OK, this time I am in trouble with pppd.

I am starting a pppd session to wait for dial-on-demand.  My option files
comprise:
modem
crtscts
asyncmap 0
mtu 1500
mru 1500
lock
139.130.141.29:165.12.128.1
ipcp-accept-local
ipcp-accept-remote
name xxxxxx
demand
nodefaultroute
idle 2700
holdoff 10
debug
kdebug 7

The instructions are to dial direct thru Telstra Dialconnect and that both
the local and the remote IPs will be allocated.

This is what I get from the session, both when the pppd daemon is started
and when an attempt is made to telnet to the 165.12.128.1 notified
IP.  Notice how everything goes well until just after the CHAP session
when it offers the address 144.130.37.226 and we ack the offer, but then 8
lines further down we are told that the peer is not authorised to use the
remote address, the one it has just offered as the remote.  From that
point down the wheels fall off.

Something strange is that the 165.12.x.y address belongs to DEETYA, which
is OK, but the 144.130.37.226 address that is being offered dies somewhere
in ALTER.NET.

What the fscking hell is going on, I've wasted all day on this one and
what really pisses me off is that a bloody NT box and a BSD box both
connect to this same point OK (8-(.

Aug 30 23:27:11 atelal pppd[3698]: pppd 2.3.11 started by root, uid 0
Aug 30 23:27:11 atelal kernel: ppp_ioctl: set dbg flags to 70000 
Aug 30 23:27:11 atelal pppd[3698]: Using interface ppp1
Aug 30 23:27:11 atelal kernel: ppp_tty_ioctl: set xmit asyncmap 0 
Aug 30 23:27:11 atelal kernel: ppp_ioctl: set flags to 70000 
Aug 30 23:27:11 atelal kernel: ppp_ioctl: set mru to 5dc 
Aug 30 23:27:11 atelal kernel: ppp_tty_ioctl: set rcv asyncmap 0 
Aug 30 23:27:11 atelal pppd[3698]: local  IP address 139.130.141.29
Aug 30 23:27:11 atelal pppd[3698]: remote IP address 165.12.128.1

-->at this point the pppd is waiting so we start the telnet

Aug 30 23:27:49 atelal kernel: Packet log: hout ACCEPT ppp1 PROTO=6 
139.130.141.29:1069 165.12.128.1:23 L=60 S=0x00 I=1857 F=0x0000 T=64 SYN (#11) 
Aug 30 23:27:49 atelal pppd[3698]: Starting link
Aug 30 23:27:51 atelal chat[3701]: timeout set to 3 seconds
Aug 30 23:27:51 atelal chat[3701]: abort on (BUSY)
Aug 30 23:27:51 atelal chat[3701]: abort on (NO ANSWER)
Aug 30 23:27:51 atelal chat[3701]: abort on (NO DIALTONE)
Aug 30 23:27:51 atelal chat[3701]: abort on (NO CARRIER)
Aug 30 23:27:51 atelal chat[3701]: timeout set to 30 seconds
Aug 30 23:27:51 atelal chat[3701]: send (ATDT0198304005^M)
Aug 30 23:27:51 atelal chat[3701]: expect (CONNECT)
Aug 30 23:27:52 atelal kernel: Packet log: hout ACCEPT ppp1 PROTO=6 
139.130.141.29:1069 165.12.128.1:23 L=60 S=0x00 I=1863 F=0x0000 T=64 SYN (#11) 
Aug 30 23:27:58 atelal kernel: Packet log: hout ACCEPT ppp1 PROTO=6 
139.130.141.29:1069 165.12.128.1:23 L=60 S=0x00 I=1865 F=0x0000 T=64 SYN (#11) 
Aug 30 23:28:10 atelal kernel: Packet log: hout ACCEPT ppp1 PROTO=6 
139.130.141.29:1069 165.12.128.1:23 L=60 S=0x00 I=1867 F=0x0000 T=64 SYN (#11) 
Aug 30 23:28:17 atelal chat[3701]: ATDT0198304005^M^M
Aug 30 23:28:17 atelal chat[3701]: CONNECT
Aug 30 23:28:17 atelal chat[3701]:  -- got it 
Aug 30 23:28:17 atelal chat[3701]: send (^M)
Aug 30 23:28:17 atelal pppd[3698]: Serial connection established.
Aug 30 23:28:17 atelal kernel: ppp_ioctl: get unit: 1 
Aug 30 23:28:17 atelal kernel: ppp_ioctl: set flags to 70000 
Aug 30 23:28:17 atelal pppd[3698]: Connect: ppp1 <--> /dev/ttyS1
Aug 30 23:28:17 atelal kernel: ppp_tty_ioctl: set xasyncmap 
Aug 30 23:28:17 atelal kernel: ppp_tty_ioctl: set xmit asyncmap ffffffff 
Aug 30 23:28:17 atelal kernel: ppp_ioctl: set flags to 70000 
Aug 30 23:28:17 atelal kernel: ppp_ioctl: set mru to 5dc 
Aug 30 23:28:17 atelal kernel: ppp_tty_ioctl: set rcv asyncmap ffffffff 
Aug 30 23:28:18 atelal pppd[3698]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 
0x342f6cdb> <pcomp> <accomp>]
Aug 30 23:28:18 atelal pppd[3698]: rcvd [LCP ConfReq id=0x1 < 00 04 00 00> <mru 1524> 
<asyncmap 0xa0000> <auth chap MD5> <pcomp> <accomp> < 11 04 05 f4> < 13 09 03 00 c0 7b 
6f be c9>]
Aug 30 23:28:18 atelal pppd[3698]: sent [LCP ConfRej id=0x1 < 00 04 00 00> < 11 04 05 
f4> < 13 09 03 00 c0 7b 6f be c9>]
Aug 30 23:28:18 atelal pppd[3698]: rcvd [LCP ConfAck id=0x1 <asyncmap 0x0> <magic 
0x342f6cdb> <pcomp> <accomp>]
Aug 30 23:28:18 atelal pppd[3698]: rcvd [LCP ConfReq id=0x2 <mru 1524> <asyncmap 
0xa0000> <auth chap MD5> <pcomp> <accomp>]
Aug 30 23:28:18 atelal pppd[3698]: sent [LCP ConfAck id=0x2 <mru 1524> <asyncmap 
0xa0000> <auth chap MD5> <pcomp> <accomp>]
Aug 30 23:28:18 atelal kernel: ppp_tty_ioctl: set xmit asyncmap a0000 
Aug 30 23:28:18 atelal kernel: ppp_ioctl: set flags to f070003 
Aug 30 23:28:18 atelal kernel: ppp_ioctl: set mru to 5dc 
Aug 30 23:28:18 atelal kernel: ppp_tty_ioctl: set rcv asyncmap 0 
Aug 30 23:28:18 atelal pppd[3698]: rcvd [CHAP Challenge id=0x1 
<1242eddbed4d67dfc5c79388ddcc086e>, name = "xxxxxxxxx"]
Aug 30 23:28:18 atelal pppd[3698]: sent [CHAP Response id=0x1 
<b7e5d5c1eb2be266fe16c417dc9e3e63>, name = "xxxxx"]
Aug 30 23:28:19 atelal pppd[3698]: rcvd [CHAP Success id=0x1 "\000"]
Aug 30 23:28:19 atelal pppd[3698]: Remote message: ^@
Aug 30 23:28:19 atelal pppd[3698]: sent [IPCP ConfReq id=0x1 <addr 139.130.141.29> 
<compress VJ 0f 01>]
Aug 30 23:28:19 atelal kernel: ppp_ioctl: set flags to f070043 
Aug 30 23:28:19 atelal pppd[3698]: sent [CCP ConfReq id=0x1 <deflate 15> 
<deflate(old#) 15> <bsd v1 15>]
Aug 30 23:28:19 atelal pppd[3698]: rcvd [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 
144.130.37.226>]
Aug 30 23:28:19 atelal pppd[3698]: sent [IPCP ConfAck id=0x1 <compress VJ 0f 01> <addr 
144.130.37.226>]
Aug 30 23:28:19 atelal pppd[3698]: rcvd [IPCP ConfRej id=0x1 <compress VJ 0f 01>]
Aug 30 23:28:19 atelal pppd[3698]: sent [IPCP ConfReq id=0x2 <addr 139.130.141.29>]
Aug 30 23:28:19 atelal pppd[3698]: rcvd [LCP ProtRej id=0x3 80 fd 01 01 00 0f 1a 04 78 
00 18 04 78 00 15 03 2f]
Aug 30 23:28:19 atelal kernel: ppp_ioctl: set flags to f070003 
Aug 30 23:28:19 atelal pppd[3698]: rcvd [IPCP ConfNak id=0x2 <addr 165.12.24.23>]
Aug 30 23:28:19 atelal pppd[3698]: sent [IPCP ConfReq id=0x3 <addr 165.12.24.23>]
Aug 30 23:28:19 atelal pppd[3698]: rcvd [IPCP ConfAck id=0x3 <addr 165.12.24.23>]
Aug 30 23:28:19 atelal pppd[3698]: Peer is not authorized to use remote address 
144.130.37.226
Aug 30 23:28:19 atelal kernel: ppp_ioctl: set flags to f07000b 
Aug 30 23:28:19 atelal pppd[3698]: sent [IPCP TermReq id=0x4 "Unauthorized remote IP 
address"]
Aug 30 23:28:19 atelal pppd[3698]: rcvd [IPCP TermAck id=0x4]
Aug 30 23:28:19 atelal kernel: ppp_ioctl: set flags to f07000b 
Aug 30 23:28:19 atelal kernel: ppp_tty_ioctl: set xmit asyncmap ffffffff 
Aug 30 23:28:19 atelal kernel: ppp_ioctl: set flags to f070008 
Aug 30 23:28:19 atelal kernel: ppp_ioctl: set mru to 5dc 
Aug 30 23:28:19 atelal kernel: ppp_tty_ioctl: set rcv asyncmap 0 
Aug 30 23:28:19 atelal pppd[3698]: sent [LCP TermReq id=0x2 "No network protocols 
running"]
Aug 30 23:28:19 atelal pppd[3698]: rcvd [LCP TermAck id=0x2]
Aug 30 23:28:19 atelal pppd[3698]: Connection terminated.
Aug 30 23:28:19 atelal pppd[3698]: Connect time 0.1 minutes.
Aug 30 23:28:19 atelal pppd[3698]: Sent 341 bytes, received 340 bytes.
Aug 30 23:28:20 atelal pppd[3698]: Hangup (SIGHUP)




-- 
Howard.
______________________________________________________
LANNet Computing Associates <http://www.lannet.com.au>



--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to