpd[5514]: GRE: read(fd=6,buffer=804e5a0,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs Sep 25 18:33:22 localhost pptpd[5514]: CTRL: PTY read or GRE write failed (pty,gre)=(6,7) Sep 25 18:33:22 localhost pptpd[5514]: CTRL: Client 192.168.77.100 control connection finished tcpdump (successful connection without ip_nat_pptp loaded): tcpdump -vv -i eth0 tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 18:40:17.357883 arp who-has 192.168.77.102 tell 192.168.77.100 18:40:17.436369 arp reply 192.168.77.102 is-at 00:07:e9:92:a9:bf 18:40:17.357943 IP (tos 0x0, ttl 128, id 1405, offset 0, flags [DF], proto 6, length: 48) 192.168.77.100.1054 > 192.168.77.102.1723: S [tcp sum ok] 391042768:391042768(0) win 64512 <mss 1460,nop,nop,sackOK> 18:40:17.357998 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 6, length: 48) 192.168.77.102.1723 > 192.168.77.100.1054: S [tcp sum ok] 599827892:599827892(0) ack 391042769 win 5840 <mss 1460,nop,nop,sackOK> 18:40:17.358144 IP (tos 0x0, ttl 128, id 1406, offset 0, flags [DF], proto 6, length: 196) 192.168.77.100.1054 > 192.168.77.102.1723: P 1:157(156) ack 1 win 64512: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRQ PROTO_VER(1.0) FRAME_CAP(A) BEARER_CAP(A) MAX_CHAN(0) FIRM_REV(2600) [|pptp] 18:40:17.358187 IP (tos 0x0, ttl 64, id 6151, offset 0, flags [DF], proto 6, length: 40) 192.168.77.102.1723 > 192.168.77.100.1054: . [tcp sum ok] 1:1(0) ack 157 win 6432 18:40:17.378180 arp who-has 192.168.77.254 tell 192.168.77.102 18:40:17.378425 arp reply 192.168.77.254 is-at 00:16:b6:0a:74:2a 18:40:17.378435 IP (tos 0x0, ttl 64, id 48563, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 61629+ PTR? 102.77.168.192.in-addr.arpa. (45) 18:40:17.397092 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 17, length: 155) 192.168.77.254.1192 > 192.168.77.255.snmptrap: { SNMPv1 { Trap (35) E:3955.2.2.1 10.128.34.222 enterpriseSpecific s=1 12 [|snmp] } } 18:40:17.409451 IP (tos 0x0, ttl 64, id 6152, offset 0, flags [DF], proto 6, length: 196) 192.168.77.102.1723 > 192.168.77.100.1054: P 1:157(156) ack 157 win 6432: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRP PROTO_VER(1.0) RESULT_CODE(1:Successful channel establishment) ERR_CODE (0:None) FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) [|pptp] 18:40:17.409645 IP (tos 0x0, ttl 128, id 1407, offset 0, flags [DF], proto 6, length: 208) 192.168.77.100.1054 > 192.168.77.102.1723: P 157:325(168) ack 157 win 64356: pptp Length=168 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRQ CALL_ID(49152) CALL_SER_NUM(57475) MIN_BPS(300) MAX_BPS(100000000) BEARER_TYPE (Any) FRAME_TYPE(E) RECV_WIN(64) PROC_DELAY(0) PHONE_NO_LEN(0) [|pptp] 18:40:17.409675 IP (tos 0x0, ttl 64, id 6153, offset 0, flags [DF], proto 6, length: 40) 192.168.77.102.1723 > 192.168.77.100.1054: . [tcp sum ok] 157:157 (0) ack 325 win 7504 18:40:17.413375 IP (tos 0x0, ttl 252, id 24319, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 61629 NXDomain q: PTR? 102.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 18:40:17.413602 IP (tos 0x0, ttl 64, id 48567, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 52493+ PTR? 100.77.168.192.in-addr.arpa. (45) 18:40:17.436177 IP (tos 0x0, ttl 252, id 24320, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 52493 NXDomain q: PTR? 100.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 18:40:17.562010 IP (tos 0x0, ttl 64, id 48582, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 20167+ PTR? 254.77.168.192.in-addr.arpa. (45) 18:40:17.582996 IP (tos 0x0, ttl 252, id 24321, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 20167 NXDomain q: PTR? 254.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 18:40:17.583432 IP (tos 0x0, ttl 64, id 48584, offset 0, flags [DF], proto 17, length: 71) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 29203+ PTR? 20.20.21.203.in-addr.arpa. (43) 18:40:17.608209 IP (tos 0x0, ttl 252, id 24322, offset 0, flags [DF], proto 17, length: 460) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 29203 q: PTR? 20.20.21.203.in-addr.arpa. 1/6/10 20.20.21.203.in-addr.arpa. [|domain] 18:40:17.608527 IP (tos 0x0, ttl 64, id 48587, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 2579+ PTR? 255.77.168.192.in-addr.arpa. (45) 18:40:17.629586 IP (tos 0x0, ttl 252, id 24323, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 2579 NXDomain q: PTR? 255.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 18:40:17.793407 IP (tos 0x0, ttl 64, id 6154, offset 0, flags [DF], proto 6, length: 72) 192.168.77.102.1723 > 192.168.77.100.1054: P [tcp sum ok] 157:189 (32) ack 325 win 7504: pptp Length=32 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRP CALL_ID(0) PEER_CALL_ID(49152) RESULT_CODE(1:Connected) ERR_CODE(0:None) CAUSE_CODE(0) CONN_SPEED(100000000) RECV_WIN(64) PROC_DELAY (0) PHY_CHAN_ID(0) 18:40:17.793603 IP (tos 0x0, ttl 64, id 48605, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 0 gre-ppp- payload 18:40:17.797573 IP (tos 0x0, ttl 128, id 1408, offset 0, flags [DF], proto 6, length: 64) 192.168.77.100.1054 > 192.168.77.102.1723: P [tcp sum ok] 325:349 (24) ack 189 win 64324: pptp Length=24 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SLI PEER_CALL_ID(0) SEND_ACCM(0xffffffff) RECV_ACCM(0xffffffff) 18:40:17.797620 IP (tos 0x0, ttl 64, id 6155, offset 0, flags [DF], proto 6, length: 40) 192.168.77.102.1723 > 192.168.77.100.1054: . [tcp sum ok] 189:189 (0) ack 349 win 7504 18:40:17.800879 IP (tos 0x0, ttl 128, id 1409, offset 0, flags [none], proto 47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 0 gre-ppp- payload 18:40:17.858221 IP (tos 0x0, ttl 64, id 48606, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 0 no- payload 18:40:17.972828 IP (tos 0x0, ttl 64, id 48607, offset 0, flags [DF], proto 47, length: 43) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 1 gre-ppp- payload 18:40:17.973235 IP (tos 0x0, ttl 128, id 1410, offset 0, flags [none], proto 47, length: 58) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 1 ack 1 gre- ppp-payload 18:40:17.973447 IP (tos 0x0, ttl 64, id 48608, offset 0, flags [DF], proto 47, length: 58) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 2 ack 1 gre-ppp-payload 18:40:18.078261 IP (tos 0x0, ttl 128, id 1411, offset 0, flags [none], proto 47, length: 32) 192.168.77.100 > 192.168.77.102: [KA] call 0 ack 2 no-payload 18:40:20.798256 IP (tos 0x0, ttl 64, id 48609, offset 0, flags [DF], proto 47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 3 gre-ppp- payload 18:40:20.798660 IP (tos 0x0, ttl 128, id 1412, offset 0, flags [none], proto 47, length: 65) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 2 ack 3 gre- ppp-payload 18:40:20.798764 IP (tos 0x0, ttl 128, id 1413, offset 0, flags [DF], proto 6, length: 64) 192.168.77.100.1054 > 192.168.77.102.1723: P [tcp sum ok] 349:373 (24) ack 189 win 64324: pptp Length=24 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SLI PEER_CALL_ID(0) SEND_ACCM(0x00000000) RECV_ACCM(0xffffffff) 18:40:20.798799 IP (tos 0x0, ttl 64, id 6156, offset 0, flags [DF], proto 6, length: 40) 192.168.77.102.1723 > 192.168.77.100.1054: . [tcp sum ok] 189:189 (0) ack 373 win 7504 18:40:20.798910 IP (tos 0x0, ttl 128, id 1414, offset 0, flags [none], proto 47, length: 52) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 3 gre-ppp- payload 18:40:20.799015 IP (tos 0x0, ttl 128, id 1415, offset 0, flags [none], proto 47, length: 59) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 4 gre-ppp- payload 18:40:20.853232 IP (tos 0x0, ttl 64, id 48610, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 4 no- payload 18:40:20.853672 IP (tos 0x0, ttl 64, id 48611, offset 0, flags [DF], proto 47, length: 60) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 4 gre-ppp- payload 18:40:20.853685 IP (tos 0x0, ttl 64, id 48612, offset 0, flags [DF], proto 47, length: 58) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 5 gre-ppp- payload 18:40:20.853695 IP (tos 0x0, ttl 64, id 48613, offset 0, flags [DF], proto 47, length: 65) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 6 gre-ppp- payload 18:40:20.875837 IP (tos 0x0, ttl 128, id 1416, offset 0, flags [none], proto 47, length: 97) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 5 ack 6 gre- ppp-payload 18:40:20.898228 IP (tos 0x0, ttl 64, id 48614, offset 0, flags [DF], proto 47, length: 101) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 7 ack 5 gre-ppp-payload 18:40:20.903893 IP (tos 0x0, ttl 128, id 1417, offset 0, flags [none], proto 47, length: 32) 192.168.77.100 > 192.168.77.102: [KA] call 0 ack 7 no-payload 18:40:20.910399 IP (tos 0x0, ttl 128, id 1418, offset 0, flags [none], proto 47, length: 44) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 6 gre-ppp- payload 18:40:20.910533 IP (tos 0x0, ttl 128, id 1419, offset 0, flags [none], proto 47, length: 68) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 7 gre-ppp- payload 18:40:20.973052 IP (tos 0x0, ttl 64, id 48615, offset 0, flags [DF], proto 47, length: 48) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 8 ack 7 gre-ppp-payload 18:40:20.973091 IP (tos 0x0, ttl 64, id 48616, offset 0, flags [DF], proto 47, length: 44) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 9 gre-ppp- payload 18:40:20.973164 IP (tos 0x0, ttl 64, id 48617, offset 0, flags [DF], proto 47, length: 38) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 10 gre- ppp-payload 18:40:20.973509 IP (tos 0x0, ttl 128, id 1420, offset 0, flags [none], proto 47, length: 48) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 8 ack 10 gre- ppp-payload 18:40:20.973638 IP (tos 0x0, ttl 128, id 1421, offset 0, flags [none], proto 47, length: 44) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 9 gre-ppp- payload 18:40:20.983465 IP (tos 0x0, ttl 64, id 48618, offset 0, flags [DF], proto 47, length: 48) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 11 ack 9 gre-ppp-payload 18:40:20.983483 IP (tos 0x0, ttl 64, id 48619, offset 0, flags [DF], proto 47, length: 44) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 12 gre- ppp-payload 18:40:20.983932 IP (tos 0x0, ttl 128, id 1422, offset 0, flags [none], proto 47, length: 48) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 10 ack 12 gre-ppp-payload 18:40:21.028218 IP (tos 0x0, ttl 64, id 48620, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 10 no- payload 18:40:22.410456 arp who-has 192.168.77.102 tell 192.168.77.254 18:40:22.410490 arp reply 192.168.77.102 is-at 00:07:e9:92:a9:bf 18:40:22.794749 IP (tos 0x0, ttl 128, id 1423, offset 0, flags [none], proto 47, length: 68) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 11 gre-ppp- payload 18:40:22.795128 IP (tos 0x0, ttl 64, id 48621, offset 0, flags [DF], proto 47, length: 66) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 13 ack 11 gre-ppp-payload 18:40:22.795468 IP (tos 0x0, ttl 128, id 1424, offset 0, flags [none], proto 47, length: 48) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 12 ack 13 gre-ppp-payload 18:40:22.795621 IP (tos 0x0, ttl 64, id 48622, offset 0, flags [DF], proto 47, length: 48) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 14 ack 12 gre-ppp-payload 18:40:22.795886 IP (tos 0x0, ttl 128, id 1425, offset 0, flags [none], proto 47, length: 48) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 13 ack 14 gre-ppp-payload 18:40:22.798005 IP (tos 0x0, ttl 64, id 48623, offset 0, flags [DF], proto 47, length: 48) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 15 ack 13 gre-ppp-payload 18:40:22.858499 IP (tos 0x0, ttl 128, id 1427, offset 0, flags [none], proto 47, length: 81) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 14 ack 15 gre-ppp-payload 18:40:22.858746 IP (tos 0x0, ttl 128, id 1428, offset 0, flags [none], proto 17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:53:45:00:00:00, length: 548, xid:0xf298318f, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:22.859281 IP (tos 0x0, ttl 64, id 49112, offset 0, flags [DF], proto 17, length: 74) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 47395+ PTR? 255.255.255.255.in-addr.arpa. (46) 18:40:22.861110 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto 17, length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, length: 548, xid:0xf298318f, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:22.867909 IP (tos 0x0, ttl 128, id 1429, offset 0, flags [none], proto 47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 15 gre-ppp- payload 18:40:22.877525 IP (tos 0x0, ttl 252, id 24325, offset 0, flags [DF], proto 17, length: 138) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 47395 NXDomain q: PTR? 255.255.255.255.in-addr.arpa. 0/1/0 ns: in-addr.arpa. (110) 18:40:22.877764 IP (tos 0x0, ttl 64, id 49113, offset 0, flags [DF], proto 17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 14465+ PTR? 234.78.168.192.in-addr.arpa. (45) 18:40:22.901678 IP (tos 0x0, ttl 252, id 24326, offset 0, flags [DF], proto 17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 14465 NXDomain q: PTR? 234.78.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in- addr.arpa. (122) 18:40:22.908241 IP (tos 0x0, ttl 64, id 48624, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 15 no- payload 18:40:22.914636 IP (tos 0x0, ttl 128, id 1431, offset 0, flags [none], proto 47, length: 365) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 16 gre-ppp- payload 18:40:22.958244 IP (tos 0x0, ttl 64, id 48625, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 16 no- payload 18:40:22.987284 IP (tos 0x0, ttl 128, id 1434, offset 0, flags [none], proto 17, length: 229) 192.168.77.100.netbios-dgm > 192.168.77.255.netbios-dgm:>>> NBT UDP PACKET(138) Res=0x1106 ID=0x8040 IP=192 (0xc0).168 (0xa8).77(0x4d).100 (0x64) Port=138 (0x8a) Length=187 (0xbb) Res2=0x0 SourceName=TA1008784 NameType=0x20 (Server) DestNameWARNING: Short packet. Try increasing the snap length 18:40:22.990535 IP (tos 0x0, ttl 128, id 1435, offset 0, flags [none], proto 47, length: 245) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 17 gre-ppp- payload 18:40:22.990560 IP (tos 0x0, ttl 128, id 1436, offset 0, flags [none], proto 47, length: 266) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 18 gre-ppp- payload 18:40:23.038214 IP (tos 0x0, ttl 64, id 48626, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 18 no- payload 18:40:23.108050 IP (tos 0x0, ttl 128, id 1437, offset 0, flags [none], proto 17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:53:45:00:00:00, length: 548, xid:0xf298318f, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:23.108272 IP (tos 0x0, ttl 128, id 1438, offset 0, flags [none], proto 47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 19 gre-ppp- payload 18:40:23.109586 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto 17, length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, length: 548, xid:0xf298318f, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:23.158211 IP (tos 0x0, ttl 64, id 48627, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 19 no- payload 18:40:23.611853 IP (tos 0x0, ttl 128, id 1439, offset 0, flags [none], proto 17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:53:45:00:00:00, length: 548, xid:0xf298318f, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:23.611904 IP (tos 0x0, ttl 128, id 1440, offset 0, flags [none], proto 47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 20 gre-ppp- payload 18:40:23.613335 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto 17, length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, length: 548, xid:0xf298318f, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:23.658574 IP (tos 0x0, ttl 64, id 48628, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 20 no- payload 18:40:23.794653 IP (tos 0x0, ttl 128, id 1442, offset 0, flags [none], proto 47, length: 77) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 21 gre-ppp- payload 18:40:23.840888 IP (tos 0x0, ttl 64, id 48629, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 21 no- payload 18:40:24.485046 IP (tos 0x0, ttl 128, id 1444, offset 0, flags [none], proto 47, length: 245) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 22 gre-ppp- payload 18:40:24.532139 IP (tos 0x0, ttl 64, id 48630, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 22 no- payload 18:40:24.607307 IP (tos 0x0, ttl 128, id 1446, offset 0, flags [none], proto 47, length: 99) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 23 gre-ppp- payload 18:40:24.607537 IP (tos 0x0, ttl 128, id 1448, offset 0, flags [none], proto 17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:53:45:00:00:00, length: 548, xid:0x52a03c90, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:24.607591 IP (tos 0x0, ttl 128, id 1450, offset 0, flags [none], proto 47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 24 gre-ppp- payload 18:40:24.611178 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto 17, length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, length: 548, xid:0x52a03c90, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:24.648212 IP (tos 0x0, ttl 64, id 48631, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 24 no- payload 18:40:24.857659 IP (tos 0x0, ttl 128, id 1451, offset 0, flags [none], proto 17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:53:45:00:00:00, length: 548, xid:0x52a03c90, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:24.857708 IP (tos 0x0, ttl 128, id 1452, offset 0, flags [none], proto 47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 25 gre-ppp- payload 18:40:24.859195 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto 17, length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, length: 548, xid:0x52a03c90, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:24.906970 IP (tos 0x0, ttl 64, id 48632, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 25 no- payload 18:40:25.357287 IP (tos 0x0, ttl 128, id 1453, offset 0, flags [none], proto 17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:53:45:00:00:00, length: 548, xid:0x52a03c90, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:25.357337 IP (tos 0x0, ttl 128, id 1454, offset 0, flags [none], proto 47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 26 gre-ppp- payload 18:40:25.358838 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto 17, length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, length: 548, xid:0x52a03c90, flags: [none] (0x0000) Client IP: 192.168.78.234 Client Ethernet Address: 00:53:45:00:00:00 [|bootp] 18:40:25.398207 IP (tos 0x0, ttl 64, id 48633, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 26 no- payload 18:40:25.498001 IP (tos 0x0, ttl 128, id 1456, offset 0, flags [none], proto 47, length: 99) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 27 gre-ppp- payload 18:40:25.548211 IP (tos 0x0, ttl 64, id 48634, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 27 no- payload 18:40:25.888576 IP (tos 0x0, ttl 128, id 1460, offset 0, flags [none], proto 47, length: 365) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 28 gre-ppp- payload 18:40:25.943957 IP (tos 0x0, ttl 64, id 48635, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 28 no- payload 18:40:25.982236 IP (tos 0x0, ttl 128, id 1462, offset 0, flags [none], proto 47, length: 245) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 29 gre-ppp- payload 18:40:26.028211 IP (tos 0x0, ttl 64, id 48636, offset 0, flags [DF], proto 47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 29 no- payload 18:40:26.043345 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 308) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 280 18:40:26.043634 IP (tos 0x0, ttl 64, id 49430, offset 0, flags [DF], proto 17, length: 74) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp sum ok] 7479+ PTR? 250.255.255.239.in-addr.arpa. (46) 18:40:26.043814 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 312) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 284 18:40:26.044827 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 380) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 352 18:40:26.046604 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 288) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 260 18:40:26.047044 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 344) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 316 18:40:26.048806 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 308) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 280 18:40:26.049224 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 374) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 346 18:40:26.050562 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 362) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 334 18:40:26.052219 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 376) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 348 18:40:26.053541 IP (tos 0x0, ttl 1, id 0, offset 0, flags [DF], proto 17, length: 368) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 340 18:40:26.064332 IP (tos 0x0, ttl 252, id 24327, offset 0, flags [DF], proto 17, length: 131) dnscache01.westnet.com.au.domain > 192.168.77.102.32769: 7479 NXDomain q: PTR? 250.255.255.239.in-addr.arpa. 0/1/0 ns: 239.in- addr.arpa. (103) 122 packets captured 122 packets received by filter 0 packets dropped by kernel PPP Log (without ip_nat_pptp loaded): Sep 25 18:51:08 localhost pptpd[5195]: CTRL: Client 192.168.77.100 control connection started Sep 25 18:51:08 localhost pptpd[5195]: CTRL: Starting call (launching pppd, opening GRE) Sep 25 18:51:08 localhost pppd[5196]: Plugin /usr/lib/pptpd/pptpd-logwtmp.so loaded. Sep 25 18:51:08 localhost pppd[5196]: pppd 2.4.3 started by root, uid 0 Sep 25 18:51:08 localhost pppd[5196]: Using interface ppp0 Sep 25 18:51:08 localhost pppd[5196]: Connect: ppp0 <--> /dev/pts/2 Sep 25 18:51:11 localhost pptpd[5195]: CTRL: Ignored a SET LINK INFO packet with real ACCMs! Sep 25 18:51:11 localhost pppd[5196]: MPPE 128-bit stateless compression enabled Sep 25 18:51:13 localhost pppd[5196]: Cannot determine ethernet address for proxy ARP Sep 25 18:51:13 localhost pppd[5196]: local IP address 192.168.77.101 Sep 25 18:51:13 localhost pppd[5196]: remote IP address 192.168.78.234 -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-13 07:28 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-10-13 07:28 MET ------- (In reply to comment #7)> (In reply to comment #6) > > It looks fine, the call is established and PPP/GRE packets go in both > directions. > > Please also attach a ppp log from both sides with the "debug" option enabled. > > The PPP/GRE packets going in both directions are "PPP LC Configuration Request > and PPP LC Configuration Reject packets" alternately. I've attached the PPP > log from the Poptop server (after enabling debug in pptpd.conf).Please also enable the pppd debug option so we can see the LCP/IPCP packets. You can do this in either /etc/ppp/options(.pptp?) or on the command line.> I've also > attached a tcpdump of a successful connection (without ip_nat_pptp loaded) and > the corresponding PPP log. The Windows XP clients do not have any useful > logging that I am aware of. The error message they display is "Disconnected. > Error 619. A connection to the remote computer could not be established so the > port was closed." Since I applied the new patches I have found that loading > then unloading the ip_nat_pptp module freezes the server and it has to be hard > reset. Prior to applying the patches I could load and unload it multiple times > without problems.Mhh thats not good. Did it show anything on the console when locking up? -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-13 07:28 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-10-13 07:28 MET ------- (In reply to comment #7)> (In reply to comment #6) > > It looks fine, the call is established and PPP/GRE packets go in both > directions. > > Please also attach a ppp log from both sides with the "debug" option enabled. > > The PPP/GRE packets going in both directions are "PPP LC Configuration Request > and PPP LC Configuration Reject packets" alternately. I've attached the PPP > log from the Poptop server (after enabling debug in pptpd.conf).Please also enable the pppd debug option so we can see the LCP/IPCP packets. You can do this in either /etc/ppp/options(.pptp?) or on the command line.> I've also > attached a tcpdump of a successful connection (without ip_nat_pptp loaded) and > the corresponding PPP log. The Windows XP clients do not have any useful > logging that I am aware of. The error message they display is "Disconnected. > Error 619. A connection to the remote computer could not be established so the > port was closed." Since I applied the new patches I have found that loading > then unloading the ip_nat_pptp module freezes the server and it has to be hard > reset. Prior to applying the patches I could load and unload it multiple times > without problems.Mhh thats not good. Did it show anything on the console when locking up? -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the reporter.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 05:30 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-10-17 05:30 MET ------- Created an attachment (id=274) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=274&action=view) PPP debug output with ip_nat_pptp loaded -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 05:31 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-10-17 05:31 MET ------- Created an attachment (id=275) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=275&action=view) PPP debug output with ip_nat_pptp not loaded -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 05:32 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-10-17 05:32 MET ------- Created an attachment (id=276) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=276&action=view) Kernel panic when unloading ip_nat_pptp -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 05:36 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-10-17 05:36 MET ------- (In reply to comment #8)> Please also enable the pppd debug option so we can see the LCP/IPCP packets.I've attached debug output for both ip_nat_pptp loaded and unloaded.> Mhh thats not good. Did it show anything on the console when locking up?I've attached an extract from the kernel panic message. If you'd like me to get more of the message content, please let me know. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 08:03 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-10-17 08:03 MET ------- (In reply to comment #12)> I've attached an extract from the kernel panic message. If you'd like me to > get more of the message content, please let me know.Thanks. Your crash dump doesn't include any symbol names though, please enable CONFIG_KALLSYMS=y and post the crash again.> ip_nat_pptp version 3.0 unloaded > BUG: unable to handle kernel paging request at virtual address 00100104-- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 08:03 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-10-17 08:03 MET ------- (In reply to comment #12)> I've attached an extract from the kernel panic message. If you'd like me to > get more of the message content, please let me know.Thanks. Your crash dump doesn't include any symbol names though, please enable CONFIG_KALLSYMS=y and post the crash again.> ip_nat_pptp version 3.0 unloaded > BUG: unable to handle kernel paging request at virtual address 00100104-- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the reporter.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 08:10 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-10-17 08:10 MET ------- Can you also please attach your poptop and client configurations, I want to try to reproduce it myself. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 08:10 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-10-17 08:10 MET ------- Can you also please attach your poptop and client configurations, I want to try to reproduce it myself. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the reporter.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 08:16 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-10-17 08:16 MET ------- Created an attachment (id=277) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=277&action=view) Poptop pptp.conf file -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 08:16 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-10-17 08:16 MET ------- Created an attachment (id=278) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=278&action=view) Poptop options.pptpd file -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 10:00 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-10-17 10:00 MET ------- (In reply to comment #14)> Can you also please attach your poptop and client configurations, I want totry> to reproduce it myself.I've attached my Poptop configuration files. The Windows XP client configuration is very minimal. I just specify the IP address of the Poptop server, a user ID and password. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 10:03 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-10-17 10:03 MET ------- Thanks, I'll try to reproduce it. But please send the oops again with CONFIG_KALLSYMS enabled. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 10:03 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From kaber@trash.net 2006-10-17 10:03 MET ------- Thanks, I'll try to reproduce it. But please send the oops again with CONFIG_KALLSYMS enabled. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the reporter.
bugzilla-daemon@bugzilla.netfilter.org
2006-Oct-17 10:10 UTC
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512 ------- Additional Comments From greg.cowell@celentia.com 2006-10-17 10:10 MET ------- (In reply to comment #18)> Thanks, I'll try to reproduce it. But please send the oops again with > CONFIG_KALLSYMS enabled.I already had CONFIG_KALLSYMS enabled. Unfortunately I didn't write down the whole kernel panic message. I'm having trouble getting the kernel panic to reoccur now. Since I enabled Poptop debugging it hasn't been happening. I've disabled debugging again but still can't repeat the problem. This is strange because I am using a test server and no other changes have been made to it. I'll get you the full text of the panic message as soon as I can get the panic to reoccur. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.