[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded

bugzilla-daemon at bugzilla.netfilter.org bugzilla-daemon at bugzilla.netfilter.org
Mon Sep 25 11:46:18 CEST 2006


https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=512





------- Additional Comments From greg.cowell at celentia.com  2006-09-25 11:46 MET -------
(In reply to comment #6)
> It looks fine, the call is established and PPP/GRE packets go in both 
directions.
> Please also attach a ppp log from both sides with the "debug" option enabled.

The PPP/GRE packets going in both directions are "PPP LC Configuration Request 
and PPP LC Configuration Reject packets" alternately. I've attached the PPP 
log from the Poptop server (after enabling debug in pptpd.conf). I've also 
attached a tcpdump of a successful connection (without ip_nat_pptp loaded) and 
the corresponding PPP log. The Windows XP clients do not have any useful 
logging that I am aware of. The error message they display is "Disconnected. 
Error 619. A connection to the remote computer could not be established so the 
port was closed." Since I applied the new patches I have found that loading 
then unloading the ip_nat_pptp module freezes the server and it has to be hard 
reset. Prior to applying the patches I could load and unload it multiple times 
without problems.

PPP Log:
Sep 25 18:32:52 localhost pptpd[5514]: CTRL: Client 192.168.77.100 control 
connection started
Sep 25 18:32:52 localhost pptpd[5514]: CTRL: Starting call (launching pppd, 
opening GRE)
Sep 25 18:32:52 localhost pppd[5515]: Plugin /usr/lib/pptpd/pptpd-logwtmp.so 
loaded.
Sep 25 18:32:52 localhost pppd[5515]: pppd 2.4.3 started by root, uid 0
Sep 25 18:32:52 localhost pppd[5515]: Using interface ppp0
Sep 25 18:32:52 localhost pppd[5515]: Connect: ppp0 <--> /dev/pts/1
Sep 25 18:33:22 localhost pppd[5515]: LCP: timeout sending Config-Requests
Sep 25 18:33:22 localhost pppd[5515]: Connection terminated.
Sep 25 18:33:22 localhost pppd[5515]: Using interface ppp0
Sep 25 18:33:22 localhost pppd[5515]: Connect: ppp0 <--> /dev/pts/1
Sep 25 18:33:22 localhost pppd[5515]: tcflush failed: Bad file descriptor
Sep 25 18:33:22 localhost pppd[5515]: tcsetattr: Invalid argument (line 1016)
Sep 25 18:33:22 localhost pppd[5515]: Exit.
Sep 25 18:33:22 localhost pptpd[5514]: GRE: read(fd=6,buffer=804e5a0,len=8196) 
from PTY failed: status = -1 error = Input/output error, usually caused by 
unexpected termination of pppd, check option syntax and pppd logs
Sep 25 18:33:22 localhost pptpd[5514]: CTRL: PTY read or GRE write failed 
(pty,gre)=(6,7)
Sep 25 18:33:22 localhost pptpd[5514]: CTRL: Client 192.168.77.100 control 
connection finished

tcpdump (successful connection without ip_nat_pptp loaded):
tcpdump -vv -i eth0
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
18:40:17.357883 arp who-has 192.168.77.102 tell 192.168.77.100
18:40:17.436369 arp reply 192.168.77.102 is-at 00:07:e9:92:a9:bf
18:40:17.357943 IP (tos 0x0, ttl 128, id 1405, offset 0, flags [DF], proto 6, 
length: 48) 192.168.77.100.1054 > 192.168.77.102.1723: S [tcp sum ok] 
391042768:391042768(0) win 64512 <mss 1460,nop,nop,sackOK>
18:40:17.357998 IP (tos 0x0, ttl  64, id 0, offset 0, flags [DF], proto 6, 
length: 48) 192.168.77.102.1723 > 192.168.77.100.1054: S [tcp sum ok] 
599827892:599827892(0) ack 391042769 win 5840 <mss 1460,nop,nop,sackOK>
18:40:17.358144 IP (tos 0x0, ttl 128, id 1406, offset 0, flags [DF], proto 6, 
length: 196) 192.168.77.100.1054 > 192.168.77.102.1723: P 1:157(156) ack 1 win 
64512: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRQ 
PROTO_VER(1.0) FRAME_CAP(A) BEARER_CAP(A) MAX_CHAN(0) FIRM_REV(2600) [|pptp]
18:40:17.358187 IP (tos 0x0, ttl  64, id 6151, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.102.1723 > 192.168.77.100.1054: . [tcp sum ok] 1:1(0) 
ack 157 win 6432
18:40:17.378180 arp who-has 192.168.77.254 tell 192.168.77.102
18:40:17.378425 arp reply 192.168.77.254 is-at 00:16:b6:0a:74:2a
18:40:17.378435 IP (tos 0x0, ttl  64, id 48563, offset 0, flags [DF], proto 
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp 
sum ok]  61629+ PTR? 102.77.168.192.in-addr.arpa. (45)
18:40:17.397092 IP (tos 0x0, ttl  64, id 0, offset 0, flags [DF], proto 17, 
length: 155) 192.168.77.254.1192 > 192.168.77.255.snmptrap:  { SNMPv1 { Trap
(35)  E:3955.2.2.1 10.128.34.222 enterpriseSpecific s=1 12 [|snmp] } }
18:40:17.409451 IP (tos 0x0, ttl  64, id 6152, offset 0, flags [DF], proto 6, 
length: 196) 192.168.77.102.1723 > 192.168.77.100.1054: P 1:157(156) ack 157 
win 6432: pptp Length=156 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=SCCRP 
PROTO_VER(1.0) RESULT_CODE(1:Successful channel establishment) ERR_CODE
(0:None) FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) [|pptp]
18:40:17.409645 IP (tos 0x0, ttl 128, id 1407, offset 0, flags [DF], proto 6, 
length: 208) 192.168.77.100.1054 > 192.168.77.102.1723: P 157:325(168) ack 157 
win 64356: pptp Length=168 CTRL-MSG Magic-Cookie=1a2b3c4d CTRL_MSGTYPE=OCRQ 
CALL_ID(49152) CALL_SER_NUM(57475) MIN_BPS(300) MAX_BPS(100000000) BEARER_TYPE
(Any) FRAME_TYPE(E) RECV_WIN(64) PROC_DELAY(0) PHONE_NO_LEN(0) [|pptp]
18:40:17.409675 IP (tos 0x0, ttl  64, id 6153, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.102.1723 > 192.168.77.100.1054: . [tcp sum ok] 157:157
(0) ack 325 win 7504
18:40:17.413375 IP (tos 0x0, ttl 252, id 24319, offset 0, flags [DF], proto 
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:  
61629 NXDomain q: PTR? 102.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
18:40:17.413602 IP (tos 0x0, ttl  64, id 48567, offset 0, flags [DF], proto 
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp 
sum ok]  52493+ PTR? 100.77.168.192.in-addr.arpa. (45)
18:40:17.436177 IP (tos 0x0, ttl 252, id 24320, offset 0, flags [DF], proto 
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:  
52493 NXDomain q: PTR? 100.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
18:40:17.562010 IP (tos 0x0, ttl  64, id 48582, offset 0, flags [DF], proto 
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp 
sum ok]  20167+ PTR? 254.77.168.192.in-addr.arpa. (45)
18:40:17.582996 IP (tos 0x0, ttl 252, id 24321, offset 0, flags [DF], proto 
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:  
20167 NXDomain q: PTR? 254.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
18:40:17.583432 IP (tos 0x0, ttl  64, id 48584, offset 0, flags [DF], proto 
17, length: 71) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp 
sum ok]  29203+ PTR? 20.20.21.203.in-addr.arpa. (43)
18:40:17.608209 IP (tos 0x0, ttl 252, id 24322, offset 0, flags [DF], proto 
17, length: 460) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:  
29203 q: PTR? 20.20.21.203.in-addr.arpa. 1/6/10 20.20.21.203.in-addr.arpa.
[|domain]
18:40:17.608527 IP (tos 0x0, ttl  64, id 48587, offset 0, flags [DF], proto 
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp 
sum ok]  2579+ PTR? 255.77.168.192.in-addr.arpa. (45)
18:40:17.629586 IP (tos 0x0, ttl 252, id 24323, offset 0, flags [DF], proto 
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:  
2579 NXDomain q: PTR? 255.77.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
18:40:17.793407 IP (tos 0x0, ttl  64, id 6154, offset 0, flags [DF], proto 6, 
length: 72) 192.168.77.102.1723 > 192.168.77.100.1054: P [tcp sum ok] 157:189
(32) ack 325 win 7504: pptp Length=32 CTRL-MSG Magic-Cookie=1a2b3c4d 
CTRL_MSGTYPE=OCRP CALL_ID(0) PEER_CALL_ID(49152) RESULT_CODE(1:Connected) 
ERR_CODE(0:None) CAUSE_CODE(0) CONN_SPEED(100000000) RECV_WIN(64) PROC_DELAY
(0) PHY_CHAN_ID(0)
18:40:17.793603 IP (tos 0x0, ttl  64, id 48605, offset 0, flags [DF], proto 
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 0 gre-ppp-
payload
18:40:17.797573 IP (tos 0x0, ttl 128, id 1408, offset 0, flags [DF], proto 6, 
length: 64) 192.168.77.100.1054 > 192.168.77.102.1723: P [tcp sum ok] 325:349
(24) ack 189 win 64324: pptp Length=24 CTRL-MSG Magic-Cookie=1a2b3c4d 
CTRL_MSGTYPE=SLI PEER_CALL_ID(0) SEND_ACCM(0xffffffff) RECV_ACCM(0xffffffff)
18:40:17.797620 IP (tos 0x0, ttl  64, id 6155, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.102.1723 > 192.168.77.100.1054: . [tcp sum ok] 189:189
(0) ack 349 win 7504
18:40:17.800879 IP (tos 0x0, ttl 128, id 1409, offset 0, flags [none], proto 
47, length: 57) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 0 gre-ppp-
payload
18:40:17.858221 IP (tos 0x0, ttl  64, id 48606, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 0 no-
payload
18:40:17.972828 IP (tos 0x0, ttl  64, id 48607, offset 0, flags [DF], proto 
47, length: 43) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 1 gre-ppp-
payload
18:40:17.973235 IP (tos 0x0, ttl 128, id 1410, offset 0, flags [none], proto 
47, length: 58) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 1 ack 1 gre-
ppp-payload
18:40:17.973447 IP (tos 0x0, ttl  64, id 48608, offset 0, flags [DF], proto 
47, length: 58) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 2 ack 1 
gre-ppp-payload
18:40:18.078261 IP (tos 0x0, ttl 128, id 1411, offset 0, flags [none], proto 
47, length: 32) 192.168.77.100 > 192.168.77.102: [KA] call 0 ack 2 no-payload
18:40:20.798256 IP (tos 0x0, ttl  64, id 48609, offset 0, flags [DF], proto 
47, length: 61) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 3 gre-ppp-
payload
18:40:20.798660 IP (tos 0x0, ttl 128, id 1412, offset 0, flags [none], proto 
47, length: 65) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 2 ack 3 gre-
ppp-payload
18:40:20.798764 IP (tos 0x0, ttl 128, id 1413, offset 0, flags [DF], proto 6, 
length: 64) 192.168.77.100.1054 > 192.168.77.102.1723: P [tcp sum ok] 349:373
(24) ack 189 win 64324: pptp Length=24 CTRL-MSG Magic-Cookie=1a2b3c4d 
CTRL_MSGTYPE=SLI PEER_CALL_ID(0) SEND_ACCM(0x00000000) RECV_ACCM(0xffffffff)
18:40:20.798799 IP (tos 0x0, ttl  64, id 6156, offset 0, flags [DF], proto 6, 
length: 40) 192.168.77.102.1723 > 192.168.77.100.1054: . [tcp sum ok] 189:189
(0) ack 373 win 7504
18:40:20.798910 IP (tos 0x0, ttl 128, id 1414, offset 0, flags [none], proto 
47, length: 52) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 3 gre-ppp-
payload
18:40:20.799015 IP (tos 0x0, ttl 128, id 1415, offset 0, flags [none], proto 
47, length: 59) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 4 gre-ppp-
payload
18:40:20.853232 IP (tos 0x0, ttl  64, id 48610, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 4 no-
payload
18:40:20.853672 IP (tos 0x0, ttl  64, id 48611, offset 0, flags [DF], proto 
47, length: 60) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 4 gre-ppp-
payload
18:40:20.853685 IP (tos 0x0, ttl  64, id 48612, offset 0, flags [DF], proto 
47, length: 58) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 5 gre-ppp-
payload
18:40:20.853695 IP (tos 0x0, ttl  64, id 48613, offset 0, flags [DF], proto 
47, length: 65) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 6 gre-ppp-
payload
18:40:20.875837 IP (tos 0x0, ttl 128, id 1416, offset 0, flags [none], proto 
47, length: 97) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 5 ack 6 gre-
ppp-payload
18:40:20.898228 IP (tos 0x0, ttl  64, id 48614, offset 0, flags [DF], proto 
47, length: 101) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 7 ack 5 
gre-ppp-payload
18:40:20.903893 IP (tos 0x0, ttl 128, id 1417, offset 0, flags [none], proto 
47, length: 32) 192.168.77.100 > 192.168.77.102: [KA] call 0 ack 7 no-payload
18:40:20.910399 IP (tos 0x0, ttl 128, id 1418, offset 0, flags [none], proto 
47, length: 44) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 6 gre-ppp-
payload
18:40:20.910533 IP (tos 0x0, ttl 128, id 1419, offset 0, flags [none], proto 
47, length: 68) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 7 gre-ppp-
payload
18:40:20.973052 IP (tos 0x0, ttl  64, id 48615, offset 0, flags [DF], proto 
47, length: 48) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 8 ack 7 
gre-ppp-payload
18:40:20.973091 IP (tos 0x0, ttl  64, id 48616, offset 0, flags [DF], proto 
47, length: 44) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 9 gre-ppp-
payload
18:40:20.973164 IP (tos 0x0, ttl  64, id 48617, offset 0, flags [DF], proto 
47, length: 38) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 10 gre-
ppp-payload
18:40:20.973509 IP (tos 0x0, ttl 128, id 1420, offset 0, flags [none], proto 
47, length: 48) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 8 ack 10 gre-
ppp-payload
18:40:20.973638 IP (tos 0x0, ttl 128, id 1421, offset 0, flags [none], proto 
47, length: 44) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 9 gre-ppp-
payload
18:40:20.983465 IP (tos 0x0, ttl  64, id 48618, offset 0, flags [DF], proto 
47, length: 48) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 11 ack 9 
gre-ppp-payload
18:40:20.983483 IP (tos 0x0, ttl  64, id 48619, offset 0, flags [DF], proto 
47, length: 44) 192.168.77.102 > 192.168.77.100: [KS] call 49152 seq 12 gre-
ppp-payload
18:40:20.983932 IP (tos 0x0, ttl 128, id 1422, offset 0, flags [none], proto 
47, length: 48) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 10 ack 12 
gre-ppp-payload
18:40:21.028218 IP (tos 0x0, ttl  64, id 48620, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 10 no-
payload
18:40:22.410456 arp who-has 192.168.77.102 tell 192.168.77.254
18:40:22.410490 arp reply 192.168.77.102 is-at 00:07:e9:92:a9:bf
18:40:22.794749 IP (tos 0x0, ttl 128, id 1423, offset 0, flags [none], proto 
47, length: 68) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 11 gre-ppp-
payload
18:40:22.795128 IP (tos 0x0, ttl  64, id 48621, offset 0, flags [DF], proto 
47, length: 66) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 13 ack 
11 gre-ppp-payload
18:40:22.795468 IP (tos 0x0, ttl 128, id 1424, offset 0, flags [none], proto 
47, length: 48) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 12 ack 13 
gre-ppp-payload
18:40:22.795621 IP (tos 0x0, ttl  64, id 48622, offset 0, flags [DF], proto 
47, length: 48) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 14 ack 
12 gre-ppp-payload
18:40:22.795886 IP (tos 0x0, ttl 128, id 1425, offset 0, flags [none], proto 
47, length: 48) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 13 ack 14 
gre-ppp-payload
18:40:22.798005 IP (tos 0x0, ttl  64, id 48623, offset 0, flags [DF], proto 
47, length: 48) 192.168.77.102 > 192.168.77.100: [KSA] call 49152 seq 15 ack 
13 gre-ppp-payload
18:40:22.858499 IP (tos 0x0, ttl 128, id 1427, offset 0, flags [none], proto 
47, length: 81) 192.168.77.100 > 192.168.77.102: [KSA] call 0 seq 14 ack 15 
gre-ppp-payload
18:40:22.858746 IP (tos 0x0, ttl 128, id 1428, offset 0, flags [none], proto 
17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, 
Request from 00:53:45:00:00:00, length: 548, xid:0xf298318f, flags: [none] 
(0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:22.859281 IP (tos 0x0, ttl  64, id 49112, offset 0, flags [DF], proto 
17, length: 74) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp 
sum ok]  47395+ PTR? 255.255.255.255.in-addr.arpa. (46)
18:40:22.861110 IP (tos 0x0, ttl  64, id 0, offset 0, flags [none], proto 17, 
length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, 
length: 548, xid:0xf298318f, flags: [none] (0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:22.867909 IP (tos 0x0, ttl 128, id 1429, offset 0, flags [none], proto 
47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 15 gre-ppp-
payload
18:40:22.877525 IP (tos 0x0, ttl 252, id 24325, offset 0, flags [DF], proto 
17, length: 138) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:  
47395 NXDomain q: PTR? 255.255.255.255.in-addr.arpa. 0/1/0 ns: in-addr.arpa. 
(110)
18:40:22.877764 IP (tos 0x0, ttl  64, id 49113, offset 0, flags [DF], proto 
17, length: 73) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp 
sum ok]  14465+ PTR? 234.78.168.192.in-addr.arpa. (45)
18:40:22.901678 IP (tos 0x0, ttl 252, id 24326, offset 0, flags [DF], proto 
17, length: 150) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:  
14465 NXDomain q: PTR? 234.78.168.192.in-addr.arpa. 0/1/0 ns: 168.192.in-
addr.arpa. (122)
18:40:22.908241 IP (tos 0x0, ttl  64, id 48624, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 15 no-
payload
18:40:22.914636 IP (tos 0x0, ttl 128, id 1431, offset 0, flags [none], proto 
47, length: 365) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 16 gre-ppp-
payload
18:40:22.958244 IP (tos 0x0, ttl  64, id 48625, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 16 no-
payload
18:40:22.987284 IP (tos 0x0, ttl 128, id 1434, offset 0, flags [none], proto 
17, length: 229) 192.168.77.100.netbios-dgm > 192.168.77.255.netbios-dgm:
>>> NBT UDP PACKET(138) Res=0x1106 ID=0x8040 IP=192 (0xc0).168 (0xa8).77 
(0x4d).100 (0x64) Port=138 (0x8a) Length=187 (0xbb) Res2=0x0
SourceName=TA1008784       NameType=0x20 (Server)
DestName=
WARNING: Short packet. Try increasing the snap length


18:40:22.990535 IP (tos 0x0, ttl 128, id 1435, offset 0, flags [none], proto 
47, length: 245) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 17 gre-ppp-
payload
18:40:22.990560 IP (tos 0x0, ttl 128, id 1436, offset 0, flags [none], proto 
47, length: 266) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 18 gre-ppp-
payload
18:40:23.038214 IP (tos 0x0, ttl  64, id 48626, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 18 no-
payload
18:40:23.108050 IP (tos 0x0, ttl 128, id 1437, offset 0, flags [none], proto 
17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, 
Request from 00:53:45:00:00:00, length: 548, xid:0xf298318f, flags: [none] 
(0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:23.108272 IP (tos 0x0, ttl 128, id 1438, offset 0, flags [none], proto 
47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 19 gre-ppp-
payload
18:40:23.109586 IP (tos 0x0, ttl  64, id 0, offset 0, flags [none], proto 17, 
length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, 
length: 548, xid:0xf298318f, flags: [none] (0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:23.158211 IP (tos 0x0, ttl  64, id 48627, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 19 no-
payload
18:40:23.611853 IP (tos 0x0, ttl 128, id 1439, offset 0, flags [none], proto 
17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, 
Request from 00:53:45:00:00:00, length: 548, xid:0xf298318f, flags: [none] 
(0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:23.611904 IP (tos 0x0, ttl 128, id 1440, offset 0, flags [none], proto 
47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 20 gre-ppp-
payload
18:40:23.613335 IP (tos 0x0, ttl  64, id 0, offset 0, flags [none], proto 17, 
length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, 
length: 548, xid:0xf298318f, flags: [none] (0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:23.658574 IP (tos 0x0, ttl  64, id 48628, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 20 no-
payload
18:40:23.794653 IP (tos 0x0, ttl 128, id 1442, offset 0, flags [none], proto 
47, length: 77) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 21 gre-ppp-
payload
18:40:23.840888 IP (tos 0x0, ttl  64, id 48629, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 21 no-
payload
18:40:24.485046 IP (tos 0x0, ttl 128, id 1444, offset 0, flags [none], proto 
47, length: 245) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 22 gre-ppp-
payload
18:40:24.532139 IP (tos 0x0, ttl  64, id 48630, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 22 no-
payload
18:40:24.607307 IP (tos 0x0, ttl 128, id 1446, offset 0, flags [none], proto 
47, length: 99) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 23 gre-ppp-
payload
18:40:24.607537 IP (tos 0x0, ttl 128, id 1448, offset 0, flags [none], proto 
17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, 
Request from 00:53:45:00:00:00, length: 548, xid:0x52a03c90, flags: [none] 
(0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:24.607591 IP (tos 0x0, ttl 128, id 1450, offset 0, flags [none], proto 
47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 24 gre-ppp-
payload
18:40:24.611178 IP (tos 0x0, ttl  64, id 0, offset 0, flags [none], proto 17, 
length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, 
length: 548, xid:0x52a03c90, flags: [none] (0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:24.648212 IP (tos 0x0, ttl  64, id 48631, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 24 no-
payload
18:40:24.857659 IP (tos 0x0, ttl 128, id 1451, offset 0, flags [none], proto 
17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, 
Request from 00:53:45:00:00:00, length: 548, xid:0x52a03c90, flags: [none] 
(0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:24.857708 IP (tos 0x0, ttl 128, id 1452, offset 0, flags [none], proto 
47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 25 gre-ppp-
payload
18:40:24.859195 IP (tos 0x0, ttl  64, id 0, offset 0, flags [none], proto 17, 
length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, 
length: 548, xid:0x52a03c90, flags: [none] (0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:24.906970 IP (tos 0x0, ttl  64, id 48632, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 25 no-
payload
18:40:25.357287 IP (tos 0x0, ttl 128, id 1453, offset 0, flags [none], proto 
17, length: 576) 192.168.78.234.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, 
Request from 00:53:45:00:00:00, length: 548, xid:0x52a03c90, flags: [none] 
(0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:25.357337 IP (tos 0x0, ttl 128, id 1454, offset 0, flags [none], proto 
47, length: 613) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 26 gre-ppp-
payload
18:40:25.358838 IP (tos 0x0, ttl  64, id 0, offset 0, flags [none], proto 17, 
length: 576) 192.168.77.254.bootps > 192.168.78.234.bootpc: BOOTP/DHCP, Reply, 
length: 548, xid:0x52a03c90, flags: [none] (0x0000)
          Client IP: 192.168.78.234
          Client Ethernet Address: 00:53:45:00:00:00 [|bootp]
18:40:25.398207 IP (tos 0x0, ttl  64, id 48633, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 26 no-
payload
18:40:25.498001 IP (tos 0x0, ttl 128, id 1456, offset 0, flags [none], proto 
47, length: 99) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 27 gre-ppp-
payload
18:40:25.548211 IP (tos 0x0, ttl  64, id 48634, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 27 no-
payload
18:40:25.888576 IP (tos 0x0, ttl 128, id 1460, offset 0, flags [none], proto 
47, length: 365) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 28 gre-ppp-
payload
18:40:25.943957 IP (tos 0x0, ttl  64, id 48635, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 28 no-
payload
18:40:25.982236 IP (tos 0x0, ttl 128, id 1462, offset 0, flags [none], proto 
47, length: 245) 192.168.77.100 > 192.168.77.102: [KS] call 0 seq 29 gre-ppp-
payload
18:40:26.028211 IP (tos 0x0, ttl  64, id 48636, offset 0, flags [DF], proto 
47, length: 32) 192.168.77.102 > 192.168.77.100: [KA] call 49152 ack 29 no-
payload
18:40:26.043345 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 308) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 280
18:40:26.043634 IP (tos 0x0, ttl  64, id 49430, offset 0, flags [DF], proto 
17, length: 74) 192.168.77.102.32769 > dnscache01.westnet.com.au.domain: [udp 
sum ok]  7479+ PTR? 250.255.255.239.in-addr.arpa. (46)
18:40:26.043814 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 312) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 284
18:40:26.044827 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 380) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 352
18:40:26.046604 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 288) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 260
18:40:26.047044 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 344) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 316
18:40:26.048806 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 308) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 280
18:40:26.049224 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 374) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 346
18:40:26.050562 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 362) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 334
18:40:26.052219 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 376) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 348
18:40:26.053541 IP (tos 0x0, ttl   1, id 0, offset 0, flags [DF], proto 17, 
length: 368) 192.168.77.254.1193 > 239.255.255.250.1900: UDP, length 340
18:40:26.064332 IP (tos 0x0, ttl 252, id 24327, offset 0, flags [DF], proto 
17, length: 131) dnscache01.westnet.com.au.domain > 192.168.77.102.32769:  
7479 NXDomain q: PTR? 250.255.255.239.in-addr.arpa. 0/1/0 ns: 239.in-
addr.arpa. (103)

122 packets captured
122 packets received by filter
0 packets dropped by kernel


PPP Log (without ip_nat_pptp loaded):
Sep 25 18:51:08 localhost pptpd[5195]: CTRL: Client 192.168.77.100 control 
connection started
Sep 25 18:51:08 localhost pptpd[5195]: CTRL: Starting call (launching pppd, 
opening GRE)
Sep 25 18:51:08 localhost pppd[5196]: Plugin /usr/lib/pptpd/pptpd-logwtmp.so 
loaded.
Sep 25 18:51:08 localhost pppd[5196]: pppd 2.4.3 started by root, uid 0
Sep 25 18:51:08 localhost pppd[5196]: Using interface ppp0
Sep 25 18:51:08 localhost pppd[5196]: Connect: ppp0 <--> /dev/pts/2
Sep 25 18:51:11 localhost pptpd[5195]: CTRL: Ignored a SET LINK INFO packet 
with real ACCMs!
Sep 25 18:51:11 localhost pppd[5196]: MPPE 128-bit stateless compression 
enabled
Sep 25 18:51:13 localhost pppd[5196]: Cannot determine ethernet address for 
proxy ARP
Sep 25 18:51:13 localhost pppd[5196]: local  IP address 192.168.77.101
Sep 25 18:51:13 localhost pppd[5196]: remote IP address 192.168.78.234


-- 
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the netfilter-buglog mailing list