xl2tpd: update to 1.3.18

arm-master
pedro 3 years ago
parent 94f0d5159c
commit 212ae995a8

@ -168,7 +168,7 @@
port = htons (port); port = htons (port);
hp = gethostbyname (host); hp = gethostbyname (host);
if (!hp) if (!hp)
@@ -1921,3 +1931,95 @@ int main (int argc, char *argv[]) @@ -1929,3 +1939,95 @@ int main (int argc, char *argv[])
network_thread (); network_thread ();
return 0; return 0;
} }

@ -0,0 +1,27 @@
---
name: Bug report
about: Create a report to help us improve
title: ''
labels: bug
assignees: ''
---
**Describe the bug**
A clear and concise description of what the bug is.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to '...'
2. Click on '....'
3. Scroll down to '....'
4. See error
**Expected behavior**
A clear and concise description of what you expected to happen.
**l2tp detail:**
- x2ltpd version: [e.g. 1.3.18]
**xl2tpd.conf**
Copy/paste the relevant xl2tpd config

@ -2,12 +2,6 @@ language: c
jobs: jobs:
include: include:
- os: linux
dist: xenial
compiler: gcc
- os: linux
dist: xenial
compiler: clang
- os: linux - os: linux
dist: bionic dist: bionic
compiler: gcc compiler: gcc
@ -20,6 +14,12 @@ jobs:
- os: linux - os: linux
dist: focal dist: focal
compiler: clang compiler: clang
- os: linux
dist: jammy
compiler: gcc
- os: linux
dist: jammy
compiler: clang
sudo: false sudo: false

@ -1,3 +1,25 @@
v1.3.18 (Nov 01, 2022)
* Set default debian branch [Samuel Thibault]
* watch: Turn rc version piece into ~rc [Samuel Thibault]
* upload [Samuel Thibault]
* Fix changelog [Samuel Thibault]
* control: Make Multi-Arch: foreign [Samuel Thibault]
* Add support for Ubuntu Jammy (22.04) when testing with travis.yml [Samir Hussain]
* Update control.c [Lőrinczy, Zsigmond]
* Update issue templates [Samir]
* Add compatability information for Watchguard Firewall [Samir Hussain]
* Adding documentation on common scnerios and how to address them [Samir Hussain]
* Fix issue where in some cases xl2tpd stops trying to connect if it can not resolve server name (DNS failure or WAN temporarily unavailable), even if autodial and redial options are set. [Samir Hussain]
* Modify debian/xl2tpd.service to use network-online.target [Samir Hussain]
* man page: leave the original phrasing for what xl2tpd is [Alexander Naumov]
* typo fix [Alexander Naumov]
* update man-pages [Alexander Naumov]
* Updating README.md [Samir Hussain]
* Add documentation to warn users to comment out: Wants=ipsec.service in the xl2pd.service file [Samir Hussain]
* Update VERSION to 1.3.18dev1 [Samir Hussain]
* control: Bump Standards-Version to 4.6.0 (no change) [Samuel Thibault]
* Play cat and mice again with lintian warning suppression [Samuel Thibault]
v1.3.17 (Jan 20, 2022) v1.3.17 (Jan 20, 2022)
* debian: Add systemd .service [Will Thompson] * debian: Add systemd .service [Will Thompson]
* Update TODO file to specify branch work that needs to be completed [Samir Hussain] * Update TODO file to specify branch work that needs to be completed [Samir Hussain]

@ -27,3 +27,19 @@ There are reports of problems connecting to Miktrotik server.
Github user reported that the following configuration works for them: Github user reported that the following configuration works for them:
https://github.com/xelerance/xl2tpd/issues/156#issuecomment-678674101 https://github.com/xelerance/xl2tpd/issues/156#issuecomment-678674101
* Out of order control packet on tunnel
Some users are reporting when stablishing a tunnel with with Watchguard
Firewall, they get "Out of order control packet on tunnel" error messages.
If that is the case, please add the following to the DFLAGS section in Makefile
and compile:
-DCONFIG_WATCHDOG_FIREWALL
* Some ISP use l2tp without IPsec.
If the ISP being used by end user does not use IPsec, please comment out the
following in debian/xl2tpd.service file:
After=ipsec.service
Wants=ipsec.service

@ -1 +1 @@
XL2TPDVERSION=1.3.17 XL2TPDVERSION=1.3.18

@ -2,7 +2,7 @@
[![Build Status](https://travis-ci.org/xelerance/xl2tpd.svg?branch=1.3.16dev)](https://travis-ci.org/xelerance/xl2tpd) [![Build Status](https://travis-ci.org/xelerance/xl2tpd.svg?branch=1.3.16dev)](https://travis-ci.org/xelerance/xl2tpd)
xl2tpd is a **FREE** implementation of the Layer 2 Tunneling Protocol xl2tpd is an implementation of the Layer 2 Tunneling Protocol
as defined by [RFC 2661](https://tools.ietf.org/rfc/rfc2661.txt). as defined by [RFC 2661](https://tools.ietf.org/rfc/rfc2661.txt).
L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user
sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP

@ -1640,7 +1640,7 @@ static inline int write_packet (struct buffer *buf, struct tunnel *t, struct cal
__FUNCTION__); __FUNCTION__);
return -EINVAL; return -EINVAL;
} }
else if ((size_t)err < 0) else if ((ssize_t)err < 0)
{ {
if ((errno == EAGAIN) || (errno == EINTR)) if ((errno == EAGAIN) || (errno == EINTR))
{ {

@ -1,14 +1,22 @@
xl2tpd (1.3.17-1) UNRELEASED; urgency=medium xl2tpd (1.3.18-1) unstable; urgency=medium
* New upstream release. * New upstream release.
-- Samir Hussain <shussain@xelerance.com> Thu, 20 Jan 2022 14:35:21 -0500 -- Samir Hussain <shussain@xelerance.com> Tue, 01 Nov 2022 16:42:39 -0400
xl2tpd (1.3.16-2) UNRELEASED; urgency=medium xl2tpd (1.3.17-1) unstable; urgency=medium
[ Samir Hussain ]
* New upstream release.
[ Samuel Thibault ]
* control: Fix branch of Vcs-Git. * control: Fix branch of Vcs-Git.
* Play cat and mice again with lintian warning suppression.
* control: Bump Standards-Version to 4.6.0 (no change)
* control: Make Multi-Arch: foreign.
* watch: Turn rc version piece into ~rc.
-- Samuel Thibault <sthibault@debian.org> Mon, 20 Sep 2021 00:21:31 +0200 -- Samuel Thibault <sthibault@debian.org> Sat, 17 Sep 2022 21:37:04 +0200
xl2tpd (1.3.16-1) unstable; urgency=medium xl2tpd (1.3.16-1) unstable; urgency=medium

@ -7,10 +7,11 @@ Homepage: https://www.xelerance.com/software/xl2tpd/
Vcs-Browser: https://github.com/xelerance/xl2tpd Vcs-Browser: https://github.com/xelerance/xl2tpd
Vcs-Git: https://github.com/xelerance/xl2tpd.git -b debian-sid Vcs-Git: https://github.com/xelerance/xl2tpd.git -b debian-sid
Build-Depends: debhelper-compat (= 12), libpcap0.8-dev Build-Depends: debhelper-compat (= 12), libpcap0.8-dev
Standards-Version: 4.5.0 Standards-Version: 4.6.0
Package: xl2tpd Package: xl2tpd
Architecture: any Architecture: any
Multi-Arch: foreign
Provides: l2tpd Provides: l2tpd
Depends: ${shlibs:Depends}, ${misc:Depends}, ppp, lsb-base (>= 3.0-6) Depends: ${shlibs:Depends}, ${misc:Depends}, ppp, lsb-base (>= 3.0-6)
Description: layer 2 tunneling protocol implementation Description: layer 2 tunneling protocol implementation

@ -0,0 +1,2 @@
[DEFAULT]
debian-branch = debian-sid

@ -1,3 +1,3 @@
# The etc/xl2tpd/l2tp-secrets file must not be readable by non-root # The etc/xl2tpd/l2tp-secrets file must not be readable by non-root
xl2tpd: non-standard-file-perm etc/xl2tpd/l2tp-secrets 0600 != 0644 xl2tpd: non-standard-file-perm 0600 != 0644 [etc/xl2tpd/l2tp-secrets]

@ -1,3 +1,4 @@
version=4 version=4
opts=filenamemangle=s/.+\/v?(\d\S+)\.tar\.gz/xl2tpd-$1\.tar\.gz/ \ opts=filenamemangle=s/.+\/v?(\d\S+)\.tar\.gz/xl2tpd-$1\.tar\.gz/,\
uversionmangle=s/(\d)(rc)/$1~$2/ \
https://github.com/xelerance/xl2tpd/tags .*/v?(\d\S+)\.tar\.gz https://github.com/xelerance/xl2tpd/tags .*/v?(\d\S+)\.tar\.gz

@ -1,6 +1,8 @@
[Unit] [Unit]
Description=Level 2 Tunnel Protocol Daemon (L2TP) Description=Level 2 Tunnel Protocol Daemon (L2TP)
After=network.target After=network-online.target
# Some ISPS use l2tp without IPsec. If that is the case for your ISP provider,
# comment out the two lines below
After=ipsec.service After=ipsec.service
Wants=ipsec.service Wants=ipsec.service

@ -0,0 +1,17 @@
Q. How do you deny connection to xl2tpd without IPsec encryption?
You can use iptables policy module like this:
iptables -A INPUT -p udp --dport 1701 -m policy --dir in --pol ipsec -j ACCEPT
iptables -A INPUT -p udp --dport 1701 -j DROP
Q. How to address low throughput?
Use rx bps and tx bps in xltpd.conf
A lot of examples use the following which is 10 times the default xl2tpd values:
tx bps = 100000000
rx bps = 100000000

@ -1,6 +1,8 @@
.TH "l2tp-secrets" "5" "" "Jeff McAdams" "" .TH "l2tp-secrets" "5" "Jan 2022" "Jeff McAdams" ""
.SH "NAME" .SH "NAME"
l2tp-secrets \- L2TPD secrets file l2tp-secrets \- L2TPD secrets file
.SH "DESCRIPTION" .SH "DESCRIPTION"
The l2tp-secrets file contains challenge-response authentication The l2tp-secrets file contains challenge-response authentication
information for xl2tpd, the implementation of l2tp protocol. The format information for xl2tpd, the implementation of l2tp protocol. The format
@ -24,18 +26,20 @@ probably be longer to ensure sufficient security. There is no minimum
length requirement, however. length requirement, however.
.SH "FILES" .SH "FILES"
/etc/xl2tpd/xl2tpd.conf
/etc/xl2tpd/l2tp\-secrets
/var/run/xl2tpd/l2tp\-control
\fB\fR/etc/xl2tpd/xl2tpd.conf \fB\fR/etc/xl2tpd/l2tp\-secrets
\fB\fR/var/run/xl2tpd/l2tp\-control
.SH "BUGS" .SH "BUGS"
Please send bugs and comment to xl2tpd@lists.xelerance.com
Please address bugs and comment to xl2tpd@lists.xelerance.com
.SH "SEE ALSO" .SH "SEE ALSO"
xl2tpd(8),
xl2tpd.conf(5)
\fB\fRxl2tpd(8)
\fB\fRxl2tpd.conf(5)
.SH "AUTHORS" .SH "AUTHORS"
Michael Richardson <mcr@xelerance.com> Michael Richardson <mcr@xelerance.com>
Paul Wouters <paul@xelerance.com> Paul Wouters <paul@xelerance.com>

@ -1,4 +1,4 @@
.TH xl2tpd-control 8 "Sep 2020" .TH xl2tpd-control 8 "Jan 2022"
.SH NAME .SH NAME
xl2tpd\-control \- xl2tpd control utility. xl2tpd\-control \- xl2tpd control utility.

@ -1,7 +1,7 @@
.TH xl2tpd 8 "Sep 2020" .TH xl2tpd 8 "Jan 2022"
.SH NAME .SH NAME
xl2tpd \- Layer 2 Tunnelling Protocol Daemon. xl2tpd \- Layer 2 Tunneling Protocol Daemon.
.SH DESCRIPTION .SH DESCRIPTION
xl2tpd is an implementation of the Layer 2 Tunneling Protocol (RFC 2661). xl2tpd is an implementation of the Layer 2 Tunneling Protocol (RFC 2661).

@ -1,4 +1,4 @@
.TH xl2tpd.conf 5 "Sep 2020" .TH xl2tpd.conf 5 "Jan 2022"
.SH NAME .SH NAME
xl2tpd.conf \- L2TPD configuration file xl2tpd.conf \- L2TPD configuration file
.SH DESCRIPTION .SH DESCRIPTION

@ -59,7 +59,7 @@ typedef unsigned long long _u64;
#define CONTROL_PIPE_REQ_LNS_REMOVE 'w' /* Get status of LNS */ #define CONTROL_PIPE_REQ_LNS_REMOVE 'w' /* Get status of LNS */
#define BINARY "xl2tpd" #define BINARY "xl2tpd"
#define SERVER_VERSION "xl2tpd-1.3.17" #define SERVER_VERSION "xl2tpd-1.3.18"
#define VENDOR_NAME "xelerance.com" #define VENDOR_NAME "xelerance.com"
#ifndef PPPD #ifndef PPPD
#define PPPD "/usr/sbin/pppd" #define PPPD "/usr/sbin/pppd"

@ -1,6 +1,6 @@
Summary: Layer 2 Tunnelling Protocol Daemon (RFC 2661) Summary: Layer 2 Tunnelling Protocol Daemon (RFC 2661)
Name: xl2tpd Name: xl2tpd
Version: 1.3.17 Version: 1.3.18
Release: 1%{?dist} Release: 1%{?dist}
License: GPLv2 License: GPLv2
Url: http://www.xelerance.com/software/xl2tpd/ Url: http://www.xelerance.com/software/xl2tpd/

@ -2,7 +2,7 @@
include $(TOPDIR)/rules.mk include $(TOPDIR)/rules.mk
PKG_NAME:=xl2tpd PKG_NAME:=xl2tpd
PKG_VERSION:=1.3.17 PKG_VERSION:=1.3.18
PKG_RELEASE:=1 PKG_RELEASE:=1
PKG_MD5SUM:=ab5656eb5a3d1973f7f69b039675332e-NEEDSUPDATING PKG_MD5SUM:=ab5656eb5a3d1973f7f69b039675332e-NEEDSUPDATING

@ -1,6 +1,6 @@
Summary: Layer 2 Tunnelling Protocol Daemon (RFC 2661) Summary: Layer 2 Tunnelling Protocol Daemon (RFC 2661)
Name: xl2tpd Name: xl2tpd
Version: 1.3.17 Version: 1.3.18
Release: 1%{?dist} Release: 1%{?dist}
License: GPLv2 License: GPLv2
Url: http://www.xelerance.com/software/xl2tpd/ Url: http://www.xelerance.com/software/xl2tpd/

@ -22,7 +22,7 @@
%define rundir /run %define rundir /run
%endif %endif
Name: xl2tpd Name: xl2tpd
Version: 1.3.17 Version: 1.3.18
Release: 0 Release: 0
Summary: Layer 2 Tunnelling Protocol Daemon (RFC 2661) Summary: Layer 2 Tunnelling Protocol Daemon (RFC 2661)
License: GPL-2.0-only License: GPL-2.0-only

@ -710,6 +710,14 @@ static struct tunnel *l2tp_call (char *host, int port, struct lac *lac,
{ {
l2tp_log (LOG_WARNING, "Host name lookup failed for %s.\n", l2tp_log (LOG_WARNING, "Host name lookup failed for %s.\n",
host); host);
if (lac->redial && (lac->rtimeout > 0) && !lac->rsched && lac->active)
{
struct timeval tv;
l2tp_log (LOG_INFO, "Will redial in %d seconds\n", lac->rtimeout);
tv.tv_sec = lac->rtimeout;
tv.tv_usec = 0;
lac->rsched = schedule (tv, magic_lac_dial, lac);
}
return NULL; return NULL;
} }
bcopy (hp->h_addr, &addr.s_addr, hp->h_length); bcopy (hp->h_addr, &addr.s_addr, hp->h_length);

Loading…
Cancel
Save