Problem with gnome-pilot 2.0.15 on openSUSE 10.2



I have been struggling to get my Treo650 to sync with evolution on openSUSE 10.2. At this point the ppp0 link gets setup correctly and successfully but there never seems to be a hand-off to gpilotd so there never seems to be any sync activity.

Here what shows up in /var/log/messages:

Jan 22 18:56:38 kevlar dund[8523]: New connection from 00:07:E0:6A:2B:85
Jan 22 18:56:38 kevlar pppd[8525]: pppd 2.4.4 started by root, uid 0
Jan 22 18:56:38 kevlar pppd[8525]: Using interface ppp0
Jan 22 18:56:38 kevlar pppd[8525]: Connect: ppp0 <--> /dev/rfcomm1
Jan 22 18:56:42 kevlar pppd[8525]: not replacing default route to eth1 [20.20.20.1]
Jan 22 18:56:42 kevlar pppd[8525]: Cannot determine ethernet address for proxy ARP
Jan 22 18:56:42 kevlar pppd[8525]: local  IP address 10.30.30.3
Jan 22 18:56:42 kevlar pppd[8525]: remote IP address 10.30.30.2
Jan 22 18:56:42 kevlar racoon: DEBUG: netlink signals update interface address list
Jan 22 18:56:42 kevlar racoon: DEBUG: netlink signals update interface address list
Jan 22 18:56:42 kevlar racoon: DEBUG: netlink signals update interface address list
Jan 22 18:56:42 kevlar SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Jan 22 18:56:42 kevlar SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Jan 22 18:56:42 kevlar ip-up: SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Jan 22 18:56:42 kevlar SuSEfirewall2: batch committing...
Jan 22 18:56:42 kevlar SuSEfirewall2: Firewall rules successfully set
Jan 22 18:56:42 kevlar pppd[8525]: Script /etc/ppp/ip-up finished (pid 8532), status = 0x0
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: fe80::216:6fff:fe43:2660%eth1 (eth1)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: fe80::a425:ebff:fe27:c7de%dummy0 (dummy0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: ::1 (lo)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 10.30.30.3 (ppp0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 20.20.20.112 (eth1)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 10.20.30.1 (dummy0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 127.0.0.1 (lo)
Jan 22 18:56:47 kevlar racoon: DEBUG: configuring default isakmp port.
Jan 22 18:56:47 kevlar racoon: NOTIFY: NAT-T is enabled, autoconfiguring ports
Jan 22 18:56:47 kevlar racoon: DEBUG: 14 addrs are configured successfully
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[4500] used as isakmp port (fd=10)
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[500] used as isakmp port (fd=11)
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[4500] used as isakmp port (fd=12)
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[500] used as isakmp port (fd=13)
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[4500] used as isakmp port (fd=14)
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[500] used as isakmp port (fd=15)
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[4500] used as isakmp port (fd=16)
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: ::1[500] used as isakmp port (fd=17)
Jan 22 18:56:47 kevlar racoon: INFO: ::1[4500] used as isakmp port (fd=18)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::a425:ebff:fe27:c7de%dummy0[500] used as isakmp port (fd=19)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::a425:ebff:fe27:c7de%dummy0[4500] used as isakmp port (fd=20)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::216:6fff:fe43:2660%eth1[500] used as isakmp port (fd=21)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::216:6fff:fe43:2660%eth1[4500] used as isakmp port (fd=22)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: fe80::216:6fff:fe43:2660%eth1 (eth1)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: fe80::a425:ebff:fe27:c7de%dummy0 (dummy0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: ::1 (lo)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 10.30.30.3 (ppp0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 20.20.20.112 (eth1)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 10.20.30.1 (dummy0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 127.0.0.1 (lo)
Jan 22 18:56:47 kevlar racoon: DEBUG: configuring default isakmp port.
Jan 22 18:56:47 kevlar racoon: NOTIFY: NAT-T is enabled, autoconfiguring ports
Jan 22 18:56:47 kevlar racoon: DEBUG: 14 addrs are configured successfully
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[4500] used as isakmp port (fd=10)
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[500] used as isakmp port (fd=11)
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[4500] used as isakmp port (fd=12)
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[500] used as isakmp port (fd=13)
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[4500] used as isakmp port (fd=14)
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[500] used as isakmp port (fd=15)
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[4500] used as isakmp port (fd=16)
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: ::1[500] used as isakmp port (fd=17)
Jan 22 18:56:47 kevlar racoon: INFO: ::1[4500] used as isakmp port (fd=18)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::a425:ebff:fe27:c7de%dummy0[500] used as isakmp port (fd=19)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::a425:ebff:fe27:c7de%dummy0[4500] used as isakmp port (fd=20)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::216:6fff:fe43:2660%eth1[500] used as isakmp port (fd=21)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::216:6fff:fe43:2660%eth1[4500] used as isakmp port (fd=22)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: fe80::216:6fff:fe43:2660%eth1 (eth1)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: fe80::a425:ebff:fe27:c7de%dummy0 (dummy0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: ::1 (lo)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 10.30.30.3 (ppp0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 20.20.20.112 (eth1)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 10.20.30.1 (dummy0)
Jan 22 18:56:47 kevlar racoon: DEBUG: my interface: 127.0.0.1 (lo)
Jan 22 18:56:47 kevlar racoon: DEBUG: configuring default isakmp port.
Jan 22 18:56:47 kevlar racoon: NOTIFY: NAT-T is enabled, autoconfiguring ports
Jan 22 18:56:47 kevlar racoon: DEBUG: 14 addrs are configured successfully
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[4500] used as isakmp port (fd=10)
Jan 22 18:56:47 kevlar racoon: INFO: 127.0.0.1[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[500] used as isakmp port (fd=11)
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[4500] used as isakmp port (fd=12)
Jan 22 18:56:47 kevlar racoon: INFO: 10.20.30.1[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[500] used as isakmp port (fd=13)
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[4500] used as isakmp port (fd=14)
Jan 22 18:56:47 kevlar racoon: INFO: 20.20.20.112[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[500] used as isakmp port (fd=15)
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[4500] used as isakmp port (fd=16)
Jan 22 18:56:47 kevlar racoon: INFO: 10.30.30.3[4500] used for NAT-T
Jan 22 18:56:47 kevlar racoon: INFO: ::1[500] used as isakmp port (fd=17)
Jan 22 18:56:47 kevlar racoon: INFO: ::1[4500] used as isakmp port (fd=18)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::a425:ebff:fe27:c7de%dummy0[500] used as isakmp port (fd=19)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::a425:ebff:fe27:c7de%dummy0[4500] used as isakmp port (fd=20)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::216:6fff:fe43:2660%eth1[500] used as isakmp port (fd=21)
Jan 22 18:56:47 kevlar racoon: INFO: fe80::216:6fff:fe43:2660%eth1[4500] used as isakmp port (fd=22)
Jan 22 18:56:47 kevlar ip-up: postqueue: fatal: Cannot flush mail queue - mail system is down
Jan 22 18:57:23 kevlar pppd[8525]: IPCP terminated by peer
Jan 22 18:57:23 kevlar pppd[8525]: Connect time 0.7 minutes.
Jan 22 18:57:23 kevlar pppd[8525]: Sent 0 bytes, received 301 bytes.
Jan 22 18:57:23 kevlar racoon: DEBUG: netlink signals update interface address list
Jan 22 18:57:23 kevlar pppd[8525]: LCP terminated by peer
Jan 22 18:57:23 kevlar pppd[8525]: Hangup (SIGHUP)
Jan 22 18:57:23 kevlar pppd[8525]: Modem hangup
Jan 22 18:57:23 kevlar pppd[8525]: Connection terminated.
Jan 22 18:57:23 kevlar racoon: DEBUG: netlink signals update interface address list
Jan 22 18:57:23 kevlar ip-down: SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Jan 22 18:57:23 kevlar SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Jan 22 18:57:23 kevlar SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Jan 22 18:57:23 kevlar SuSEfirewall2: batch committing...
Jan 22 18:57:23 kevlar SuSEfirewall2: Firewall rules successfully set
Jan 22 18:57:23 kevlar pppd[8525]: Script /etc/ppp/ip-down finished (pid 8657), status = 0x0
Jan 22 18:57:23 kevlar pppd[8525]: Exit.

Is there anything I can do to further investigate why gpilot never gets any handoff from the ppp0 link?

Any help/suggestions appreciated!

Thanks,


Martin

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]