From: Christian S. <ch...@in...> - 2005-06-14 08:09:37
|
Hi again, I built a debian package from the l2tpns 2.1.0 source from sourceforge and have some problems. With 2.0.14-1 from debian unstable I can connect any times without any problems, but I need IPv6 and radius interim support, so I wanted to try 2.1.0. Here is the ppp log from 2.0.14-1: Jun 14 09:14:52 test pppd[18948]: pppd 2.4.3 started by root, uid 0 Jun 14 09:14:52 test pppd[18948]: Serial connection established. Jun 14 09:14:52 test pppd[18948]: Using interface ppp0 Jun 14 09:14:52 test pppd[18948]: Connect: ppp0 <--> /dev/pts/1 Jun 14 09:14:52 test pppoe[18949]: PADS: Service-Name: '' Jun 14 09:14:52 test pppoe[18949]: PPP session is 1018 Jun 14 09:14:59 test pppd[18948]: PAP authentication succeeded Jun 14 09:14:59 test pppd[18948]: local IP address 192.109.21.mmm Jun 14 09:14:59 test pppd[18948]: remote IP address 192.109.42.vvv Jun 14 09:14:59 test pppd[18948]: primary DNS address 192.109.42.aaa Jun 14 09:14:59 test pppd[18948]: secondary DNS address 192.109.42.bbb Jun 14 09:15:13 test pppd[18948]: Terminating on signal 15 Jun 14 09:15:13 test pppd[18948]: Connect time 0.3 minutes. Jun 14 09:15:13 test pppd[18948]: Sent 5606 bytes, received 9434 bytes. Jun 14 09:15:13 test pppd[18948]: Connection terminated. Jun 14 09:15:14 test pppoe[18949]: Session 1018 terminated -- received PADT from peer Jun 14 09:15:14 test pppoe[18949]: Sent PADT Jun 14 09:15:14 test pppd[18948]: Exit. I terminated this session with "poff". Everything is fine. When I update from 2.0.14-1 to 2.1.0 without changing the configuration I can only connect 1 out of 20 times. This is what the ppp debug says: Jun 14 09:41:05 test pppd[19039]: pppd 2.4.3 started by root, uid 0 Jun 14 09:41:05 test pppd[19039]: Serial connection established. Jun 14 09:41:05 test pppd[19039]: using channel 723 Jun 14 09:41:05 test pppd[19039]: Using interface ppp0 Jun 14 09:41:05 test pppd[19039]: Connect: ppp0 <--> /dev/pts/1 Jun 14 09:41:05 test pppoe[19040]: PADS: Service-Name: '' Jun 14 09:41:05 test pppoe[19040]: PPP session is 2682 Jun 14 09:41:06 test pppd[19039]: sent [LCP ConfReq id=0x1 <magic 0xc48ca24a> <pcomp>] Jun 14 09:41:06 test pppd[19039]: rcvd [LCP ConfReq id=0xc9 <mru 1492> <auth pap> <magic 0x20a51d42>] Jun 14 09:41:06 test pppd[19039]: sent [LCP ConfAck id=0xc9 <mru 1492> <auth pap> <magic 0x20a51d42>] Jun 14 09:41:06 test pppd[19039]: rcvd [LCP ConfAck id=0x1 <magic 0xc48ca24a> <pcomp>] Jun 14 09:41:06 test pppd[19039]: sent [LCP EchoReq id=0x0 magic=0xc48ca24a] Jun 14 09:41:06 test pppd[19039]: sent [PAP AuthReq id=0x1 user="l2tptest@realm" password=<hidden>] Jun 14 09:41:06 test pppd[19039]: rcvd [LCP EchoRep id=0x0 magic=0x20a51d42] Jun 14 09:41:07 test pppd[19039]: rcvd [LCP ConfReq id=0x8f <mru 1452> <auth pap> <magic 0x20a51d42>] Jun 14 09:41:07 test pppd[19039]: sent [LCP ConfReq id=0x2 <magic 0x16cb01a9> <pcomp>] Jun 14 09:41:07 test pppd[19039]: sent [LCP ConfAck id=0x8f <mru 1452> <auth pap> <magic 0x20a51d42>] Jun 14 09:41:07 test pppd[19039]: rcvd [LCP ConfAck id=0x2 <magic 0x16cb01a9> <pcomp>] Jun 14 09:41:07 test pppd[19039]: sent [LCP EchoReq id=0x0 magic=0x16cb01a9] Jun 14 09:41:07 test pppd[19039]: sent [PAP AuthReq id=0x2 user="l2tptest@realm" password=<hidden>] Jun 14 09:41:07 test pppd[19039]: rcvd [LCP ConfReq id=0x8f <mru 1452> <auth pap> <magic 0x20a51d42>] Jun 14 09:41:07 test pppd[19039]: sent [LCP ConfReq id=0x3 <magic 0x69fd4f4d> <pcomp>] Jun 14 09:41:07 test pppd[19039]: sent [LCP ConfAck id=0x8f <mru 1452> <auth pap> <magic 0x20a51d42>] Jun 14 09:41:07 test pppd[19039]: rcvd [LCP EchoRep id=0x0 magic=0x20a51d42] Jun 14 09:41:07 test pppd[19039]: rcvd [LCP ConfAck id=0x3 <magic 0x69fd4f4d> <pcomp>] Jun 14 09:41:07 test pppd[19039]: sent [LCP EchoReq id=0x0 magic=0x69fd4f4d] Jun 14 09:41:07 test pppd[19039]: sent [PAP AuthReq id=0x3 user="l2tptest@realm" password=<hidden>] Jun 14 09:41:07 test pppd[19039]: rcvd [PAP AuthAck id=0x2 ""] Jun 14 09:41:07 test pppd[19039]: PAP authentication succeeded Jun 14 09:41:07 test pppd[19039]: sent [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>] Jun 14 09:41:07 test pppd[19039]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns3 0.0.0.0>] Jun 14 09:41:07 test pppd[19039]: sent [IPV6CP ConfReq id=0x1 <addr fe80::198e:fc17:0555:b6fb>] Jun 14 09:41:07 test pppd[19039]: rcvd [IPCP ConfReq id=0x0 <addr 192.109.42.vvv>] Jun 14 09:41:07 test pppd[19039]: sent [IPCP ConfAck id=0x0 <addr 192.109.42.vvv>] Jun 14 09:41:07 test pppd[19039]: rcvd [IPCP ConfReq id=0x0 <addr 192.109.42.vvv>] Jun 14 09:41:07 test pppd[19039]: sent [IPCP ConfAck id=0x0 <addr 192.109.42.vvv>] Jun 14 09:41:07 test pppd[19039]: rcvd [IPCP ConfReq id=0x0 <addr 192.109.42.vvv>] Jun 14 09:41:07 test pppd[19039]: sent [IPCP ConfAck id=0x0 <addr 192.109.42.vvv>] Jun 14 09:41:07 test pppd[19039]: rcvd [LCP EchoRep id=0x0 magic=0x20a51d42] Jun 14 09:41:07 test pppd[19039]: rcvd [IPCP ConfReq id=0x0 <addr 192.109.42.vvv>] Jun 14 09:41:07 test pppd[19039]: sent [IPCP ConfAck id=0x0 <addr 192.109.42.vvv>] Jun 14 09:41:07 test pppd[19039]: rcvd [PAP AuthAck id=0x3 ""] Jun 14 09:41:07 test pppoe[19040]: Session 2682 terminated -- received PADT from peer Jun 14 09:41:07 test pppoe[19040]: Sent PADT Jun 14 09:41:07 test pppd[19039]: Modem hangup Jun 14 09:41:07 test pppd[19039]: Connection terminated. Jun 14 09:41:07 test pppd[19039]: Script /usr/sbin/pppoe -I dsl1 -m 1452 finished (pid 19040), status = 0x0 Jun 14 09:41:10 test pppd[19039]: Terminating on signal 15 Jun 14 09:41:10 test pppd[19039]: Exit. Why do I get PADT? The logs from l2tpns: 2005-06-14 09:41:07 01/00 New tunnel from 212.42.xxx.yyy:1701 ID 1 2005-06-14 09:41:07 01/00 Unknown AVP vendor 9 2005-06-14 09:41:07 01/00 Unknown AVP vendor 9 2005-06-14 09:41:07 00/01 Route add 192.168.224.0/255.255.255.224 2005-06-14 09:41:07 00/01 Route add 192.109.21.mmm/255.255.255.255 2005-06-14 09:41:07 01/01 Login by l2tptest@realm at 192.109.21.mmm from 212.42.xxx.yyy (TUNNELNAME) 2005-06-14 09:41:07 01/01 Shutting down session 1: PAP authentication failed. 2005-06-14 09:41:07 00/01 Route del 192.168.224.0/255.255.255.224 2005-06-14 09:41:07 00/01 Route del 192.109.21.mmm/255.255.255.255 The radius logs (PAP authentication doesn't fail!): Tue Jun 14 09:41:08 2005 : Auth: Login OK: [l2tptest@realm/password] (from client l2tpserver port 1) l2tpns with more debug options (another ppp-session and without hexadecimal lines): 2005-06-14 09:53:12 00/00 UDP Data (133 bytes): 2005-06-14 09:53:12 00/00 Control message (121 bytes): (unacked 0) l-ns 0 l-nr 0 r-ns 0 r-nr 0 2005-06-14 09:53:12 01/00 Assigning tunnel ID 1 2005-06-14 09:53:12 01/00 New tunnel from 212.42.xxx.yyy:1701 ID 1 2005-06-14 09:53:12 01/00 AVP 0 (Message Type) len 2 2005-06-14 09:53:12 01/00 Message type = 0 (SCCRQ) 2005-06-14 09:53:12 01/00 AVP 2 (Protocol Version) len 2 2005-06-14 09:53:12 01/00 Protocol version = 256 2005-06-14 09:53:12 01/00 AVP 3 (Framing Capabilities) len 4 2005-06-14 09:53:12 01/00 AVP 4 (Bearer Capabilities) len 4 2005-06-14 09:53:12 01/00 AVP 6 (Firmware Revision) len 2 2005-06-14 09:53:12 01/00 AVP 7 (Host Name) len 8 2005-06-14 09:53:12 01/00 Tunnel hostname = "TUNNELNAME" 2005-06-14 09:53:12 01/00 AVP 8 (Vendor Name) len 19 2005-06-14 09:53:12 01/00 Vendor name = "Cisco Systems, Inc." 2005-06-14 09:53:12 01/00 AVP 9 (Assigned Tunnel ID) len 2 2005-06-14 09:53:12 01/00 Remote tunnel id = 42462 2005-06-14 09:53:12 01/00 AVP 10 (Receive Window Size) len 2 2005-06-14 09:53:12 01/00 rx window = 20050 2005-06-14 09:53:12 01/00 AVP 11 (Challenge) len 16 2005-06-14 09:53:12 01/00 LAC requested CHAP authentication for tunnel 2005-06-14 09:53:12 00/00 Building challenge response for CHAP request 2005-06-14 09:53:12 00/00 Send Tunnel Data (82 bytes): 2005-06-14 09:53:12 00/00 Cluster send data: 306 bytes 2005-06-14 09:53:12 00/00 UDP Data (20 bytes): 2005-06-14 09:53:12 01/00 Control message (8 bytes): (unacked 1) l-ns 1 l-nr 1 r-ns 1 r-nr 1 2005-06-14 09:53:12 01/00 AVP 0 (Message Type) len 2 2005-06-14 09:53:12 01/00 Message type = 0 (SCCCN) 2005-06-14 09:53:12 00/00 Send Tunnel Data (12 bytes): 2005-06-14 09:53:12 00/00 UDP Data (66 bytes): 2005-06-14 09:53:12 01/00 Control message (54 bytes): (unacked 0) l-ns 1 l-nr 2 r-ns 2 r-nr 1 2005-06-14 09:53:12 01/00 AVP 0 (Message Type) len 2 2005-06-14 09:53:12 01/00 Message type = 0 (ICRQ) 2005-06-14 09:53:12 01/00 AVP 14 (Assigned Session ID) len 2 2005-06-14 09:53:12 01/00 assigned session = 49037 2005-06-14 09:53:12 01/00 AVP 15 (Call Serial Number) len 4 2005-06-14 09:53:12 01/00 call serial number = 507200050 2005-06-14 09:53:12 01/00 AVP 18 (Bearer Type) len 4 2005-06-14 09:53:12 01/00 bearer type = 1 2005-06-14 09:53:12 01/00 Unknown AVP vendor 9 2005-06-14 09:53:12 01/00 Unknown AVP vendor 9 2005-06-14 09:53:12 00/01 Allocated radius 1 2005-06-14 09:53:12 01/01 New session (42462/49037) 2005-06-14 09:53:12 00/00 Send Tunnel Data (28 bytes): 2005-06-14 09:53:12 00/00 UDP Data (147 bytes): 2005-06-14 09:53:12 01/01 Control message (135 bytes): (unacked 1) l-ns 2 l-nr 3 r-ns 3 r-nr 2 2005-06-14 09:53:12 01/01 AVP 0 (Message Type) len 2 2005-06-14 09:53:12 01/01 Message type = 0 (ICCN) 2005-06-14 09:53:12 01/01 AVP 24 (Tx Connect Speed) len 4 2005-06-14 09:53:12 01/01 TX connect speed <1184000> 2005-06-14 09:53:12 01/01 AVP 38 (Rx Connect Speed) len 4 2005-06-14 09:53:12 01/01 RX connect speed <160000> 2005-06-14 09:53:12 01/01 AVP 19 (Framing Type) len 4 2005-06-14 09:53:12 01/01 framing type = 1 2005-06-14 09:53:12 01/01 AVP 27 (Last Sent LCP CONFREQ) len 14 2005-06-14 09:53:12 01/01 AVP 28 (Last Received LCP CONFREQ) len 12 2005-06-14 09:53:12 01/01 AVP 32 (Proxy Authen ID) len 2 2005-06-14 09:53:12 01/01 Proxy Auth ID (3) 2005-06-14 09:53:12 01/01 AVP 30 (Proxy Authen Name) len 24 2005-06-14 09:53:12 01/01 Proxy Auth Name (l2tptest@realm) 2005-06-14 09:53:12 01/01 AVP 33 (Proxy Authen Response) len 7 2005-06-14 09:53:12 01/01 Proxy Auth Response 2005-06-14 09:53:12 01/01 AVP 29 (Proxy Authen Type) len 2 2005-06-14 09:53:12 01/01 Proxy Auth Type 3 (PPP PAP) 2005-06-14 09:53:12 01/01 Magic 4DDA544B Flags 0 2005-06-14 09:53:12 00/00 Send Tunnel Data (12 bytes): 2005-06-14 09:53:12 01/01 Sending LCP ConfigReq for PAP 2005-06-14 09:53:12 00/00 PPPLCP (18 bytes): 2005-06-14 09:53:12 00/00 Send Tunnel Data (28 bytes): 2005-06-14 09:53:12 00/00 UDP Data (24 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (16 bytes): 2005-06-14 09:53:12 00/00 LCP (12 bytes): 2005-06-14 09:53:12 01/01 LCP: ConfigReq (12 bytes)... 2005-06-14 09:53:12 00/00 PPP LCP Packet (12 bytes): 2005-06-14 09:53:12 00/00 PPP LCP Packet type 1 (ConfigReq len 12) 2005-06-14 09:53:12 00/00 Length: 12 2005-06-14 09:53:12 00/00 Magic-Number ae5d427 2005-06-14 09:53:12 01/01 Sending ConfigAck 2005-06-14 09:53:12 00/00 Send Tunnel Data (22 bytes): 2005-06-14 09:53:12 01/01 Sending LCP ConfigReq for PAP 2005-06-14 09:53:12 00/00 PPPLCP (18 bytes): 2005-06-14 09:53:12 00/00 Send Tunnel Data (28 bytes): 2005-06-14 09:53:12 00/00 UDP Data (30 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (22 bytes): 2005-06-14 09:53:12 00/00 LCP (18 bytes): 2005-06-14 09:53:12 01/01 LCP: ConfigAck (18 bytes)... 2005-06-14 09:53:12 00/00 PPP LCP Packet (18 bytes): 2005-06-14 09:53:12 00/00 PPP LCP Packet type 2 (ConfigAck len 18) 2005-06-14 09:53:12 00/00 Length: 18 2005-06-14 09:53:12 00/00 Maximum-Receive-Unit 1452 2005-06-14 09:53:12 00/00 Authentication-Protocol 0xc023 (PAP) 2005-06-14 09:53:12 00/00 Magic-Number 4dda544b 2005-06-14 09:53:12 00/00 UDP Data (20 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (12 bytes): 2005-06-14 09:53:12 00/00 LCP (8 bytes): 2005-06-14 09:53:12 01/01 LCP: Received EchoReq. Sending EchoReply 2005-06-14 09:53:12 00/00 Send Tunnel Data (18 bytes): 2005-06-14 09:53:12 00/00 UDP Data (49 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (41 bytes): 2005-06-14 09:53:12 00/00 PAP (37 bytes): 2005-06-14 09:53:12 01/01 PAP login l2tptest@realm/password 2005-06-14 09:53:12 01/01 Sending login for l2tptest@realm/password to radius 2005-06-14 09:53:12 01/01 Send RADIUS id 0 sock 1 state RADIUSAUTH try 1 2005-06-14 09:53:12 00/00 RADIUS Send (76 bytes): 2005-06-14 09:53:12 00/00 UDP Data (24 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (16 bytes): 2005-06-14 09:53:12 00/00 LCP (12 bytes): 2005-06-14 09:53:12 01/01 LCP: ConfigReq (12 bytes)... 2005-06-14 09:53:12 00/00 PPP LCP Packet (12 bytes): 2005-06-14 09:53:12 00/00 PPP LCP Packet type 1 (ConfigReq len 12) 2005-06-14 09:53:12 00/00 Length: 12 2005-06-14 09:53:12 00/00 Magic-Number 750faed 2005-06-14 09:53:12 01/01 Sending ConfigAck 2005-06-14 09:53:12 00/00 Send Tunnel Data (22 bytes): 2005-06-14 09:53:12 00/00 RADIUS Response (93 bytes): 2005-06-14 09:53:12 01/01 Received RADIUSAUTH, radius 1 response for session 1 (Access-Accept, id 0) 2005-06-14 09:53:12 00/00 Send Tunnel Data (15 bytes): 2005-06-14 09:53:12 01/01 PAP User l2tptest@realm authentication allowed. 2005-06-14 09:53:12 01/01 Radius reply contains IP address 192.109.21.mmm 2005-06-14 09:53:12 01/01 Radius reply contains route for 192.168.224.0/255.255.255.224 2005-06-14 09:53:12 01/01 Radius reply contains route for 2001:xxxx:xxxx::/48 2005-06-14 09:53:12 01/01 Sending dns1 = 192.109.42.aaa 2005-06-14 09:53:12 01/01 Sending dns2 = 192.109.42.bbb 2005-06-14 09:53:12 01/01 Doing session setup for session 2005-06-14 09:53:12 00/01 Route add 192.168.224.0/255.255.255.224 2005-06-14 09:53:12 00/00 Registered BGP route 192.168.224.0/27 2005-06-14 09:53:12 01/01 Caching ip address 192.168.224.0 [...] 2005-06-14 09:53:12 00/01 Route add 192.109.21.224/255.255.255.255 2005-06-14 09:53:12 00/00 Registered BGP route 192.109.21.mmm/32 2005-06-14 09:53:12 01/01 Caching ip address 192.109.21.mmm 2005-06-14 09:53:12 01/01 Sending initial IPCP to client 2005-06-14 09:53:12 00/00 Send Tunnel Data (20 bytes): 2005-06-14 09:53:12 01/01 Login by l2tptest@realm at 192.109.21.mmm from 212.42.xxx.yyy (TUNNELNAME) 2005-06-14 09:53:12 01/01 No ACK for initial IPCP ConfigReq... resending 2005-06-14 09:53:12 01/01 Allocated radius 2 2005-06-14 09:53:12 00/00 Send Tunnel Data (20 bytes): 2005-06-14 09:53:12 00/00 UDP Data (30 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (22 bytes): 2005-06-14 09:53:12 00/00 LCP (18 bytes): 2005-06-14 09:53:12 01/01 LCP: ConfigAck (18 bytes)... 2005-06-14 09:53:12 00/00 PPP LCP Packet (18 bytes): 2005-06-14 09:53:12 00/00 PPP LCP Packet type 2 (ConfigAck len 18) 2005-06-14 09:53:12 00/00 Length: 18 2005-06-14 09:53:12 00/00 Maximum-Receive-Unit 1452 2005-06-14 09:53:12 00/00 Authentication-Protocol 0xc023 (PAP) 2005-06-14 09:53:12 00/00 Magic-Number 4dda544b 2005-06-14 09:53:12 01/01 No ACK for initial IPCP ConfigReq... resending 2005-06-14 09:53:12 00/00 Send Tunnel Data (20 bytes): 2005-06-14 09:53:12 00/00 UDP Data (20 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (12 bytes): 2005-06-14 09:53:12 00/00 LCP (8 bytes): 2005-06-14 09:53:12 01/01 LCP: Received EchoReq. Sending EchoReply 2005-06-14 09:53:12 00/00 Send Tunnel Data (18 bytes): 2005-06-14 09:53:12 01/01 No ACK for initial IPCP ConfigReq... resending 2005-06-14 09:53:12 00/00 Send Tunnel Data (20 bytes): 2005-06-14 09:53:12 00/00 UDP Data (49 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (41 bytes): 2005-06-14 09:53:12 00/00 PAP (37 bytes): 2005-06-14 09:53:12 01/01 PAP login l2tptest@realm/password 2005-06-14 09:53:12 01/01 Already an IP allocated: 192.109.21.mmm (-1) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 2005-06-14 09:53:12 01/01 Fallback response to PAP (ACK) 2005-06-14 09:53:12 00/00 Send Tunnel Data (15 bytes): 2005-06-14 09:53:12 01/01 Shutting down session 1: PAP authentication failed. 2005-06-14 09:53:12 01/01 Send RADIUS id 0 sock 2 state RADIUSSTOP try 1 2005-06-14 09:53:12 00/00 RADIUS Send (130 bytes): 2005-06-14 09:53:12 00/01 Route del 192.168.224.0/255.255.255.224 2005-06-14 09:53:12 00/00 Removed BGP route 192.168.224.0/27 2005-06-14 09:53:12 00/00 Un-caching ip address 192.168.224.0 [...] 2005-06-14 09:53:12 00/01 Route del 192.109.21.mmm/255.255.255.255 2005-06-14 09:53:12 00/00 Removed BGP route 192.109.21.mmm/32 2005-06-14 09:53:12 00/00 Un-caching ip address 192.109.21.mmm 2005-06-14 09:53:12 00/00 Send Tunnel Data (36 bytes): 2005-06-14 09:53:12 00/00 UDP Data (27 bytes): 2005-06-14 09:53:12 00/00 Receive Tunnel Data (19 bytes): 2005-06-14 09:53:12 00/00 CCP (15 bytes): 2005-06-14 09:53:12 01/01 Sending CCP ConfigReq for no compression 2005-06-14 09:53:12 00/00 PPPCCP (4 bytes): 2005-06-14 09:53:12 00/00 Send Tunnel Data (14 bytes): 2005-06-14 09:53:12 00/00 Send Tunnel Data (25 bytes): 2005-06-14 09:53:12 00/00 UDP Data (12 bytes): 2005-06-14 09:53:12 01/00 Control message (0 bytes): (unacked 1) l-ns 3 l-nr 4 r-ns 4 r-nr 3 2005-06-14 09:53:12 01/00 Got a ZLB ack 2005-06-14 09:53:12 00/00 RADIUS Response (20 bytes): 2005-06-14 09:53:12 01/01 Received RADIUSSTOP, radius 2 response for session 1 (Accounting-Response, id 0) 2005-06-14 09:53:12 01/01 RADIUS accounting ack recv in state RADIUSSTOP [...] Maybe the problem ist that the client is sending the login several times and l2tpns reports "Already an IP allocated" and disconnects the client, but why does the client send the login several times? Here is my startup-config, if this helps: set debug 2 set log_file "/var/log/l2tpns" set pid_file "/var/run/l2tpns.pid" set l2tp_secret "********" set primary_dns 192.109.42.aaa set secondary_dns 192.109.42.bbb set save_state yes set primary_radius 192.109.42.xxx set secondary_radius 192.109.42.yyy set primary_radius_port 1812 set secondary_radius_port 1812 set radius_accounting yes set radius_secret "********" set allow_duplicate_users yes set bind_address 192.109.42.zzz set peer_address 192.109.42.vvv set throttle_speed 0 set accounting_dir "/var/run/l2tpns/acct" set setuid 0 set dump_speed no load plugin "sessionctl" load plugin "throttlectl" load plugin "autothrottle" load plugin "snoopctl" load plugin "autosnoop" load plugin "garden" When I downgrade to 2.0.14-1 the connection can be established without any problems. Does anyone have the same problems or an idea how to solve this problem? Chris -- Christian Seitz <ch...@in...> http://www.in-berlin.de/ Individual Network Berlin e.V. PGP Fingerprint: A9 17 03 0D 36 AB 07 4E D0 1E C3 8E 3F B0 66 9A |