[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded

bugzilla-daemon at bugzilla.netfilter.org bugzilla-daemon at bugzilla.netfilter.org
Tue Sep 19 02:33:35 CEST 2006


https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512





------- Additional Comments From greg.cowell at celentia.com  2006-09-19 02:33 MET -------
(In reply to comment #1)
> There are still some problems with the PPtP helper, I'm currently trying to 
fix
> these. Can you attach a tcpdump of a failed attempt please?

Yep, certainly:

# tcpdump -vv -i eth0
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
09:37:17.404823 IP (tos 0x0, ttl 128, id 18838, offset 0, flags [DF], proto 6, 
length: 48) 192.168.77.100.1484 > 192.168.77.101.1723: S [tcp sum ok] 
2074060463:2074060463(0) win 64512 <mss 1460,nop,nop,sackOK>
09:37:17.458621 IP (tos 0x0, ttl  64, id 0, offset 0, flags [DF], proto 6, 
length: 48) 192.168.77.101.1723 > 192.168.77.100.1484: S [tcp sum ok] 
3986707529:3986707529(0) ack 2074060464 win 5840 <mss 1460,nop,nop,sackOK>
09:37:17.404944 IP (tos 0x0, ttl 128, id 18839, offset 0, flags [DF], proto 6, 
length: 196) 192.168.77.100.1484 > 192.168.77.101.1723: P 1:157(156) ack 1 win 
64512: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRQ 
PROTO_VER(1.0) FRAME_CAP(A) BEARER_CAP(A) MAX_CHAN(0) FIRM_REV(2600) [|pptp]
09:37:17.404976 IP (tos 0x0, ttl  64, id 25301, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.101.1723 > 192.168.77.100.1484: . [tcp sum ok] 1:1(0) 
ack 157 win 6432
09:37:17.405538 IP (tos 0x0, ttl  64, id 13983, offset 0, flags [DF], proto 17, 
length: 73) 192.168.77.101.32769 > dnscache01.westnet.com.au.domain: [udp sum 
ok]  20323+ PTR? 101.77.168.192.in-addr.arpa. (45)
09:37:17.406864 IP (tos 0x0, ttl  64, id 25302, offset 0, flags [DF], proto 6, 
length: 196) 192.168.77.101.1723 > 192.168.77.100.1484: P 1:157(156) ack 157 
win 6432: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRP 
PROTO_VER(1.0) RESULT_CODE(1:Successful channel establishment) ERR_CODE(0:None) 
FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) [|pptp]
09:37:17.407073 IP (tos 0x0, ttl 128, id 18840, offset 0, flags [DF], proto 6, 
length: 208) 192.168.77.100.1484 > 192.168.77.101.1723: P 157:325(168) ack 157 
win 64356: pptp Length=168 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRQ 
CALL_ID(16384) CALL_SER_NUM(56177) MIN_BPS(300) MAX_BPS(100000000) BEARER_TYPE
(Any) FRAME_TYPE(E) RECV_WIN(64) PROC_DELAY(0) PHONE_NO_LEN(0) [|pptp]
09:37:17.425468 IP (tos 0x0, ttl 252, id 1239, offset 0, flags [DF], proto 17, 
length: 150) dnscache01.westnet.com.au.domain > 192.168.77.101.32769:  20323 
NXDomain q: PTR? 101.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-addr.arpa. 
(122)
09:37:17.438260 IP (tos 0x0, ttl  64, id 13986, offset 0, flags [DF], proto 17, 
length: 73) 192.168.77.101.32769 > dnscache01.westnet.com.au.domain: [udp sum 
ok]  20521+ PTR? 100.77.168.192.in-addr.arpa. (45)
09:37:17.438771 IP (tos 0x0, ttl  64, id 25303, offset 0, flags [DF], proto 6, 
length: 72) 192.168.77.101.1723 > 192.168.77.100.1484: P [tcp sum ok] 157:189
(32) ack 325 win 7504: pptp Length=32 CTRL-MSG Magic-Cookie=1a2b3c4d 
CTRL_MSGTYPE=OCRP CALL_ID(256) PEER_CALL_ID(16384) RESULT_CODE(1:Connected) 
ERR_CODE(0:None) CAUSE_CODE(0) CONN_SPEED(100000000) RECV_WIN(64) PROC_DELAY(0) 
PHY_CHAN_ID(0)
09:37:17.438831 IP (tos 0x0, ttl  64, id 13986, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 0 gre-ppp-
payload
09:37:17.442873 IP (tos 0x0, ttl 128, id 18841, offset 0, flags [DF], proto 6, 
length: 64) 192.168.77.100.1484 > 192.168.77.101.1723: P [tcp sum ok] 325:349
(24) ack 189 win 64324: pptp Length=24 CTRL-MSG Magic-Cookie=1a2b3c4d 
CTRL_MSGTYPE=SLI PEER_CALL_ID(256) SEND_ACCM(0xffffffff) RECV_ACCM(0xffffffff)
09:37:17.445866 IP (tos 0x0, ttl 128, id 18842, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 0 gre-ppp-
payload
09:37:17.446016 IP (tos 0x0, ttl  64, id 13987, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 1 ack 0 gre-
ppp-payload
09:37:17.458391 IP (tos 0x0, ttl 252, id 1240, offset 0, flags [DF], proto 17, 
length: 150) dnscache01.westnet.com.au.domain > 192.168.77.101.32769:  20521 
NXDomain q: PTR? 100.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-addr.arpa. 
(122)
09:37:17.458958 IP (tos 0x0, ttl  64, id 13988, offset 0, flags [DF], proto 17, 
length: 71) 192.168.77.101.32769 > dnscache01.westnet.com.au.domain: [udp sum 
ok]  60947+ PTR? 20.20.21.203.in-addr.arpa. (43)
09:37:17.480558 IP (tos 0x0, ttl  64, id 25304, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.101.1723 > 192.168.77.100.1484: . [tcp sum ok] 189:189
(0) ack 349 win 7504
09:37:17.490967 IP (tos 0x0, ttl 252, id 1241, offset 0, flags [DF], proto 17, 
length: 432) dnscache01.westnet.com.au.domain > 192.168.77.101.32769:  60947 q: 
PTR? 20.20.21.203.in-addr.arpa. 1/6/9 20.20.21.203.in-addr.arpa.[|domain]
09:37:19.439942 IP (tos 0x0, ttl 128, id 18843, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 1 gre-ppp-
payload
09:37:19.440205 IP (tos 0x0, ttl  64, id 13988, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 2 ack 1 gre-
ppp-payload
09:37:20.440644 IP (tos 0x0, ttl  64, id 13989, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 3 gre-ppp-
payload
09:37:22.437480 IP (tos 0x0, ttl 128, id 18844, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 2 gre-ppp-
payload
09:37:22.437764 IP (tos 0x0, ttl  64, id 13990, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 4 ack 2 gre-
ppp-payload
09:37:23.450629 IP (tos 0x0, ttl  64, id 13991, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 5 gre-ppp-
payload
09:37:26.437747 IP (tos 0x0, ttl 128, id 18845, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 3 gre-ppp-
payload
09:37:26.438028 IP (tos 0x0, ttl  64, id 13992, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 6 ack 3 gre-
ppp-payload
09:37:26.490585 IP (tos 0x0, ttl  64, id 13993, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 7 gre-ppp-
payload
09:37:29.490604 IP (tos 0x0, ttl  64, id 13994, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 8 gre-ppp-
payload
09:37:30.437725 IP (tos 0x0, ttl 128, id 18850, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 4 gre-ppp-
payload
09:37:30.438011 IP (tos 0x0, ttl  64, id 13995, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 9 ack 4 gre-
ppp-payload
09:37:32.490638 IP (tos 0x0, ttl  64, id 13996, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 10 gre-ppp-
payload
09:37:34.437723 IP (tos 0x0, ttl 128, id 18851, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 5 gre-ppp-
payload
09:37:34.438003 IP (tos 0x0, ttl  64, id 13997, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 11 ack 5 gre-
ppp-payload
09:37:35.500630 IP (tos 0x0, ttl  64, id 13998, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 12 gre-ppp-
payload
09:37:38.437800 IP (tos 0x0, ttl 128, id 18852, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 6 gre-ppp-
payload
09:37:38.438079 IP (tos 0x0, ttl  64, id 13999, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 13 ack 6 gre-
ppp-payload
09:37:38.510613 IP (tos 0x0, ttl  64, id 14000, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 14 gre-ppp-
payload
09:37:41.510640 IP (tos 0x0, ttl  64, id 14001, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 15 gre-ppp-
payload
09:37:42.437931 IP (tos 0x0, ttl 128, id 18853, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 7 gre-ppp-
payload
09:37:42.438217 IP (tos 0x0, ttl  64, id 14002, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 16 ack 7 gre-
ppp-payload
09:37:44.520641 IP (tos 0x0, ttl  64, id 14003, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 17 gre-ppp-
payload
09:37:46.438131 IP (tos 0x0, ttl 128, id 18854, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.101: [KS] call 256 seq 8 gre-ppp-
payload
09:37:46.438419 IP (tos 0x0, ttl  64, id 14004, offset 0, flags [DF], proto 47, 
length: 47) 192.168.77.101 > 192.168.77.100: [KSA] call 1484 seq 18 ack 8 gre-
ppp-payload
09:37:47.624275 IP (tos 0x0, ttl  64, id 14005, offset 0, flags [DF], proto 47, 
length: 61) 192.168.77.101 > 192.168.77.100: [KS] call 1484 seq 19 gre-ppp-
payload
09:37:47.737442 IP (tos 0x0, ttl  64, id 25305, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.101.1723 > 192.168.77.100.1484: F [tcp sum ok] 189:189
(0) ack 349 win 7504
09:37:47.737602 IP (tos 0x0, ttl 128, id 18855, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.100.1484 > 192.168.77.101.1723: F [tcp sum ok] 349:349
(0) ack 190 win 64324
09:37:47.737642 IP (tos 0x0, ttl  64, id 25306, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.101.1723 > 192.168.77.100.1484: . [tcp sum ok] 190:190
(0) ack 350 win 7504

47 packets captured
47 packets received by filter
0 packets dropped by kernel



-- 
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the netfilter-buglog mailing list