[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
bugzilla-daemon at bugzilla.netfilter.org
bugzilla-daemon at bugzilla.netfilter.org
Sun Sep 24 08:27:59 CEST 2006
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512
------- Additional Comments From greg.cowell at celentia.com 2006-09-24 08:27 MET -------
(In reply to comment #4)
> Created an attachment (id=269)
--> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=269&action=view) [edit]
> backport of PPTP fixes
I've applied the patches. Unfortunately I still get the same problem. Here is
a new tcpdump:
tcpdump -vv -i eth0
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
14:59:27.320305 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 17,
length: 157) 192.168.77.254.2944 > 192.168.77.255.snmptrap: { SNMPv1 { Trap
(35) E:3955.2.2.1 10.128.34.222 enterpriseSpecific s=1 12 [|snmp] } }
14:59:27.322609 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 17,
length: 156) 192.168.77.254.2944 > 192.168.77.255.snmptrap: { SNMPv1 { Trap
(35) E:3955.2.2.1 10.128.34.222 enterpriseSpecific s=1 12 [|snmp] } }
14:59:27.338080 arp who-has 192.168.77.254 tell 192.168.77.102
14:59:27.338511 arp reply 192.168.77.254 is-at 00:16:b6:0a:74:2a
14:59:27.338518 IP (tos 0x0, ttl 64, id 14138, offset 0, flags [DF], proto
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp
sum ok] 59115+ PTR? 255.77.168.192.in-addr.arpa. (45)
14:59:27.357260 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 17,
length: 155) 192.168.77.254.2944 > 192.168.77.255.snmptrap: { SNMPv1 { Trap
(35) E:3955.2.2.1 10.128.34.222 enterpriseSpecific s=1 12 [|snmp] } }
14:59:27.380507 IP (tos 0x0, ttl 252, id 58705, offset 0, flags [DF], proto
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:
59115 NXDomain q: PTR? 255.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
14:59:27.380649 IP (tos 0x0, ttl 64, id 14143, offset 0, flags [DF], proto
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp
sum ok] 39483+ PTR? 254.77.168.192.in-addr.arpa. (45)
14:59:27.403759 IP (tos 0x0, ttl 252, id 58706, offset 0, flags [DF], proto
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:
39483 NXDomain q: PTR? 254.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
14:59:27.404068 IP (tos 0x0, ttl 64, id 14145, offset 0, flags [DF], proto
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp
sum ok] 58375+ PTR? 102.77.168.192.in-addr.arpa. (45)
14:59:27.425878 IP (tos 0x0, ttl 252, id 58707, offset 0, flags [DF], proto
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:
58375 NXDomain q: PTR? 102.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
14:59:27.437687 IP (tos 0x0, ttl 64, id 14148, offset 0, flags [DF], proto
17, length: 71) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp
sum ok] 11039+ PTR? 20.20.21.203.in-addr.arpa. (43)
14:59:27.461919 IP (tos 0x0, ttl 252, id 58708, offset 0, flags [DF], proto
17, length: 432) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:
11039 q: PTR? 20.20.21.203.in-addr.arpa. 1/6/9 20.20.21.203.in-addr.arpa.
[|domain]
14:59:30.516753 IP (tos 0x0, ttl 128, id 3105, offset 0, flags [DF], proto 6,
length: 48) 192.168.77.100.1129 > 192.168.77.102.1723: S [tcp sum ok]
824300613:824300613(0) win 64512 <mss 1460,nop,nop,sackOK>
14:59:30.516823 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 6,
length: 48) 192.168.77.102.1723 > 192.168.77.100.1129: S [tcp sum ok]
4048616351:4048616351(0) ack 824300614 win 5840 <mss 1460,nop,nop,sackOK>
14:59:30.516977 IP (tos 0x0, ttl 128, id 3106, offset 0, flags [DF], proto 6,
length: 196) 192.168.77.100.1129 > 192.168.77.102.1723: P 1:157(156) ack 1 win
64512: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRQ
PROTO_VER(1.0) FRAME_CAP(A) BEARER_CAP(A) MAX_CHAN(0) FIRM_REV(2600) [|pptp]
14:59:30.517011 IP (tos 0x0, ttl 64, id 50136, offset 0, flags [DF], proto 6,
length: 40) 192.168.77.102.1723 > 192.168.77.100.1129: . [tcp sum ok] 1:1(0)
ack 157 win 6432
14:59:30.517101 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp
sum ok] 23887+ PTR? 100.77.168.192.in-addr.arpa. (45)
14:59:30.518433 IP (tos 0x0, ttl 64, id 50137, offset 0, flags [DF], proto 6,
length: 196) 192.168.77.102.1723 > 192.168.77.100.1129: P 1:157(156) ack 157
win 6432: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRP
PROTO_VER(1.0) RESULT_CODE(1:Successful channel establishment) ERR_CODE
(0:None) FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) [|pptp]
14:59:30.518630 IP (tos 0x0, ttl 128, id 3107, offset 0, flags [DF], proto 6,
length: 208) 192.168.77.100.1129 > 192.168.77.102.1723: P 157:325(168) ack 157
win 64356: pptp Length=168 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRQ
CALL_ID(32768) CALL_SER_NUM(57238) MIN_BPS(300) MAX_BPS(100000000) BEARER_TYPE
(Any) FRAME_TYPE(E) RECV_WIN(64) PROC_DELAY(0) PHONE_NO_LEN(0) [|pptp]
14:59:30.543322 IP (tos 0x0, ttl 252, id 58709, offset 0, flags [DF], proto
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:
23887 NXDomain q: PTR? 100.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
14:59:30.553074 IP (tos 0x0, ttl 64, id 50138, offset 0, flags [DF], proto 6,
length: 72) 192.168.77.102.1723 > 192.168.77.100.1129: P [tcp sum ok] 157:189
(32) ack 325 win 7504: pptp Length=32 CTRL-MSG Magic-Cookie=1a2b3c4d
CTRL_MSGTYPE=OCRP CALL_ID(384) PEER_CALL_ID(32768) RESULT_CODE(1:Connected)
ERR_CODE(0:None) CAUSE_CODE(0) CONN_SPEED(100000000) RECV_WIN(64) PROC_DELAY
(0) PHY_CHAN_ID(0)
14:59:30.553140 IP (tos 0x0, ttl 64, id 14460, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 0 gre-ppp-
payload
14:59:30.557073 IP (tos 0x0, ttl 128, id 3108, offset 0, flags [DF], proto 6,
length: 64) 192.168.77.100.1129 > 192.168.77.102.1723: P [tcp sum ok] 325:349
(24) ack 189 win 64324: pptp Length=24 CTRL-MSG Magic-Cookie=1a2b3c4d
CTRL_MSGTYPE=SLI PEER_CALL_ID(384) SEND_ACCM(0xffffffff) RECV_ACCM(0xffffffff)
14:59:30.560091 IP (tos 0x0, ttl 128, id 3109, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 0 gre-ppp-
payload
14:59:30.588113 IP (tos 0x0, ttl 64, id 50139, offset 0, flags [DF], proto 6,
length: 40) 192.168.77.102.1723 > 192.168.77.100.1129: . [tcp sum ok] 189:189
(0) ack 349 win 7504
14:59:30.729699 IP (tos 0x0, ttl 64, id 14461, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 1 ack 0
gre-ppp-payload
14:59:32.371978 arp who-has 192.168.77.102 tell 192.168.77.254
14:59:32.372015 arp reply 192.168.77.102 is-at 00:07:e9:92:a9:bf
14:59:32.550563 IP (tos 0x0, ttl 128, id 3112, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 1 gre-ppp-
payload
14:59:32.550831 IP (tos 0x0, ttl 64, id 14462, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 2 ack 1
gre-ppp-payload
14:59:33.558183 IP (tos 0x0, ttl 64, id 14463, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 3 gre-ppp-
payload
14:59:35.550643 IP (tos 0x0, ttl 128, id 3113, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 2 gre-ppp-
payload
14:59:35.550953 IP (tos 0x0, ttl 64, id 14464, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 4 ack 2
gre-ppp-payload
14:59:36.568163 IP (tos 0x0, ttl 64, id 14465, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 5 gre-ppp-
payload
14:59:39.550760 IP (tos 0x0, ttl 128, id 3114, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 3 gre-ppp-
payload
14:59:39.551020 IP (tos 0x0, ttl 64, id 14466, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 6 ack 3
gre-ppp-payload
14:59:39.598129 IP (tos 0x0, ttl 64, id 14467, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 7 gre-ppp-
payload
14:59:42.598157 IP (tos 0x0, ttl 64, id 14468, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 8 gre-ppp-
payload
14:59:43.550881 IP (tos 0x0, ttl 128, id 3115, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 4 gre-ppp-
payload
14:59:43.551141 IP (tos 0x0, ttl 64, id 14469, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 9 ack 4
gre-ppp-payload
14:59:45.598195 IP (tos 0x0, ttl 64, id 14470, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 10 gre-ppp-
payload
14:59:47.550946 IP (tos 0x0, ttl 128, id 3116, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 5 gre-ppp-
payload
14:59:47.551212 IP (tos 0x0, ttl 64, id 14471, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 11 ack 5
gre-ppp-payload
14:59:48.608188 IP (tos 0x0, ttl 64, id 14472, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 12 gre-ppp-
payload
14:59:51.550980 IP (tos 0x0, ttl 128, id 3117, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 6 gre-ppp-
payload
14:59:51.551243 IP (tos 0x0, ttl 64, id 14473, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 13 ack 6
gre-ppp-payload
14:59:51.608231 IP (tos 0x0, ttl 64, id 14474, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 14 gre-ppp-
payload
14:59:54.618184 IP (tos 0x0, ttl 64, id 14475, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 15 gre-ppp-
payload
14:59:55.553627 IP (tos 0x0, ttl 128, id 3118, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 7 gre-ppp-
payload
14:59:55.553892 IP (tos 0x0, ttl 64, id 14476, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 16 ack 7
gre-ppp-payload
14:59:56.548082 arp who-has 192.168.77.100 tell 192.168.77.102
14:59:56.548196 arp reply 192.168.77.100 is-at 00:0b:db:b9:9f:d5
14:59:57.628154 IP (tos 0x0, ttl 64, id 14477, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 17 gre-ppp-
payload
14:59:59.551145 IP (tos 0x0, ttl 128, id 3119, offset 0, flags [none], proto
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 384 seq 8 gre-ppp-
payload
14:59:59.551437 IP (tos 0x0, ttl 64, id 14478, offset 0, flags [DF], proto
47, length: 47) 192.168.77.102 > 192.168.77.100: [KSA] call 1129 seq 18 ack 8
gre-ppp-payload
15:00:00.759733 IP (tos 0x0, ttl 64, id 14479, offset 0, flags [DF], proto
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 1129 seq 19 gre-ppp-
payload
15:00:00.874355 IP (tos 0x0, ttl 64, id 50140, offset 0, flags [DF], proto 6,
length: 40) 192.168.77.102.1723 > 192.168.77.100.1129: F [tcp sum ok] 189:189
(0) ack 349 win 7504
15:00:00.874509 IP (tos 0x0, ttl 128, id 3120, offset 0, flags [DF], proto 6,
length: 40) 192.168.77.100.1129 > 192.168.77.102.1723: F [tcp sum ok] 349:349
(0) ack 190 win 64324
15:00:00.874546 IP (tos 0x0, ttl 64, id 50141, offset 0, flags [DF], proto 6,
length: 40) 192.168.77.102.1723 > 192.168.77.100.1129: . [tcp sum ok] 190:190
(0) ack 350 win 7504
60 packets captured
60 packets received by filter
0 packets dropped by kernel
--
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the netfilter-buglog
mailing list