Ticket ID: SIXXS #12001401 Ticket Status: User PoP: czprg01 - Ignum, s.r.o. (Prague)
czprg01 - heartbeat connection refused
Shadow Hawkins on Friday, 18 July 2014 20:46:38
Hello,
I was succesfuly operated tunnel T131242 about 300 days (to Prague pop with hearbeats). Today it suddenly torn down.
It seems that pop is not receiving my heartbeats, but I am using cisco 800 to terminate the tunnel and to generate heartbeats (by tcl script).
I was trying to generate heartbeat from PC on the LAN, but when I try to connect to pop server on port 3740 it is refused:
netcat -c -u 217.31.57.16 3740
(UNKNOWN) [217.31.57.16] 3740 (?) : Connection refused
In wireshark I can see sending TCP SYN and receiving TCP RST from 217.31.57.16.
Ping to 217.31.57.16 is OK.
Maybe something wrong with pop server czprg01?
Thanks
Matej
State change: user
Jeroen Massar on Saturday, 19 July 2014 08:02:13
The state of this ticket has been changed to user
czprg01 - heartbeat connection refused
Jeroen Massar on Saturday, 19 July 2014 08:05:29 In wireshark I can see sending TCP SYN and receiving TCP RST from 217.31.57.16.
Heartbeat is UDP based, not TCP.
czprg01 - heartbeat connection refused
Shadow Hawkins on Sunday, 20 July 2014 20:58:22
Hi Jeroen,
you are right, its UDP.
However, problem with my tunnel was related to my router, which stops generating heartbeats. After reload it works (sorry for that, nothing from logs indicated that cron or something not work).
While I was testing generating hearbeat from my PC, I used this scipt:
https://www.sixxs.net/archive/sixxs/heartbeat/heartbeat.sh
Netcat is used to sent heartbeat packet:
echo -n "..."|netcat -c -w 1 -u "$remotev4" 3740
But with netcat in debian or nmap/ncat this doesnt work.
"-c" parameter should be avoided, otherwise it doesnt sent any packet.
Thanks
Matej
czprg01 - heartbeat connection refused
Jeroen Massar on Sunday, 20 July 2014 21:10:55
Please discuss third party scripts and hacks in the forums, when we are not the author there is little we can do about them.
Posting is only allowed when you are logged in. |