** Message: nm-l2tp-service (version 0.9.8.5-0saucy1) starting...
connection
name : "connection"
id : "VPN-\321\201\320\276\320\265\320\264\320\270\320\275\320\265\320\275\320\270\320\265 1" (s)
uuid : "4deb58ee-f162-4a69-80af-471c368d3092" (s)
type : "vpn" (s)
permissions : ['user:joi:'] (s)
autoconnect : FALSE (s)
timestamp : 1419410474 (s)
read-only : FALSE (sd)
zone : NULL (sd)
master : NULL (sd)
slave-type : NULL (sd)
secondaries : [] (sd)
vpn
name : "vpn"
service-type : "org.freedesktop.NetworkManager.l2tp" (s)
user-name : "joi" (s)
data : [ { 'lcp-echo-interval': 30 }, { 'password-flags': 1 }, { 'ipsec-group-name': GroupVPN }, { 'ipsec-psk': xxxxxxxxxxxxxxxxxxxx }, { 'user': Dmitry }, { 'ipsec-enabled': yes }, { 'lcp-echo-failure': 5 }, { 'gateway': xxx.xxx.xxx.xx }, ] (s)
secrets : [ { 'password': xxxxxxxx }, ] (s)
ipv4
name : "ipv4"
method : "auto" (s)
dns : [402696384 (192.168.0.24)] (s)
dns-search : [] (sd)
addresses : [] (s)
routes : [{ dst = 192.168.0.0, px = 24, nh = 192.168.10.20, mt = 10 }, { dst = 192.168.3.0, px = 24, nh = 192.168.10.20, mt = 10 }] (s)
ignore-auto-routes : TRUE (s)
ignore-auto-dns : TRUE (s)
dhcp-client-id : NULL (sd)
dhcp-send-hostname : TRUE (sd)
dhcp-hostname : NULL (sd)
never-default : TRUE (s)
may-fail : TRUE (sd)
** Message: Check port 1701
** Message: ipsec enable flag: yes
** Message: starting ipsec
ipsec_setup: Stopping Openswan IPsec...
ipsec_setup: Starting Openswan IPsec U2.6.38/K3.13.0-24-generic...
002 listening for IKE messages
002 adding interface eth2/eth2 10.0.0.10:500
002 adding interface eth2/eth2 10.0.0.10:4500
002 adding interface lo/lo 127.0.0.1:500
002 adding interface lo/lo 127.0.0.1:4500
002 adding interface lo/lo ::1:500
002 loading secrets from "/etc/ipsec.secrets"
002 added connection description "nm-ipsec-l2tpd-2523"
opening file: /var/run/nm-ipsec-l2tp.2523/ipsec.conf
debugging mode enabled
end of file /var/run/nm-ipsec-l2tp.2523/ipsec.conf
Loading conn nm-ipsec-l2tpd-2523
default route is: 10.0.0.10
default nexthop is: 10.0.0.1
002 "nm-ipsec-l2tpd-2523": deleting connection
002 added connection description "nm-ipsec-l2tpd-2523"
loading named conns: nm-ipsec-l2tpd-2523
002 "nm-ipsec-l2tpd-2523" #1: initiating Main Mode
104 "nm-ipsec-l2tpd-2523" #1: STATE_MAIN_I1: initiate
003 "nm-ipsec-l2tpd-2523" #1: ignoring unknown Vendor ID payload [8f9cc94e01248ecdf147594c284b213b]
003 "nm-ipsec-l2tpd-2523" #1: ignoring Vendor ID payload [draft-stenberg-ipsec-nat-traversal-01]
003 "nm-ipsec-l2tpd-2523" #1: ignoring Vendor ID payload [draft-stenberg-ipsec-nat-traversal-02]
003 "nm-ipsec-l2tpd-2523" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
003 "nm-ipsec-l2tpd-2523" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] method set to=107
003 "nm-ipsec-l2tpd-2523" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 107
003 "nm-ipsec-l2tpd-2523" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108
003 "nm-ipsec-l2tpd-2523" #1: received Vendor ID payload [RFC 3947] method set to=115
003 "nm-ipsec-l2tpd-2523" #1: received Vendor ID payload [Dead Peer Detection]
002 "nm-ipsec-l2tpd-2523" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
002 "nm-ipsec-l2tpd-2523" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
106 "nm-ipsec-l2tpd-2523" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "nm-ipsec-l2tpd-2523" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
002 "nm-ipsec-l2tpd-2523" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
108 "nm-ipsec-l2tpd-2523" #1: STATE_MAIN_I3: sent MI3, expecting MR3
002 "nm-ipsec-l2tpd-2523" #1: Main mode peer ID is ID_IPV4_ADDR: '212.176.165.5'
002 "nm-ipsec-l2tpd-2523" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
004 "nm-ipsec-l2tpd-2523" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
002 "nm-ipsec-l2tpd-2523" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#1 msgid:660b5c49 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=no-pfs}
117 "nm-ipsec-l2tpd-2523" #2: STATE_QUICK_I1: initiate
003 "nm-ipsec-l2tpd-2523" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=660b5c49
003 "nm-ipsec-l2tpd-2523" #2: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
002 "nm-ipsec-l2tpd-2523" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "nm-ipsec-l2tpd-2523" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x419e94c6 <0x294e43f7 xfrm=3DES_0-HMAC_SHA1 NATOA=188.162.229.203 NATD=212.176.165.5:4500 DPD=none}
** Message: ipsec ready for action
** Message: xl2tpd started with pid 2846
xl2tpd[2846]: setsockopt recvref[30]: Protocol not available
xl2tpd[2846]: This binary does not support kernel L2TP.
xl2tpd[2846]: xl2tpd version xl2tpd-1.3.6 started on test3 PID:2846
xl2tpd[2846]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[2846]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[2846]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[2846]: Forked again by Xelerance (
www.xelerance.com) (C) 2006
xl2tpd[2846]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[2846]: get_call: allocating new tunnel for host 212.176.165.5, port 1701.
xl2tpd[2846]: Connecting to host 212.176.165.5, port 1701
xl2tpd[2846]: control_finish: message type is (null)(0). Tunnel is 0, call is 0.
xl2tpd[2846]: control_finish: sending SCCRQ
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
xl2tpd[2846]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[2846]: framing_caps_avp: supported peer frames: sync
xl2tpd[2846]: hostname_avp: peer reports hostname 'N/A'
xl2tpd[2846]: assigned_tunnel_avp: using peer's tunnel 36130
xl2tpd[2846]: control_finish: message type is Start-Control-Connection-Reply(2). Tunnel is 36130, call is 0.
xl2tpd[2846]: control_finish: sending SCCCN
xl2tpd[2846]: Connection established to 212.176.165.5, 1701. Local: 58156, Remote: 36130 (ref=0/0).
xl2tpd[2846]: Calling on tunnel 58156
xl2tpd[2846]: control_finish: message type is (null)(0). Tunnel is 36130, call is 0.
xl2tpd[2846]: control_finish: sending ICRQ
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 54319
xl2tpd[2846]: message_type_avp: message type 11 (Incoming-Call-Reply)
xl2tpd[2846]: assigned_call_avp: using peer's call 1
xl2tpd[2846]: control_finish: message type is Incoming-Call-Reply(11). Tunnel is 36130, call is 1.
xl2tpd[2846]: control_finish: Sending ICCN
xl2tpd[2846]: Call established with 212.176.165.5, Local: 54319, Remote: 1, Serial: 1 (ref=0/0)
xl2tpd[2846]: start_pppd: I'm running:
xl2tpd[2846]: "/usr/sbin/pppd"
xl2tpd[2846]: "passive"
xl2tpd[2846]: "nodetach"
xl2tpd[2846]: ":"
xl2tpd[2846]: "name"
xl2tpd[2846]: "Dmitry"
xl2tpd[2846]: "debug"
xl2tpd[2846]: "file"
xl2tpd[2846]: "/var/run/nm-ppp-options.xl2tpd.2523"
xl2tpd[2846]: "/dev/pts/16"
** Message: nm-l2tp-ppp-plugin: (plugin_init): initializing
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 3 / phase 'serial connection'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 5 / phase 'establish'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 6 / phase 'authenticate'
** Message: nm-l2tp-ppp-plugin: (get_credentials): passwd-hook, requesting credentials...
** Message: nm-l2tp-ppp-plugin: (get_credentials): got credentials from NetworkManager-l2tp
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 8 / phase 'network'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 9 / phase 'running'
** Message: nm-l2tp-ppp-plugin: (nm_ip_up): ip-up event
** Message: nm-l2tp-ppp-plugin: (nm_ip_up): sending Ip4Config to NetworkManager-l2tp...
** Message: L2TP service (IP Config Get) reply received.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
xl2tpd[2846]: handle_avps: handling avp's for tunnel 58156, call 0
xl2tpd[2846]: message_type_avp: message type 6 (Hello)
xl2tpd[2846]: control_finish: message type is Hello(6). Tunnel is 36130, call is 0.
*************************************************************************
Dec 24 20:21:07 test3 NetworkManager[860]: <info> VPN service 'l2tp' appeared; activating connections
Dec 24 20:22:26 test3 NetworkManager[860]: <info> VPN plugin state changed: starting (3)
Dec 24 20:22:26 test3 ipsec_setup: Stopping Openswan IPsec...
Dec 24 20:22:28 test3 kernel: [ 204.166647] NET: Unregistered protocol family 15
Dec 24 20:22:28 test3 ipsec_setup: ...Openswan IPsec stopped
Dec 24 20:22:28 test3 kernel: [ 204.255585] NET: Registered protocol family 15
Dec 24 20:22:28 test3 ipsec_setup: Starting Openswan IPsec U2.6.38/K3.13.0-24-generic...
Dec 24 20:22:28 test3 ipsec_setup: Using NETKEY(XFRM) stack
Dec 24 20:22:28 test3 kernel: [ 204.389484] Initializing XFRM netlink socket
Dec 24 20:22:28 test3 kernel: [ 204.487083] sha512_ssse3: Neither AVX nor SSSE3 is available/usable.
Dec 24 20:22:28 test3 kernel: [ 204.510247] sha256_ssse3: Neither AVX nor SSSE3 is available/usable.
Dec 24 20:22:28 test3 kernel: [ 204.549236] AVX instructions are not detected.
Dec 24 20:22:28 test3 kernel: [ 204.568135] AVX instructions are not detected.
Dec 24 20:22:28 test3 kernel: [ 204.581512] AVX instructions are not detected.
Dec 24 20:22:28 test3 kernel: [ 204.626613] AVX instructions are not detected.
Dec 24 20:22:28 test3 kernel: [ 204.647809] AVX instructions are not detected.
Dec 24 20:22:28 test3 kernel: [ 204.671404] AVX or AES-NI instructions are not detected.
Dec 24 20:22:28 test3 kernel: [ 204.698587] AVX or AES-NI instructions are not detected.
Dec 24 20:22:28 test3 ipsec_setup: ...Openswan IPsec started
Dec 24 20:22:28 test3 pluto: adjusting ipsec.d to /etc/ipsec.d
Dec 24 20:22:28 test3 ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d
Dec 24 20:22:28 test3 ipsec__plutorun: 002 added connection description "present"
Dec 24 20:22:30 test3 NetworkManager[860]: <info> VPN connection 'VPN-соединение 1' (Connect) reply received.
Dec 24 20:22:33 test3 pppd[2848]: Plugin /usr/lib/pppd/2.4.5/nm-l2tp-pppd-plugin.so loaded.
Dec 24 20:22:33 test3 pppd[2848]: pppd 2.4.5 started by root, uid 0
Dec 24 20:22:33 test3 pppd[2848]: using channel 1
Dec 24 20:22:33 test3 pppd[2848]: Using interface ppp0
Dec 24 20:22:33 test3 pppd[2848]: Connect: ppp0 <--> /dev/pts/16
Dec 24 20:22:33 test3 pppd[2848]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x9428a335> <pcomp> <accomp>]
Dec 24 20:22:33 test3 NetworkManager[860]: <warn> /sys/devices/virtual/net/ppp0: couldn't determine device driver; ignoring...
Dec 24 20:22:33 test3 NetworkManager[860]: SCPlugin-Ifupdown: devices added (path: /sys/devices/virtual/net/ppp0, iface: ppp0)
Dec 24 20:22:33 test3 NetworkManager[860]: SCPlugin-Ifupdown: device added (path: /sys/devices/virtual/net/ppp0, iface: ppp0): no ifupdown configuration found.
Dec 24 20:22:33 test3 pppd[2848]: rcvd [LCP ConfRej id=0x1 <asyncmap 0x0> <pcomp> <accomp>]
Dec 24 20:22:33 test3 pppd[2848]: sent [LCP ConfReq id=0x2 <magic 0x9428a335>]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [LCP ConfAck id=0x2 <magic 0x9428a335>]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [LCP ConfReq id=0x1 <mru 1376> <auth chap MS-v2> <magic 0x1f0adc14>]
Dec 24 20:22:33 test3 pppd[2848]: sent [LCP ConfAck id=0x1 <mru 1376> <auth chap MS-v2> <magic 0x1f0adc14>]
Dec 24 20:22:33 test3 pppd[2848]: sent [LCP EchoReq id=0x0 magic=0x9428a335]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [CHAP Challenge id=0x52 <ac7f037268b5cfe4c568ed6098635891>, name = ""]
Dec 24 20:22:33 test3 pppd[2848]: sent [CHAP Response id=0x52 <4a3021b502995664081c4aeaeaac636e0000000000000000d8227c1ce77b995e447b36095a649e3c169016d69686892f00>, name = "Dmitry"]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [LCP EchoRep id=0x0 magic=0x1f0adc14]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [CHAP Success id=0x52 "S=6290DE779E8C6B94953F6484615E2845044697B7"]
Dec 24 20:22:33 test3 pppd[2848]: CHAP authentication succeeded
Dec 24 20:22:33 test3 pppd[2848]: sent [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [CCP ConfReq id=0x0 <mppe +H +M +S +L -D -C>]
Dec 24 20:22:33 test3 pppd[2848]: Unsupported protocol 'Compression Control Protocol' (0x80fd) received
Dec 24 20:22:33 test3 pppd[2848]: sent [LCP ProtRej id=0x3 80 fd 01 00 00 0a 12 06 01 00 00 e0]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [IPCP ConfReq id=0x0 <addr 192.168.10.1>]
Dec 24 20:22:33 test3 pppd[2848]: sent [IPCP ConfAck id=0x0 <addr 192.168.10.1>]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [IPCP ConfRej id=0x1 <compress VJ 0f 01> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
Dec 24 20:22:33 test3 pppd[2848]: sent [IPCP ConfReq id=0x2 <addr 0.0.0.0>]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [IPCP ConfNak id=0x2 <addr 192.168.10.20>]
Dec 24 20:22:33 test3 pppd[2848]: sent [IPCP ConfReq id=0x3 <addr 192.168.10.20>]
Dec 24 20:22:33 test3 pppd[2848]: rcvd [IPCP ConfAck id=0x3 <addr 192.168.10.20>]
Dec 24 20:22:33 test3 pppd[2848]: local IP address 192.168.10.20
Dec 24 20:22:33 test3 pppd[2848]: remote IP address 192.168.10.1
Dec 24 20:22:33 test3 NetworkManager[860]: <info> VPN connection 'VPN-соединение 1' (IP4 Config Get) reply received from old-style plugin.
Dec 24 20:22:33 test3 NetworkManager[860]: <info> VPN Gateway: 212.176.165.5
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Tunnel Device: ppp0
Dec 24 20:22:33 test3 NetworkManager[860]: <info> IPv4 configuration:
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Internal Address: 192.168.10.20
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Internal Prefix: 32
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Internal Point-to-Point Address: 192.168.10.1
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Maximum Segment Size (MSS): 0
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Static Route: 192.168.0.0/24 Next Hop: 192.168.0.0
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Static Route: 192.168.3.0/24 Next Hop: 192.168.3.0
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Forbid Default Route: yes
Dec 24 20:22:33 test3 pppd[2848]: Script /etc/ppp/ip-up started (pid 2859)
Dec 24 20:22:33 test3 NetworkManager[860]: <info> Internal DNS: 192.168.0.24
Dec 24 20:22:33 test3 NetworkManager[860]: <info> DNS Domain: '(none)'
Dec 24 20:22:33 test3 NetworkManager[860]: <info> No IPv6 configuration
Dec 24 20:22:33 test3 pppd[2848]: Script /etc/ppp/ip-up finished (pid 2859), status = 0x0
Dec 24 20:22:34 test3 NetworkManager[860]: <info> VPN connection 'VPN-соединение 1' (IP Config Get) complete.
Dec 24 20:22:34 test3 NetworkManager[860]: <info> Policy set 'Проводное соединение 2' (eth2) as default for IPv4 routing and DNS.
Dec 24 20:22:34 test3 NetworkManager[860]: <info> Writing DNS information to /sbin/resolvconf
Dec 24 20:22:35 test3 dbus[584]: [system] Activating service name='org.freedesktop.nm_dispatcher' (using servicehelper)
Dec 24 20:22:35 test3 NetworkManager[860]: <info> VPN plugin state changed: started (4)
Dec 24 20:22:35 test3 dbus[584]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Dec 24 20:22:47 test3 ntpdate[2946]: adjust time server 91.189.94.4 offset -0.019962 sec
Dec 24 20:23:03 test3 pppd[2848]: sent [LCP EchoReq id=0x1 magic=0x9428a335]
Dec 24 20:23:03 test3 pppd[2848]: rcvd [LCP EchoRep id=0x1 magic=0x1f0adc14]
Dec 24 20:23:27 test3 pppd[2848]: rcvd [LCP EchoReq id=0x2 magic=0x1f0adc14]
Dec 24 20:23:27 test3 pppd[2848]: sent [LCP EchoRep id=0x2 magic=0x9428a335]
Dec 24 20:23:33 test3 pppd[2848]: sent [LCP EchoReq id=0x2 magic=0x9428a335]
Dec 24 20:23:33 test3 pppd[2848]: rcvd [LCP EchoRep id=0x2 magic=0x1f0adc14]
Dec 24 20:24:03 test3 pppd[2848]: sent [LCP EchoReq id=0x3 magic=0x9428a335]