From: Kim F. <kaf...@ya...> - 2020-04-16 02:02:23
|
I am running OpenSuse Leap 15.1. My firewall is turned off. I am trying to connect to my office VPN server. Connecting with Windows works but I am struggling with Suse. Telnet to the server works. Tcpdump shows multiple GRE Conf-Requests going out and multiple Conf-Acks coming back but my computer never proceeds to authentication. Any advice would be appreciated. kim@linux-nogg:~> sudo pppd call OESC-VPN debug dump logfd 2 nodetach [sudo] password for root: pppd options in effect: debug # (from command line) nodetach # (from command line) idle 600 # (from /etc/ppp/options) logfd 2 # (from command line) dump # (from command line) active-filter xxx # [don't know how to print value] # (from /etc/ppp/filters) noauth # (from /etc/ppp/options.pptp) refuse-pap # (from /etc/ppp/peers/OESC-VPN) refuse-chap # (from /etc/ppp/peers/OESC-VPN) refuse-mschap # (from /etc/ppp/peers/OESC-VPN) refuse-eap # (from /etc/ppp/peers/OESC-VPN) name (hidden) # (from /etc/ppp/peers/OESC-VPN) remotename OESC-VPN # (from /etc/ppp/peers/OESC-VPN) # (from /etc/ppp/options.pptp) pty pptp 204.87.122.177 --nolaunchpppd # (from /etc/ppp/peers/OESC-VPN) crtscts # (from /etc/ppp/options) # (from /etc/ppp/options) asyncmap 0 # (from /etc/ppp/options) mru 1000 # (from /etc/ppp/options.pptp) mtu 1000 # (from /etc/ppp/options.pptp) lcp-echo-failure 10 # (from /etc/ppp/options.pptp) lcp-echo-interval 10 # (from /etc/ppp/options.pptp) lcp-restart 2 # (from /etc/ppp/options) lcp-max-configure 60 # (from /etc/ppp/options) ipparam OESC-VPN # (from /etc/ppp/peers/OESC-VPN) noipdefault # (from /etc/ppp/options) nobsdcomp # (from /etc/ppp/options.pptp) nodeflate # (from /etc/ppp/options.pptp) require-mppe # (from /etc/ppp/options.pptp) nomppe-stateful # (from /etc/ppp/peers/OESC-VPN) noipx # (from /etc/ppp/options) using channel 27 Using interface ppp0 Connect: ppp0 <--> /dev/pts/5 Error: either "to" is duplicate, or "uid" is a garbage. sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] sent [LCP ConfReq id=0x1 <mru 1000> <asyncmap 0x0> <magic 0x56b5083e> <pcomp> <accomp>] ^CTerminating on signal 2 Modem hangup Connection terminated. Script pptp 204.87.122.177 --nolaunchpppd finished (pid 5817), status = 0x0 20:44:14.161592 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [S], seq 2821635234, win 29200, options [mss 1460,sackOK,TS val 3290319591 ecr 0, nop,wscale 7], length 0 20:44:14.161760 IP 192.168.0.102.50289 > resolver2.opendns.com.domain: 57715+ PTR? 177.122.87.204.in-addr.arpa. (45) 20:44:14.182814 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [S.], seq 2387090724, ack 2821635235, win 32120, options [mss 1350], length 0 20:44:14.182846 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [.], ack 1, win 29200, length 0 20:44:14.183225 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [P.], seq 1:157, ack 1, win 29200, length 156: pptp CTRL_MSGTYPE=SCCRQ PROTO_VER( 1.0) FRAME_CAP(AS) BEARER_CAP(DA) MAX_CHAN(65535) FIRM_REV(1) HOSTNAME(local) VENDOR(cananian) 20:44:14.206725 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [.], ack 157, win 31964, length 0 20:44:14.207721 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [P.], seq 1:157, ack 157, win 32120, length 156: pptp CTRL_MSGTYPE=SCCRP PROTO_VE R(1.0) RESULT_CODE(1) ERR_CODE(0) FRAME_CAP(S) BEARER_CAP(DA) MAX_CHAN(0) FIRM_REV(0) HOSTNAME() VENDOR(Microsoft) 20:44:14.446828 IP 146.20.147.246.imaps > 192.168.0.102.52966: Flags [P.], seq 3947379877:3947379923, ack 881343165, win 254, length 46 20:44:14.446883 IP 192.168.0.102.52966 > 146.20.147.246.imaps: Flags [.], ack 46, win 1452, length 0 20:44:14.447240 IP 192.168.0.102.34099 > resolver2.opendns.com.domain: 59029+ PTR? 246.147.20.146.in-addr.arpa. (45) 20:44:14.447640 IP 192.168.0.102.52966 > 146.20.147.246.imaps: Flags [P.], seq 1:36, ack 46, win 1452, length 35 20:44:14.521000 IP resolver2.opendns.com.domain > 192.168.0.102.34099: 59029 NXDomain 0/1/0 (108) 20:44:14.532770 IP 146.20.147.246.imaps > 192.168.0.102.52966: Flags [P.], seq 46:99, ack 36, win 254, length 53 20:44:14.532969 IP 192.168.0.102.52966 > 146.20.147.246.imaps: Flags [P.], seq 36:75, ack 99, win 1452, length 39 20:44:14.585929 IP 146.20.147.246.imaps > 192.168.0.102.52966: Flags [P.], seq 99:173, ack 75, win 254, length 74 20:44:14.586292 IP 192.168.0.102.52966 > 146.20.147.246.imaps: Flags [P.], seq 75:130, ack 173, win 1452, length 55 20:44:14.645456 IP 146.20.147.246.imaps > 192.168.0.102.52966: Flags [P.], seq 173:342, ack 130, win 254, length 169 20:44:14.645720 IP 192.168.0.102.52966 > 146.20.147.246.imaps: Flags [P.], seq 130:191, ack 342, win 1452, length 61 20:44:14.706145 IP 146.20.147.246.imaps > 192.168.0.102.52966: Flags [P.], seq 342:459, ack 191, win 254, length 117 20:44:14.711939 IP 192.168.0.78.58282 > 239.255.255.250.ssdp: UDP, length 125 20:44:14.713956 IP 192.168.0.102.52966 > 146.20.147.246.imaps: Flags [P.], seq 191:230, ack 459, win 1452, length 39 20:44:14.775217 IP 146.20.147.246.imaps > 192.168.0.102.52966: Flags [P.], seq 459:498, ack 230, win 254, length 39 20:44:14.815956 IP 192.168.0.102.52966 > 146.20.147.246.imaps: Flags [.], ack 498, win 1452, length 0 20:44:15.183401 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [P.], seq 157:325, ack 157, win 30016, length 168: pptp CTRL_MSGTYPE=OCRQ CALL_ID (0) CALL_SER_NUM(0) MIN_BPS(2400) MAX_BPS(10000000) BEARER_TYPE(Any) FRAME_TYPE(E) RECV_WIN(3) PROC_DELAY(0) PHONE_NO_LEN(0) PHONE_NO() SUB_ADDR() 20:44:15.203765 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [.], ack 325, win 31952, length 0 20:44:15.204744 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [P.], seq 157:189, ack 325, win 32120, length 32: pptp CTRL_MSGTYPE=OCRP CALL_ID( 23848) PEER_CALL_ID(0) RESULT_CODE(1) ERR_CODE(0) CAUSE_CODE(0) CONN_SPEED(13277755) RECV_WIN(16384) PROC_DELAY(0) PHY_CHAN_ID(0) 20:44:15.204761 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [.], ack 189, win 30016, length 0 20:44:15.204910 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 1, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:15.230077 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 1, length 40: LCP, Conf-Ack (0x02), id 1, length 26 20:44:15.230195 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 0, ack 1, length 73: LCP, Conf-Request (0x01), id 0, length 55 20:44:16.412596 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 2, length 69: LCP, Conf-Request (0x01), id 1, length 55 20:44:17.141003 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 2, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:17.160272 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 3, ack 2, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:19.141179 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 3, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:19.161672 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 4, ack 3, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:19.428894 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 5, length 69: LCP, Conf-Request (0x01), id 2, length 55 20:44:21.143355 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 4, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:21.163788 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 6, ack 4, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:23.144183 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 5, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:23.163448 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 7, ack 5, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:23.388847 IP 192.168.0.102.36943 > resolver2.opendns.com.domain: 46745+ A? safebrowsing.brave.com. (40) 20:44:23.405711 IP resolver2.opendns.com.domain > 192.168.0.102.36943: 46745 2/0/0 CNAME p.ssl.fastly.net., A 151.101.49.7 (86) 20:44:23.459535 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 8, length 69: LCP, Conf-Request (0x01), id 3, length 55 20:44:25.144437 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 6, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:25.163163 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 9, ack 6, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:25.461225 ARP, Request who-has 192.168.0.139 (Broadcast) tell 192.168.0.86, length 46 20:44:25.461568 IP 192.168.0.102.41594 > resolver2.opendns.com.domain: 4716+ PTR? 139.0.168.192.in-addr.arpa. (44) 20:44:25.477524 IP resolver2.opendns.com.domain > 192.168.0.102.41594: 4716 NXDomain* 0/1/0 (103) 20:44:25.477850 IP 192.168.0.102.58615 > resolver2.opendns.com.domain: 26048+ PTR? 86.0.168.192.in-addr.arpa. (43) 20:44:25.499609 IP resolver2.opendns.com.domain > 192.168.0.102.58615: 26048 NXDomain* 0/1/0 (102) 20:44:26.975958 IP 192.168.0.102.60448 > 216.218.159.29.https: Flags [.], ack 1346815657, win 319, options [nop,nop,TS val 3108996143 ecr 2170591728] , length 0 20:44:26.976377 IP 192.168.0.102.50665 > resolver2.opendns.com.domain: 12881+ PTR? 29.159.218.216.in-addr.arpa. (45) 20:44:26.999166 IP resolver2.opendns.com.domain > 192.168.0.102.50665: 12881 NXDomain 1/1/0 CNAME 29.0-27.159.218.216.in-addr.arpa. (124) 20:44:27.037034 IP 216.218.159.29.https > 192.168.0.102.60448: Flags [.], ack 1, win 64, options [nop,nop,TS val 2170603216 ecr 3108950148], length 0 20:44:27.138731 IP 192.168.0.1.26302 > 239.255.255.250.ssdp: UDP, length 256 20:44:27.138837 IP 192.168.0.1.26302 > 239.255.255.250.ssdp: UDP, length 328 20:44:27.138927 IP 192.168.0.1.26302 > 239.255.255.250.ssdp: UDP, length 324 20:44:27.138941 IP 192.168.0.102.40782 > resolver2.opendns.com.domain: 2918+ PTR? 1.0.168.192.in-addr.arpa. (42) 20:44:27.139105 IP 192.168.0.1.26302 > 239.255.255.250.ssdp: UDP, length 304 20:44:27.139451 IP 192.168.0.1.26302 > 239.255.255.250.ssdp: UDP, length 336 20:44:27.139540 IP 192.168.0.1.26302 > 239.255.255.250.ssdp: UDP, length 318 20:44:27.167001 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 10, ack 7, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:27.476246 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 11, length 69: LCP, Conf-Request (0x01), id 4, length 55 20:44:29.148786 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 8, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:29.169834 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 12, ack 8, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:30.092656 IP 192.168.0.78.58379 > 239.255.255.250.ssdp: UDP, length 122 20:44:31.043724 IP 216.218.159.29.https > 192.168.0.102.60448: Flags [P.], seq 1:40, ack 1, win 64, options [nop,nop,TS val 2170604217 ecr 3108950148 ], length 39 20:44:31.044207 IP 192.168.0.102.60448 > 216.218.159.29.https: Flags [F.], seq 1, ack 40, win 319, options [nop,nop,TS val 3109000211 ecr 2170604217] , length 0 20:44:31.044832 IP 216.218.159.29.https > 192.168.0.102.60448: Flags [F.], seq 40, ack 1, win 64, options [nop,nop,TS val 2170604217 ecr 3108950148], length 0 20:44:31.044848 IP 192.168.0.102.60448 > 216.218.159.29.https: Flags [.], ack 41, win 319, options [nop,nop,TS val 3109000212 ecr 2170604217], length 0 20:44:31.100110 IP 216.218.159.29.https > 192.168.0.102.60448: Flags [.], ack 2, win 64, options [nop,nop,TS val 2170604231 ecr 3109000211], length 0 20:44:31.150954 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 9, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:31.170715 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 13, ack 9, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:31.522943 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 14, length 69: LCP, Conf-Request (0x01), id 5, length 55 20:44:32.112025 IP 192.168.0.78.53166 > 239.255.255.250.ssdp: UDP, length 122 20:44:33.153135 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 10, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:33.173557 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 15, ack 10, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:33.382478 IP 192.168.0.78.53242 > 239.255.255.250.ssdp: UDP, length 125 20:44:34.112045 IP 192.168.0.78.51679 > 239.255.255.250.ssdp: UDP, length 122 20:44:35.155196 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 11, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:35.173307 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 16, ack 11, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:35.539511 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 17, length 69: LCP, Conf-Request (0x01), id 6, length 55 20:44:36.050498 ARP, Request who-has 192.168.0.102 tell 192.168.0.1, length 46 20:44:36.050542 ARP, Reply 192.168.0.102 is-at b8:97:5a:90:4a:0b (oui Unknown), length 28 20:44:37.132053 IP 192.168.0.78.41595 > 239.255.255.250.ssdp: UDP, length 125 20:44:37.156130 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 12, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:37.176114 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 18, ack 12, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:37.215957 IP 192.168.0.102.56426 > 151.101.49.7.https: Flags [.], ack 2546731282, win 336, options [nop,nop,TS val 1778917674 ecr 2453209210], length 0 20:44:37.216283 IP 192.168.0.102.33610 > resolver2.opendns.com.domain: 10345+ PTR? 7.49.101.151.in-addr.arpa. (43) 20:44:37.231196 IP 151.101.49.7.https > 192.168.0.102.56426: Flags [.], ack 1, win 63, options [nop,nop,TS val 2453220474 ecr 1778827071], length 0 20:44:37.231469 IP resolver2.opendns.com.domain > 192.168.0.102.33610: 10345 NXDomain 0/1/0 (103) 20:44:39.158354 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 13, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:39.178010 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 19, ack 13, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:39.571156 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 20, length 69: LCP, Conf-Request (0x01), id 7, length 55 20:44:40.814853 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [S], seq 2863409155, win 29200, options [mss 1460,sackOK,TS val 3109009982 ecr 0 ,nop,wscale 7], length 0 20:44:40.821991 IP 192.168.0.78.51839 > 239.255.255.250.ssdp: UDP, length 125 20:44:40.868875 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [S.], seq 1419408411, ack 2863409156, win 28960, options [mss 1460,sackOK,TS val 2170606674 ecr 3109009982,nop,wscale 9], length 0 20:44:40.868965 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [.], ack 1, win 229, options [nop,nop,TS val 3109010037 ecr 2170606674], length 0 20:44:40.869348 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [P.], seq 1:518, ack 1, win 229, options [nop,nop,TS val 3109010037 ecr 21706066 74], length 517 20:44:40.930212 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [.], seq 1:1449, ack 518, win 59, options [nop,nop,TS val 2170606689 ecr 3109010 037], length 1448 20:44:40.930264 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [.], ack 1449, win 251, options [nop,nop,TS val 3109010098 ecr 2170606689], leng th 0 20:44:40.930357 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [P.], seq 1449:3105, ack 518, win 59, options [nop,nop,TS val 2170606689 ecr 310 9010037], length 1656 20:44:40.930367 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [.], ack 3105, win 277, options [nop,nop,TS val 3109010098 ecr 2170606689], leng th 0 20:44:40.930788 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [P.], seq 518:582, ack 3105, win 277, options [nop,nop,TS val 3109010098 ecr 217 0606689], length 64 20:44:40.930903 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [P.], seq 582:674, ack 3105, win 277, options [nop,nop,TS val 3109010099 ecr 217 0606689], length 92 20:44:40.931068 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [P.], seq 674:1259, ack 3105, win 277, options [nop,nop,TS val 3109010099 ecr 21 70606689], length 585 20:44:40.931157 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [P.], seq 1259:1493, ack 3105, win 277, options [nop,nop,TS val 3109010099 ecr 2 170606689], length 234 20:44:40.983810 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [.], ack 1259, win 61, options [nop,nop,TS val 2170606702 ecr 3109010098], lengt h 0 20:44:40.984013 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [P.], seq 3105:3184, ack 1493, win 64, options [nop,nop,TS val 2170606703 ecr 31 09010099], length 79 20:44:40.984034 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [P.], seq 3184:3263, ack 1493, win 64, options [nop,nop,TS val 2170606703 ecr 31 09010099], length 79 20:44:40.984127 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [P.], seq 3263:3335, ack 1493, win 64, options [nop,nop,TS val 2170606703 ecr 31 09010099], length 72 20:44:40.984146 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [.], ack 3263, win 277, options [nop,nop,TS val 3109010152 ecr 2170606703], leng th 0 20:44:40.984251 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [P.], seq 1493:1524, ack 3335, win 277, options [nop,nop,TS val 3109010152 ecr 2 170606703], length 31 20:44:40.991897 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [P.], seq 3335:3770, ack 1493, win 64, options [nop,nop,TS val 2170606704 ecr 31 09010099], length 435 20:44:40.991920 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [P.], seq 3770:3828, ack 1493, win 64, options [nop,nop,TS val 2170606704 ecr 31 09010099], length 58 20:44:40.992000 IP 192.168.0.102.60452 > 216.218.159.29.https: Flags [.], ack 3828, win 300, options [nop,nop,TS val 3109010160 ecr 2170606704], leng th 0 20:44:41.087862 IP 216.218.159.29.https > 192.168.0.102.60452: Flags [.], ack 1524, win 64, options [nop,nop,TS val 2170606729 ecr 3109010152], lengt h 0 20:44:41.160528 IP 192.168.0.102 > 204.87.122.177: GREv1, call 23848, seq 14, length 40: LCP, Conf-Request (0x01), id 1, length 26 20:44:41.178770 IP 204.87.122.177 > 192.168.0.102: GREv1, call 0, seq 21, ack 14, length 44: LCP, Conf-Ack (0x02), id 1, length 26 20:44:41.311951 IP 192.168.0.102.40698 > e2.ycpi.vip.daa.yahoo.com.https: Flags [.], ack 447314494, win 2519, options [nop,nop,TS val 3682034731 ecr 575196459], length 0 20:44:41.327945 IP e2.ycpi.vip.daa.yahoo.com.https > 192.168.0.102.40698: Flags [.], ack 1, win 716, options [nop,nop,TS val 575241516 ecr 3681898114 ], length 0 20:44:42.825270 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [P.], seq 325:341, ack 189, win 30016, length 16: pptp CTRL_MSGTYPE=CCRQ CALL_ID( 0) 20:44:42.825334 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [F.], seq 341, ack 189, win 30016, length 0 20:44:42.844668 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [.], ack 341, win 32104, length 0 20:44:42.844803 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [.], ack 342, win 32120, length 0 20:44:42.845593 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [P.], seq 189:337, ack 342, win 32120, length 148: pptp CTRL_MSGTYPE=CDN CALL_ID( 0) RESULT_CODE(0) ERR_CODE(0) CAUSE_CODE(0) CALL_STATS() 20:44:42.845620 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [R], seq 2821635576, win 0, length 0 20:44:42.845624 IP 204.87.122.177.pptp > 192.168.0.102.48222: Flags [F.], seq 337, ack 342, win 32120, length 0 20:44:42.845629 IP 192.168.0.102.48222 > 204.87.122.177.pptp: Flags [R], seq 2821635576, win 0, length 0 ^C 141 packets captured 147 packets received by filter 6 packets dropped by kernel |