Sasha Shipka writes: > I'm trying to use wireless pppoe connection to my ISP from linux. > I'm using rp-pppoe and pppd 2.4.3. Kernel is 2.4.23 with mppe patch > from pptp site.
I'd recommend going back to the supplier of that patch and asking there. The symptoms you're reporting are consistent with a broken decryption module. > ul 11 14:56:02 duat pppd[7741]: rcvd [proto=0xcba5] 69 73 df e1 5f ed > 4c cb a0 3f ae 62 eb e6 0b 95 42 3b ef 7f f6 8d ea b3 18 9d c1 6d f9 > 35 2c 70 ... > Jul 11 14:56:02 duat pppd[7741]: Unsupported protocol 0xcba5 received That's what you'd expect if encryption/compression or decryption/ decompression falls apart. > Pattern is id, which is increased every time. That's normal and isn't really a symptom of anything. LCP uses those ID numbers when it relates request/reply pairs. > Things I tried: > * to reduce or increase mtu on ppp interface. > * to add following line to iptables: > iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS > --clamp-mss-to-pmtu > * to disable mru decrease in ccp.c code (I saw that in archives of this list) > * to add nomppe-128 (or nomppe-40) to pppd options If you're able to run MPPE in historyless mode, that might be something worth trying. But you still should report this as a bug in the 'mppe' module you're using. -- James Carlson <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe linux-ppp" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
