On Tue, Feb 1, 2011 at 10:56 AM, Greg <[email protected]> wrote: > I am trying to setup a Fedora 14 server as a VPN server configured > mainly by webmin ant putty (both for remote access ease and my sanity) > I think I have all the parts setup but I am getting errors when trying > to connect: > > Feb 1 10:35:14 gpendleton-hatdt pptpd[30178]: CTRL: Client > 172.16.1.69 control connection started > Feb 1 10:35:14 gpendleton-hatdt pptpd[30178]: CTRL: Starting call > (launching pppd, opening GRE) > Feb 1 10:35:14 gpendleton-hatdt pppd[30179]: pppd 2.4.5 started by > root, uid 0 > Feb 1 10:35:14 gpendleton-hatdt pppd[30179]: Using interface ppp0 > Feb 1 10:35:14 gpendleton-hatdt pppd[30179]: Connect: ppp0 <--> /dev/ > pts/0 > Feb 1 10:35:14 gpendleton-hatdt pptpd[30178]: GRE: > read(fd=7,buffer=8056600,len=8260) from network failed: status = -1 > error = Protocol not available > Feb 1 10:35:14 gpendleton-hatdt pptpd[30178]: CTRL: GRE read or PTY > write failed (gre,pty)=(7,6) > Feb 1 10:35:14 gpendleton-hatdt pppd[30179]: Modem hangup > Feb 1 10:35:14 gpendleton-hatdt pppd[30179]: Connection terminated. > Feb 1 10:35:14 gpendleton-hatdt avahi-daemon[1055]: Withdrawing > workstation service for ppp0. > Feb 1 10:35:14 gpendleton-hatdt pppd[30179]: Exit. > Feb 1 10:35:14 gpendleton-hatdt pptpd[30178]: CTRL: Client > 172.16.1.69 control connection finished > > unfortunately I am not fluent in Linux yet, can anyone translate and > advise? >
I can't help with practical experience, but have you already checked out this FAQ? It looks like the GRE error is your culprit: http://poptop.sourceforge.net/dox/gre-protocol-unavailable.phtml Hopefully #1, #2, or #3 will help. It's likely you have #4 already (iptables. ipchains hasn't been a default in ages! At least it's a good starting point, and maybe someone else on the list can help if that doesn't get you going. [[ If you haven't already, you might also want to check out http://poptop.sourceforge.net/dox/protocol-security.phtml If you've got the choice of using something better than pptp, I'd suggest it. It's pretty easy for someone sniffing the network to decrypt/spoof (on the order of < 1 second), but that may not matter for your particular use! ]] hth! will -- You received this message because you are subscribed to the Google Groups "NLUG" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/nlug-talk?hl=en
