2006:11:26-13:45:20 (none) pluto[6389]: packet from 208.54.94.10:40763: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] 2006:11:26-13:45:20 (none) pluto[6389]: packet from 208.54.94.10:40763: ignoring Vendor ID payload [FRAGMENTATION] 2006:11:26-13:45:20 (none) pluto[6389]: packet from 208.54.94.10:40763: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2006:11:26-13:45:20 (none) pluto[6389]: packet from 208.54.94.10:40763: ignoring Vendor ID payload [Vid-Initial-Contact] 2006:11:26-13:45:20 (none) pluto[6389]: "D_REF_wwqZAPNfYv_1"[7] 208.54.94.10:40763 #8: responding to Main Mode from unknown peer 208.54.94.10:40763 2006:11:26-13:45:30 (none) pluto[6389]: "D_REF_wwqZAPNfYv_1"[7] 208.54.94.10:40763 #8: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: peer is NATed 2006:11:26-13:45:33 (none) pluto[6389]: "D_REF_wwqZAPNfYv_1"[7] 208.54.94.10:40763 #8: Peer ID is ID_FQDN: '@T-Mobile Dash' 2006:11:26-13:45:33 (none) pluto[6389]: "D_REF_wwqZAPNfYv_1"[8] 208.54.94.10:40763 #8: deleting connection "D_REF_wwqZAPNfYv_1" instance with peer 208.54.94.10 {isakmp=#0/ipsec=#0} 2006:11:26-13:45:33 (none) pluto[6389]: | NAT-T: new mapping 208.54.94.10:40763/40798) 2006:11:26-13:45:33 (none) pluto[6389]: "D_REF_wwqZAPNfYv_1"[8] 208.54.94.10:40798 #8: sent MR3, ISAKMP SA established 2006:11:26-13:45:33 (none) pluto[6389]: "D_REF_wwqZAPNfYv_1"[8] 208.54.94.10:40798 #8: retransmitting in response to duplicate packet; already STATE_MAIN_R3 2006:11:26-13:45:34 (none) pluto[6389]: "D_REF_wwqZAPNfYv_0"[3] 208.54.94.10:40798 #9: IPSec Transform [ESP_3DES (192), AUTH_ALGORITHM_HMAC_SHA1] refused due to strict flag 2006:11:26-13:45:34 (none) pluto[6389]: "D_REF_wwqZAPNfYv_0"[3] 208.54.94.10:40798 #9: responding to Quick Mode 2006:11:26-13:45:35 (none) l2tpd[6406]: ourtid = 28116, entropy_buf = 6dd4 2006:11:26-13:45:35 (none) l2tpd[6406]: ourcid = 55009, entropy_buf = d6e1 2006:11:26-13:45:35 (none) l2tpd[6406]: check_control: control, cid = 0, Ns = 0, Nr = 0 2006:11:26-13:45:35 (none) l2tpd[6406]: handle_avps: handling avp's for tunnel 28116, call 55009 2006:11:26-13:45:35 (none) l2tpd[6406]: message_type_avp: message type 1 (Start-Control-Connection-Request) 2006:11:26-13:45:35 (none) l2tpd[6406]: protocol_version_avp: peer is using version 1, revision 0. 2006:11:26-13:45:35 (none) l2tpd[6406]: framing_caps_avp: supported peer frames: sync 2006:11:26-13:45:35 (none) l2tpd[6406]: bearer_caps_avp: supported peer bearers: 2006:11:26-13:45:35 (none) l2tpd[6406]: firmware_rev_avp: peer reports firmware version 1026 (0x0402) 2006:11:26-13:45:35 (none) l2tpd[6406]: hostname_avp: peer reports hostname 'T-Mobile Dash' 2006:11:26-13:45:35 (none) l2tpd[6406]: vendor_avp: peer reports vendor 'Microsoft�' 2006:11:26-13:45:35 (none) l2tpd[6406]: assigned_tunnel_avp: using peer's tunnel 19 2006:11:26-13:45:35 (none) l2tpd[6406]: receive_window_size_avp: peer wants RWS of 8. Will use flow control. 2006:11:26-13:45:36 (none) l2tpd[6406]: ourtid = 11930, entropy_buf = 2e9a 2006:11:26-13:45:36 (none) l2tpd[6406]: check_control: control, cid = 0, Ns = 0, Nr = 0 2006:11:26-13:45:36 (none) l2tpd[6406]: handle_avps: handling avp's for tunnel 11930, call 2037411698 2006:11:26-13:45:36 (none) l2tpd[6406]: message_type_avp: message type 1 (Start-Control-Connection-Request) 2006:11:26-13:45:36 (none) l2tpd[6406]: protocol_version_avp: peer is using version 1, revision 0. 2006:11:26-13:45:36 (none) l2tpd[6406]: framing_caps_avp: supported peer frames: sync 2006:11:26-13:45:36 (none) l2tpd[6406]: bearer_caps_avp: supported peer bearers: 2006:11:26-13:45:36 (none) l2tpd[6406]: firmware_rev_avp: peer reports firmware version 1026 (0x0402) 2006:11:26-13:45:36 (none) l2tpd[6406]: hostname_avp: peer reports hostname 'T-Mobile Dash' 2006:11:26-13:45:36 (none) l2tpd[6406]: vendor_avp: peer reports vendor 'Microsoft�' 2006:11:26-13:45:36 (none) l2tpd[6406]: assigned_tunnel_avp: using peer's tunnel 19 2006:11:26-13:45:36 (none) l2tpd[6406]: receive_window_size_avp: peer wants RWS of 8. Will use flow control. 2006:11:26-13:45:36 (none) l2tpd[6406]: control_finish: Peer requested tunnel 19 twice, ignoring second one. 2006:11:26-13:45:36 (none) pluto[6389]: "D_REF_wwqZAPNfYv_0"[3] 208.54.94.10:40798 #9: IPsec SA established {ESP=>0x00a66a00 <0x68baebfe NATOA=10.186.164.121} 2006:11:26-13:45:38 (none) l2tpd[6406]: ourtid = 2000, entropy_buf = 7d0 2006:11:26-13:45:38 (none) l2tpd[6406]: ourcid = 12929, entropy_buf = 3281 2006:11:26-13:45:38 (none) l2tpd[6406]: check_control: control, cid = 0, Ns = 0, Nr = 0 2006:11:26-13:45:38 (none) l2tpd[6406]: handle_avps: handling avp's for tunnel 2000, call 12929 2006:11:26-13:45:38 (none) l2tpd[6406]: message_type_avp: message type 1 (Start-Control-Connection-Request) 2006:11:26-13:45:38 (none) l2tpd[6406]: protocol_version_avp: peer is using version 1, revision 0. 2006:11:26-13:45:38 (none) l2tpd[6406]: framing_caps_avp: supported peer frames: sync 2006:11:26-13:45:38 (none) l2tpd[6406]: bearer_caps_avp: supported peer bearers: 2006:11:26-13:45:38 (none) l2tpd[6406]: firmware_rev_avp: peer reports firmware version 1026 (0x0402) 2006:11:26-13:45:38 (none) l2tpd[6406]: hostname_avp: peer reports hostname 'T-Mobile Dash' 2006:11:26-13:45:38 (none) l2tpd[6406]: vendor_avp: peer reports vendor 'Microsoft�' 2006:11:26-13:45:38 (none) l2tpd[6406]: assigned_tunnel_avp: using peer's tunnel 19 2006:11:26-13:45:38 (none) l2tpd[6406]: receive_window_size_avp: peer wants RWS of 8. Will use flow control. 2006:11:26-13:45:38 (none) l2tpd[6406]: control_finish: Peer requested tunnel 19 twice, ignoring second one. 2006:11:26-13:45:40 (none) l2tpd[6406]: check_control: control, cid = 0, Ns = 1, Nr = 1 2006:11:26-13:45:40 (none) l2tpd[6406]: handle_avps: handling avp's for tunnel 28116, call 55009 2006:11:26-13:45:40 (none) l2tpd[6406]: message_type_avp: message type 3 (Start-Control-Connection-Connected) 2006:11:26-13:45:40 (none) l2tpd[6406]: control_finish: Connection established to 208.54.94.10, 1701. Local: 28116, Remote: 19. LNS session is 'default' 2006:11:26-13:45:40 (none) l2tpd[6406]: check_control: control, cid = 0, Ns = 2, Nr = 1 2006:11:26-13:45:40 (none) l2tpd[6406]: handle_avps: handling avp's for tunnel 28116, call 55009 2006:11:26-13:45:40 (none) l2tpd[6406]: message_type_avp: message type 10 (Incoming-Call-Request) 2006:11:26-13:45:40 (none) l2tpd[6406]: message_type_avp: new incoming call 2006:11:26-13:45:40 (none) l2tpd[6406]: ourcid = 18258, entropy_buf = 4752 2006:11:26-13:45:40 (none) l2tpd[6406]: assigned_call_avp: using peer's call 1 2006:11:26-13:45:40 (none) l2tpd[6406]: call_serno_avp: serial number is 0 2006:11:26-13:45:40 (none) l2tpd[6406]: bearer_type_avp: peer bears:digital 2006:11:26-13:45:40 (none) l2tpd[6406]: check_control: control, cid = 0, Ns = 3, Nr = 1 2006:11:26-13:45:41 (none) l2tpd[6406]: check_control: control, cid = 1, Ns = 3, Nr = 2 2006:11:26-13:45:41 (none) l2tpd[6406]: handle_avps: handling avp's for tunnel 28116, call 18258 2006:11:26-13:45:41 (none) l2tpd[6406]: message_type_avp: message type 12 (Incoming-Call-Connected) 2006:11:26-13:45:41 (none) l2tpd[6406]: tx_speed_avp: transmit baud rate is 10000000 2006:11:26-13:45:41 (none) l2tpd[6406]: frame_type_avp: peer uses:sync frames 2006:11:26-13:45:41 (none) l2tpd[6406]: ignore_avp : Ignoring AVP 2006:11:26-13:45:41 (none) l2tpd[6406]: start_pppd: I'm running: 2006:11:26-13:45:41 (none) l2tpd[6406]: "/usr/sbin/pppd-l2tp" 2006:11:26-13:45:41 (none) l2tpd[6406]: "passive" 2006:11:26-13:45:41 (none) l2tpd[6406]: "-detach" 2006:11:26-13:45:41 (none) l2tpd[6406]: "10.242.3.1:10.242.3.2" 2006:11:26-13:45:41 (none) l2tpd[6406]: "auth" 2006:11:26-13:45:41 (none) l2tpd[6406]: "name" 2006:11:26-13:45:41 (none) l2tpd[6406]: "LinuxVPNserver" 2006:11:26-13:45:41 (none) l2tpd[6406]: "file" 2006:11:26-13:45:41 (none) l2tpd[6406]: "/etc/ppp/options.l2tpd" 2006:11:26-13:45:41 (none) l2tpd[6406]: "/dev/ttyp0" 2006:11:26-13:45:41 (none) l2tpd[6406]: 2006:11:26-13:45:41 (none) l2tpd[6406]: control_finish: Call established with 208.54.94.10, Local: 18258, Remote: 1, Serial: 0 2006:11:26-13:45:41 (none) pppd-l2tp[6846]: Plugin /usr/sbin/aua.so loaded. 2006:11:26-13:45:41 (none) pppd-l2tp[6846]: AUA plugin initialized. 2006:11:26-13:45:41 (none) pppd-l2tp[6846]: pppd 2.4.3 started by (unknown), uid 0 2006:11:26-13:45:41 (none) pppd-l2tp[6846]: using channel 36 2006:11:26-13:45:41 (none) pppd-l2tp[6846]: Using interface ppp0 2006:11:26-13:45:41 (none) pppd-l2tp[6846]: Connect: ppp0 <--> /dev/ttyp0 2006:11:26-13:45:41 (none) pppd-l2tp[6846]: Warning - secret file /etc/ppp/pap-secrets has world and/or group access 2006:11:26-13:45:41 (none) pppd-l2tp[6846]: sent [LCP ConfReq id=0x1 ] 2006:11:26-13:45:42 (none) l2tpd[6406]: check_control: control, cid = 0, Ns = 4, Nr = 2 2006:11:26-13:45:42 (none) pppd-l2tp[6846]: rcvd [LCP ConfReq id=0x0 ] 2006:11:26-13:45:42 (none) pppd-l2tp[6846]: sent [LCP ConfAck id=0x0 ] 2006:11:26-13:45:42 (none) pppd-l2tp[6846]: rcvd [LCP ConfNak id=0x1 ] 2006:11:26-13:45:42 (none) pppd-l2tp[6846]: sent [LCP ConfReq id=0x2 ] 2006:11:26-13:45:43 (none) pppd-l2tp[6846]: rcvd [LCP ConfAck id=0x2 ] 2006:11:26-13:45:43 (none) pppd-l2tp[6846]: sent [CHAP Challenge id=0xaf , name = "LinuxVPNserver"] 2006:11:26-13:45:43 (none) pppd-l2tp[6846]: rcvd [CHAP Response id=0xaf , name = "testuser1"] 2006:11:26-13:45:45 (none) pppd-l2tp[6846]: AUAconnect - Returned IPAddr 192.168.2.51 2006:11:26-13:45:45 (none) pppd-l2tp[6846]: AUA: authentication of user testuser1 succeeded 2006:11:26-13:45:45 (none) pppd-l2tp[6846]: sent [CHAP Success id=0xaf "S=0F678F77BF5575F7E8753071D81CE06281BB55ED M=Access granted"] 2006:11:26-13:45:45 (none) pppd-l2tp[6846]: sent [IPCP ConfReq id=0x1 ] 2006:11:26-13:45:46 (none) pppd-l2tp[6846]: rcvd [CHAP Response id=0xaf , name = "testuser1"] 2006:11:26-13:45:46 (none) pppd-l2tp[6846]: sent [CHAP Success id=0xaf ""] 2006:11:26-13:45:46 (none) pppd-l2tp[6846]: rcvd [IPCP ConfReq id=0x0 ] 2006:11:26-13:45:46 (none) pppd-l2tp[6846]: sent [IPCP ConfRej id=0x0 ] 2006:11:26-13:45:47 (none) pppd-l2tp[6846]: rcvd [proto=0x8057] 01 00 00 0e 01 0a 02 09 2d ff fe bb da b0 2006:11:26-13:45:47 (none) pppd-l2tp[6846]: Unsupported protocol 0x8057 received 2006:11:26-13:45:47 (none) pppd-l2tp[6846]: sent [LCP ProtRej id=0x3 80 57 01 00 00 0e 01 0a 02 09 2d ff fe bb da b0] 2006:11:26-13:45:47 (none) pppd-l2tp[6846]: rcvd [IPCP ConfRej id=0x1 ] 2006:11:26-13:45:47 (none) pppd-l2tp[6846]: sent [IPCP ConfReq id=0x2 ] 2006:11:26-13:45:47 (none) pppd-l2tp[6846]: rcvd [LCP TermReq id=0x1] 2006:11:26-13:45:47 (none) pppd-l2tp[6846]: LCP terminated by peer 2006:11:26-13:45:47 (none) pppd-l2tp[6846]: sent [LCP TermAck id=0x1] 2006:11:26-13:45:48 (none) l2tpd[6406]: check_control: control, cid = 1, Ns = 4, Nr = 2 2006:11:26-13:45:48 (none) l2tpd[6406]: handle_avps: handling avp's for tunnel 28116, call 18258 2006:11:26-13:45:48 (none) l2tpd[6406]: message_type_avp: message type 14 (Call-Disconnect-Notify) 2006:11:26-13:45:48 (none) l2tpd[6406]: result_code_avp: peer closing for reason 3 (Control channel already exists), error = 0 () 2006:11:26-13:45:48 (none) l2tpd[6406]: assigned_call_avp: using peer's call 1 2006:11:26-13:45:48 (none) l2tpd[6406]: control_finish: Peer tried to disconnect with invalid CID (1 != 18258) 2006:11:26-13:45:49 (none) l2tpd[6406]: check_control: control, cid = 0, Ns = 5, Nr = 2 2006:11:26-13:45:49 (none) l2tpd[6406]: handle_avps: handling avp's for tunnel 28116, call 55009 2006:11:26-13:45:49 (none) l2tpd[6406]: message_type_avp: message type 4 (Stop-Control-Connection-Notification) 2006:11:26-13:45:49 (none) l2tpd[6406]: assigned_tunnel_avp: using peer's tunnel 19 2006:11:26-13:45:49 (none) l2tpd[6406]: result_code_avp: peer closing for reason 6 (Requester is being shut down), error = 0 () 2006:11:26-13:45:49 (none) l2tpd[6406]: control_finish: Peer tried to disconnect with invalid TID (19 != 28116) 2006:11:26-13:45:50 (none) pppd-l2tp[6846]: Connection terminated. 2006:11:26-13:45:50 (none) pppd-l2tp[6846]: Connect time 0.1 minutes. 2006:11:26-13:45:50 (none) pppd-l2tp[6846]: Sent 42 bytes, received 58 bytes. 2006:11:26-13:45:51 (none) pppd-l2tp[6846]: using channel 37 2006:11:26-13:45:51 (none) pppd-l2tp[6846]: Using interface ppp0 2006:11:26-13:45:51 (none) pppd-l2tp[6846]: Connect: ppp0 <--> /dev/ttyp0 2006:11:26-13:45:51 (none) pppd-l2tp[6846]: Warning - secret file /etc/ppp/pap-secrets has world and/or group access 2006:11:26-13:45:51 (none) pppd-l2tp[6846]: sent [LCP ConfReq id=0x4 ] 2006:11:26-13:45:51 (none) pppd-l2tp[6846]: tcflush failed: Bad file descriptor 2006:11:26-13:45:52 (none) pppd-l2tp[6846]: tcsetattr: Invalid argument (line 1001) 2006:11:26-13:45:52 (none) pppd-l2tp[6846]: Exit. 2006:11:26-13:45:52 (none) l2tpd[6406]: child_handler : pppd died for call 1 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Error 9 (Bad file descriptor) 2006:11:26-13:45:52 (none) l2tpd[6406]: read_packet: Too many errors. Declaring call dead. 2006:11:26-13:45:52 (none) l2tpd[6406]: network_thread: tossing read packet, error = Bad file descriptor (9). Closing call. 2006:11:26-13:45:52 (none) l2tpd[6406]: call_close: Call 18258 to 208.54.94.10 disconnected 2006:11:26-13:45:57 (none) l2tpd[6406]: control_xmit: Maximum retries exceeded for tunnel 28116. Closing. 2006:11:26-13:45:57 (none) l2tpd[6406]: call_close : Connection 19 closed to 208.54.94.10, port 1701 (Timeout) 2006:11:26-13:46:02 (none) l2tpd[6406]: control_xmit: Unable to deliver closing message for tunnel 28116. Destroying anyway.