!! HELP MY !!
Добавлено: Пт окт 27, 2006 9:20 am
Помогите, третию неделю с abills-ом бъюсь и НИЧЕГО, то одно то другое. УМАЛЯЮ помогите настроить.. Приважу логи. Может ктонибудь поймет да объяснит мне, что я сделал не правельно?
Slackware 10.2, Kernel 2.4.31, pppd 2.4.3, pptpd-1.1.4-b4 Abills 0.35
Логи:
Debug
Radius
messages
Syslog
При этом в логах abills-a все ок. а присоединении с winxp пишет неверный логин/пароль. Что делать?
Slackware 10.2, Kernel 2.4.31, pppd 2.4.3, pptpd-1.1.4-b4 Abills 0.35
Логи:
Debug
Код: Выделить всё
[size=9]
Oct 27 08:44:54 VpnS pptpd[1054]: MGR: Launching /usr/local/sbin/pptpctrl to handle client
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: local address = 10.0.0.1
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: remote address = 192.168.1.1
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: pppd options file = /etc/ppp/options.pptpd
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Received PPTP Control Message (type: 1)
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Made a START CTRL CONN RPLY packet
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: I wrote 156 bytes to the client.
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Sent packet to client
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Received PPTP Control Message (type: 7)
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Set parameters to 100000000 maxbps, 64 window size
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Made a OUT CALL RPLY packet
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: pty_fd = 6
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: tty_fd = 7
Oct 27 08:44:54 VpnS pptpd[1055]: CTRL (PPPD Launcher): program binary = /usr/sbin/pppd
Oct 27 08:44:54 VpnS pptpd[1055]: CTRL (PPPD Launcher): local address = 10.0.0.1
Oct 27 08:44:54 VpnS pptpd[1055]: CTRL (PPPD Launcher): remote address = 192.168.1.1
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: I wrote 32 bytes to the client.
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Sent packet to client
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Received PPTP Control Message (type: 15)
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Got a SET LINK INFO packet with standard ACCMs
Oct 27 08:44:54 VpnS pptpd[1054]: GRE: accepting packet #0
Oct 27 08:44:54 VpnS pptpd[1054]: GRE: accepting packet #1
Oct 27 08:44:54 VpnS pppd[1055]: using channel 48
Oct 27 08:44:54 VpnS pppd[1055]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <auth chap MS-v2> <magic 0xad4da29c> <pcomp> <accomp>]
Oct 27 08:44:54 VpnS pptpd[1054]: GRE: accepting packet #2
Oct 27 08:44:54 VpnS pppd[1055]: rcvd [LCP ConfAck id=0x1 <asyncmap 0x0> <auth chap MS-v2> <magic 0xad4da29c> <pcomp> <accomp>]
Oct 27 08:44:56 VpnS pptpd[1054]: GRE: accepting packet #3
Oct 27 08:44:56 VpnS pppd[1055]: rcvd [LCP ConfReq id=0x1 <mru 1400> <magic 0x6fff255e> <pcomp> <accomp> <callback CBCP>]
Oct 27 08:44:56 VpnS pppd[1055]: sent [LCP ConfRej id=0x1 <callback CBCP>]
Oct 27 08:44:56 VpnS pptpd[1054]: GRE: accepting packet #4
Oct 27 08:44:56 VpnS pppd[1055]: rcvd [LCP ConfReq id=0x2 <mru 1400> <magic 0x6fff255e> <pcomp> <accomp>]
Oct 27 08:44:56 VpnS pppd[1055]: sent [LCP ConfAck id=0x2 <mru 1400> <magic 0x6fff255e> <pcomp> <accomp>]
Oct 27 08:44:56 VpnS pptpd[1054]: GRE: accepting packet #5
Oct 27 08:44:56 VpnS pptpd[1054]: CTRL: Received PPTP Control Message (type: 15)
Oct 27 08:44:56 VpnS pptpd[1054]: GRE: accepting packet #6
Oct 27 08:44:56 VpnS pppd[1055]: sent [CHAP Challenge id=0x2 <2541e28e268f7f140dc431fd66bf760b>, name = "VpnS"]
Oct 27 08:44:56 VpnS pppd[1055]: rcvd [LCP code=0xc id=0x3 6f ff 25 5e 4d 53 52 41 53 56 35 2e 31 30]
Oct 27 08:44:56 VpnS pptpd[1054]: GRE: accepting packet #7
Oct 27 08:44:56 VpnS pppd[1055]: sent [LCP CodeRej id=0x2 0c 03 00 12 6f ff 25 5e 4d 53 52 41 53 56 35 2e 31 30]
Oct 27 08:44:56 VpnS pppd[1055]: rcvd [LCP code=0xc id=0x4 6f ff 25 5e 4d 53 52 41 53 2d 30 2d 43 4f 4d 50 55 54 45 52]
Oct 27 08:44:56 VpnS pppd[1055]: sent [LCP CodeRej id=0x3 0c 04 00 18 6f ff 25 5e 4d 53 52 41 53 2d 30 2d 43 4f 4d 50 55 54 45 52]
Oct 27 08:44:56 VpnS pppd[1055]: rcvd [CHAP Response id=0x2 <9896aed29f4a2c52c2e6e6ae505d03d100000000000000009ed00c6e9aee7e21fdffaccc0893d709ade19bedba10040f00>, name = "user"]
Oct 27 08:44:59 VpnS pptpd[1054]: GRE: accepting packet #8
Oct 27 08:45:01 VpnS pppd[1055]: sent [CHAP Failure id=0x2 ""]
Oct 27 08:45:01 VpnS pppd[1055]: sent [LCP TermReq id=0x4 "Authentication failed"]
Oct 27 08:45:01 VpnS pppd[1055]: rcvd [CHAP Response id=0x2 <9896aed29f4a2c52c2e6e6ae505d03d100000000000000009ed00c6e9aee7e21fdffaccc0893d709ade19bedba10040f00>, name = "user"]
Oct 27 08:45:01 VpnS pppd[1055]: Discarded non-LCP packet when LCP not open
Oct 27 08:45:01 VpnS pptpd[1054]: CTRL: Received PPTP Control Message (type: 15)
Oct 27 08:45:01 VpnS pptpd[1054]: CTRL: Got a SET LINK INFO packet with standard ACCMs
Oct 27 08:45:01 VpnS pptpd[1054]: GRE: accepting packet #9
Oct 27 08:45:01 VpnS pptpd[1054]: CTRL: Received PPTP Control Message (type: 12)
Oct 27 08:45:01 VpnS pptpd[1054]: CTRL: Made a CALL DISCONNECT RPLY packet
Oct 27 08:45:01 VpnS pptpd[1054]: CTRL: Received CALL CLR request (closing call)
Oct 27 08:45:01 VpnS pptpd[1054]: CTRL: Reaping child PPP[1055]
Oct 27 08:45:01 VpnS pppd[1055]: rcvd [LCP TermAck id=0x4 "Authentication failed"]
Oct 27 08:45:01 VpnS pppd[1055]: RADATTR plugin removed file /var/run/radattr.ppp0.
Oct 27 08:45:01 VpnS pptpd[1054]: CTRL: Exiting now
Oct 27 08:45:01 VpnS pptpd[1037]: MGR: Reaped child 1054
[/size]
Radius
Код: Выделить всё
[size=9]
rad_recv: Access-Request packet from host 127.0.0.1:1028, id=145, length=50
Service-Type = Framed-User
Framed-Protocol = PPP
User-Name = "user"
NAS-IP-Address = 192.168.1.1
NAS-Port = 0
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
radius_xlat: '/usr/abills/libexec/rauth.pl pre_auth'
Exec-Program: /usr/abills/libexec/rauth.pl pre_auth
Exec-Program output: Auth-Type := Accept
Exec-Program-Wait: value-pairs: Auth-Type := Accept
Exec-Program: returned: 0
modcall[authorize]: module "pre_auth" returns ok for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "mschap" returns noop for request 1
rlm_realm: No '@' in User-Name = "user", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
users: Matched entry DEFAULT at line 155
modcall[authorize]: module "files" returns ok for request 1
modcall: leaving group authorize (returns ok) for request 1
rad_check_password: Found Auth-Type Accept
rad_check_password: Auth-Type = Accept, accepting the user
radius_xlat: '/usr/abills/libexec/rauth.pl'
Exec-Program: /usr/abills/libexec/rauth.pl
Exec-Program output: Acct-Interim-Interval = 60, Session-Timeout = 55940, PPPD-Upstream-Speed-Limit = 110, Octets-Direction = 1, Framed-IP-Address = 10.0.0.2, Session-Octets-Limit = 41943040, Framed-IP-Netmask = 255.255.255.0, PPPD-Downstream-Speed-Limit = 110,
Exec-Program-Wait: plaintext: Acct-Interim-Interval = 60, Session-Timeout = 55940, PPPD-Upstream-Speed-Limit = 110, Octets-Direction = 1, Framed-IP-Address = 10.0.0.2, Session-Octets-Limit = 41943040, Framed-IP-Netmask = 255.255.255.0, PPPD-Downstream-Speed-Limit = 110,
Exec-Program: returned: 0
Sending Access-Accept of id 145 to 127.0.0.1 port 1028
Finished request 1
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
--- Walking the entire request list ---
[/size]
Код: Выделить всё
[size=9]
Oct 27 08:44:14 VpnS pptpd[1037]: MGR: Manager process started
Oct 27 08:44:14 VpnS pptpd[1037]: MGR: Maximum of 100 connections available
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Client 192.168.1.50 control connection started
Oct 27 08:44:54 VpnS pptpd[1054]: CTRL: Starting call (launching pppd, opening GRE)
Oct 27 08:44:54 VpnS pppd[1055]: Plugin /usr/lib/pppd/2.4.3/radius.so loaded.
Oct 27 08:44:54 VpnS pppd[1055]: RADIUS plugin initialized.
Oct 27 08:44:54 VpnS pppd[1055]: Plugin /usr/lib/pppd/2.4.3/radattr.so loaded.
Oct 27 08:44:54 VpnS pppd[1055]: RADATTR plugin initialized.
Oct 27 08:44:54 VpnS pppd[1055]: Plugin /usr/lib/pptpd/pptpd-logwtmp.so loaded.
Oct 27 08:44:54 VpnS pppd[1055]: pptpd-logwtmp: $Version$
Oct 27 08:44:54 VpnS pppd[1055]: pppd 2.4.3 started by root, uid 0
Oct 27 08:44:54 VpnS pppd[1055]: Using interface ppp0
Oct 27 08:44:54 VpnS pppd[1055]: Connect: ppp0 <--> /dev/pts/1
Oct 27 08:45:01 VpnS pppd[1055]: Connection terminated.
Oct 27 08:45:01 VpnS pppd[1055]: Exit.
Oct 27 08:45:01 VpnS pptpd[1054]: CTRL: Client 192.168.1.50 control connection finished
[/size]
Код: Выделить всё
[size=9]
Oct 27 08:44:54 VpnS pptpd[1054]: GRE: Bad checksum from pppd.
Oct 27 08:44:54 VpnS last message repeated 2 times
Oct 27 08:44:56 VpnS pptpd[1054]: CTRL: Ignored a SET LINK INFO packet with real ACCMs!
Oct 27 08:44:56 VpnS pppd[1055]: rc_avpair_new: unknown attribute 11
Oct 27 08:44:56 VpnS pppd[1055]: rc_avpair_new: unknown attribute 25
Oct 27 08:45:01 VpnS pppd[1055]: rc_check_reply: received invalid reply digest from RADIUS server
Oct 27 08:45:01 VpnS pppd[1055]: Peer user failed CHAP authentication
Oct 27 08:45:01 VpnS pppd[1055]: tcflush failed: Input/output error
[/size]