Hi there.
First my setup:
ASL running on DELL PowerEdge 1850 with Dual 2.8GHz Xeon with Hyperthreading (4 logical CPUs)
'External' ASL 'Internal'
WinXP Client from 'External' (128.212.52.7) -L2TP-> (128.212.49.3) ASL (192.168.111.220) -> ssh/ftp on 'internal' Client (192.168.111.222)
WinXP gets 10.0.0.2 from IPSEC-POOL.
I masquerade 'IPSEC-POOL' for Interface 'Internal'.
L2TP Connection fires up fine, icmp (ping) works correct, ftp login and browsing works, and i even got a ssh login twice. once it timed out after username, once after hitting the first letters of a command.
FTP Data Connections time out after not even one single data packet (watched it with ethereal).
It's no packetfilter problem since i allow anything from anywhere to anywhere.
No Intrusion Protection enabled.
I set up my 5.202 machine exactly the same (L2TP, IPSec, User, IPs..) and build the L2TP tunnel to it. Et voila, it works as expected.
Thinking about a SMP/HT problem i turned of HT in Bios but didn't help. Couldn't install without SMP since the Kernel fails to load the megaraid driver correctly there.
IPSec VPN Logfile shows:
2005:05:31-14:56:09 (none) pppd-l2tp[2753]: rcvd [CCP ResetReq id=0x9]
2005:05:31-14:56:09 (none) pppd-l2tp[2753]: sent [CCP ResetAck id=0x9]
2005:05:31-14:56:13 (none) pppd-l2tp[2753]: rcvd [CCP ResetReq id=0xa]
2005:05:31-14:56:13 (none) pppd-l2tp[2753]: sent [CCP ResetAck id=0xa]
2005:05:31-14:56:15 (none) pppd-l2tp[2753]: rcvd [CCP ResetReq id=0xb]
2005:05:31-14:56:15 (none) pppd-l2tp[2753]: sent [CCP ResetAck id=0xb]
2005:05:31-14:56:20 (none) pppd-l2tp[2753]: rcvd [CCP ResetReq id=0xc]
2005:05:31-14:56:20 (none) pppd-l2tp[2753]: sent [CCP ResetAck id=0xc]
2005:05:31-14:56:41 (none) pppd-l2tp[2753]: rcvd [CCP ResetReq id=0xd]
2005:05:31-14:56:41 (none) pppd-l2tp[2753]: sent [CCP ResetAck id=0xd]
2005:05:31-14:56:58 (none) l2tpd[2529]: check_control: control, cid = 0, Ns = 4, Nr = 23
while trying to initialize a ssh connection over putty.
ethereal showes:
No. Time Source Destination Protocol Info
1944 97.813412 192.168.111.220 192.168.111.222 TCP telefinder > ssh [SYN] Seq=0 Ack=0 Win=65535 Len=0 MSS=1340
1945 97.813451 192.168.111.222 192.168.111.220 TCP ssh > telefinder [SYN, ACK] Seq=0 Ack=1 Win=5840 Len=0 MSS=1460
1946 97.814081 192.168.111.220 192.168.111.222 TCP telefinder > ssh [ACK] Seq=1 Ack=1 Win=65535 Len=0
1951 98.074429 192.168.111.222 192.168.111.220 SSHv2 Server Protocol: SSH-1.99-OpenSSH_3.9p1
1952 98.075435 192.168.111.220 192.168.111.222 SSHv2 Client Protocol: SSH-2.0-PuTTY-Release-0.53
1953 98.075526 192.168.111.222 192.168.111.220 TCP ssh > telefinder [ACK] Seq=24 Ack=28 Win=5840 Len=0
1954 98.076601 192.168.111.222 192.168.111.220 SSHv2 Server: Key Exchange Init
1955 98.107819 192.168.111.220 192.168.111.222 SSHv2 Client: Key Exchange Init
1956 98.107822 192.168.111.220 192.168.111.222 SSHv2 Client: Diffie-Hellman Key Exchange Init
1957 98.122808 192.168.111.222 192.168.111.220 SSHv2 Server: Diffie-Hellman Key Exchange Reply
1958 98.276969 192.168.111.220 192.168.111.222 TCP telefinder > ssh [ACK] Seq=532 Ack=944 Win=64592 Len=0
1959 98.303882 192.168.111.220 192.168.111.222 SSHv2 Client: Diffie-Hellman GEX Init
1960 98.335769 192.168.111.222 192.168.111.220 SSHv2 Server: Diffie-Hellman GEX Reply
1964 98.558500 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
1977 99.004431 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
1998 99.896297 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
2008 100.179795 192.168.111.220 192.168.111.222 SSHv2 [TCP Out-Of-Order] Client: Diffie-Hellman GEX Init
2009 100.179828 192.168.111.222 192.168.111.220 TCP ssh > telefinder [ACK] Seq=1536 Ack=804 Win=7504 Len=0 SLE=2958759648 SRE=2958759920
2026 101.680024 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
2092 105.247488 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
2203 112.382402 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
2430 126.652233 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
2896 155.191892 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
3974 212.271226 192.168.111.222 192.168.111.220 SSHv2 [TCP Retransmission] Encrypted response packet len=592
4047 218.075299 192.168.111.222 192.168.111.220 TCP ssh > telefinder [FIN, ACK] Seq=1536 Ack=804 Win=7504 Len=0
for a failed login with putty over ssh(2).
Any Ideas or Comments on this?
Greetings,
Sebastian