Skip to content

Unable to connect to L2TP+IPSec from Ubuntu 24.04 with kl2tpd  #8

@amkrivenya

Description

@amkrivenya

Hello,

I've got a problem with l2tp connection on my newly installed Ubuntu

$ cat /etc/os-release 
PRETTY_NAME="Ubuntu 24.04.1 LTS"

$ sudo apt-get install network-manager-l2tp network-manager-l2tp-gnome

$ ipsec --version
Linux strongSwan U5.9.13/K6.8.0-45-generic

from ubuntu 22.04 (with xl2tpd) connection established successfully.

I was advised here: NetworkManager-l2tp, and reveting l2tp daemon from kl2tpd to the xl2tpd solved my problem.

sudo apt install xl2tpd  
sudo apt purge go-l2tp

Could you help me to connect with the default daemon kl2tpd?

my log of kl2tpd connection (VPN server - Keenatic Peak), I googled nothing for message="failed to send SCCRQ message":

NetworkManager[914]: <info>  [1727172563.6346] vpn[0x57971b24fdb0,90e7b805-c712-4f76-8e3e-8213353f9e1e,"VPN 1"]: starting l2tp
NetworkManager[914]: <info>  [1727172563.6351] audit: op="connection-activate" uuid="90e7b805-c712-4f76-8e3e-8213353f9e1e" name="VPN 1" pid=1592 uid=1000 result="success"
NetworkManager[9605]: Stopping strongSwan IPsec failed: starter is not running
NetworkManager[9602]: Starting strongSwan 5.9.13 IPsec [starter]...
ipsec_starter[9602]: Starting strongSwan 5.9.13 IPsec [starter]...
NetworkManager[9602]: Loading config setup
NetworkManager[9602]: Loading conn '90e7b805-c712-4f76-8e3e-8213353f9e1e'
ipsec_starter[9602]: Loading config setup
ipsec_starter[9602]: Loading conn '90e7b805-c712-4f76-8e3e-8213353f9e1e'
ipsec_starter[9613]: Attempting to start charon...
charon[9614]: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.13, Linux 6.8.0-45-generic, x86_64)
charon[9614]: 00[LIB] providers loaded by OpenSSL: legacy default
charon[9614]: 00[CFG] using '/sbin/resolvconf' to install DNS servers
charon[9614]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
charon[9614]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
charon[9614]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
charon[9614]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
charon[9614]: 00[CFG] loading crls from '/etc/ipsec.d/crls'
charon[9614]: 00[CFG] loading secrets from '/etc/ipsec.secrets'
charon[9614]: 00[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
charon[9614]: 00[CFG]   loaded IKE secret for %any
charon[9614]: 00[LIB] loaded plugins: charon aesni aes rc2 sha2 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp agent xcbc hmac kdf gcm drbg attr kernel-netlink resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic counters
charon[9614]: 00[LIB] dropped capabilities, running as uid 0, gid 0
charon[9614]: 00[JOB] spawning 16 worker threads
ipsec_starter[9613]: charon (9614) started after 40 ms
charon[9614]: 09[CFG] received stroke: add connection '90e7b805-c712-4f76-8e3e-8213353f9e1e'
charon[9614]: 17[LIB] resolving '(null)' failed: Name or service not known
charon[9614]: 09[CFG] left nor right host is our side, assuming left=local
charon[9614]: 09[CFG] added configuration '90e7b805-c712-4f76-8e3e-8213353f9e1e'
charon[9614]: 11[CFG] rereading secrets
charon[9614]: 11[CFG] loading secrets from '/etc/ipsec.secrets'
charon[9614]: 11[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
charon[9614]: 11[CFG]   loaded IKE secret for %any
charon[9614]: 13[CFG] received stroke: initiate '90e7b805-c712-4f76-8e3e-8213353f9e1e'
charon[9614]: 17[LIB] resolving '(null)' failed: Name or service not known
charon[9614]: 15[IKE] initiating Main Mode IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] to {VPN_SERVER_IP}
charon[9614]: 15[IKE] initiating Main Mode IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] to {VPN_SERVER_IP}
charon[9614]: 15[ENC] generating ID_PROT request 0 [ SA V V V V V ]
charon[9614]: 15[NET] sending packet: from 0.0.0.0[500] to {VPN_SERVER_IP}[500] (532 bytes)
charon[9614]: 16[NET] received packet: from {VPN_SERVER_IP}[500] to 192.168.228.144[500] (144 bytes)
charon[9614]: 16[ENC] parsed ID_PROT response 0 [ SA V V V ]
charon[9614]: 16[IKE] received DPD vendor ID
charon[9614]: 16[IKE] received FRAGMENTATION vendor ID
charon[9614]: 16[IKE] received NAT-T (RFC 3947) vendor ID
charon[9614]: 16[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
charon[9614]: 16[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
charon[9614]: 16[NET] sending packet: from 192.168.228.144[500] to {VPN_SERVER_IP}[500] (244 bytes)
charon[9614]: 05[NET] received packet: from {VPN_SERVER_IP}[500] to 192.168.228.144[500] (244 bytes)
charon[9614]: 05[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
charon[9614]: 05[IKE] local host is behind NAT, sending keep alives
charon[9614]: 05[ENC] generating ID_PROT request 0 [ ID HASH ]
charon[9614]: 05[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (68 bytes)
charon[9614]: 06[NET] received packet: from {VPN_SERVER_IP}[4500] to 192.168.228.144[4500] (68 bytes)
charon[9614]: 06[ENC] parsed ID_PROT response 0 [ ID HASH ]
charon[9614]: 06[IKE] IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] established between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
charon[9614]: 06[IKE] IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] established between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
charon[9614]: 06[IKE] scheduling reauthentication in 9990s
charon[9614]: 06[IKE] maximum IKE_SA lifetime 10530s
charon[9614]: 06[ENC] generating QUICK_MODE request 66717060 [ HASH SA No ID ID NAT-OA NAT-OA ]
charon[9614]: 06[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (244 bytes)
charon[9614]: 07[NET] received packet: from {VPN_SERVER_IP}[4500] to 192.168.228.144[4500] (196 bytes)
charon[9614]: 07[ENC] parsed QUICK_MODE response 66717060 [ HASH SA No ID ID NAT-OA NAT-OA ]
charon[9614]: 07[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
charon[9614]: 07[IKE] CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} established with SPIs c75cb7cf_i cc6f3d6f_o and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
charon[9614]: 07[IKE] CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} established with SPIs c75cb7cf_i cc6f3d6f_o and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
charon[9614]: 07[ENC] generating QUICK_MODE request 66717060 [ HASH ]
charon[9614]: 07[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (60 bytes)
NetworkManager[9655]: initiating Main Mode IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] to {VPN_SERVER_IP}
NetworkManager[9655]: generating ID_PROT request 0 [ SA V V V V V ]
NetworkManager[9655]: sending packet: from 0.0.0.0[500] to {VPN_SERVER_IP}[500] (532 bytes)
NetworkManager[9655]: received packet: from {VPN_SERVER_IP}[500] to 192.168.228.144[500] (144 bytes)
NetworkManager[9655]: parsed ID_PROT response 0 [ SA V V V ]
NetworkManager[9655]: received DPD vendor ID
NetworkManager[9655]: received FRAGMENTATION vendor ID
NetworkManager[9655]: received NAT-T (RFC 3947) vendor ID
NetworkManager[9655]: selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
NetworkManager[9655]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
NetworkManager[9655]: sending packet: from 192.168.228.144[500] to {VPN_SERVER_IP}[500] (244 bytes)
NetworkManager[9655]: received packet: from {VPN_SERVER_IP}[500] to 192.168.228.144[500] (244 bytes)
NetworkManager[9655]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
NetworkManager[9655]: local host is behind NAT, sending keep alives
NetworkManager[9655]: generating ID_PROT request 0 [ ID HASH ]
NetworkManager[9655]: sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (68 bytes)
NetworkManager[9655]: received packet: from {VPN_SERVER_IP}[4500] to 192.168.228.144[4500] (68 bytes)
NetworkManager[9655]: parsed ID_PROT response 0 [ ID HASH ]
NetworkManager[9655]: IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] established between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
NetworkManager[9655]: scheduling reauthentication in 9990s
NetworkManager[9655]: maximum IKE_SA lifetime 10530s
NetworkManager[9655]: generating QUICK_MODE request 66717060 [ HASH SA No ID ID NAT-OA NAT-OA ]
NetworkManager[9655]: sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (244 bytes)
NetworkManager[9655]: received packet: from {VPN_SERVER_IP}[4500] to 192.168.228.144[4500] (196 bytes)
NetworkManager[9655]: parsed QUICK_MODE response 66717060 [ HASH SA No ID ID NAT-OA NAT-OA ]
NetworkManager[9655]: selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
NetworkManager[9655]: CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} established with SPIs c75cb7cf_i cc6f3d6f_o and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
NetworkManager[9655]: generating QUICK_MODE request 66717060 [ HASH ]
NetworkManager[9655]: connection '90e7b805-c712-4f76-8e3e-8213353f9e1e' established successfully
nm-l2tp-service[9590]: strongSwan IPsec connection is up.
nm-l2tp-service[9590]: kl2tpd started with pid 9661
NetworkManager[9661]: level=info tunnel_name=t1 session_name=s1 message="new dynamic session" session_id=19715 peer_session_id=0 pseudowire=7
NetworkManager[9661]: level=info tunnel_name=t1 message="new dynamic tunnel" version=2 encap=UDP local= peer={VPN_SERVER_IP}:1701 tunnel_id=58056 peer_tunnel_id=0
NetworkManager[9661]: level=debug tunnel_name=t1 message="fsm event" event=open
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq ns=0 nr=0 isRetransmit=false
NetworkManager[9661]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeSccrq
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq ns=0 nr=0 isRetransmit=true
NetworkManager[9661]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeSccrq
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq ns=0 nr=0 isRetransmit=true
systemd-resolved[752]: Using degraded feature set UDP instead of UDP+EDNS0 for DNS server 192.168.228.75.
NetworkManager[9661]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeSccrq
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message="send complete" message_type=avpMsgTypeSccrq error="transmit of avpMsgTypeSccrq failed after 3 retry attempts"
NetworkManager[9661]: level=error tunnel_name=t1 function=transport message="socket read failed" error="resource temporarily unavailable"
NetworkManager[9661]: level=error tunnel_name=t1 message="failed to send SCCRQ message" error="transmit of avpMsgTypeSccrq failed after 3 retry attempts"
NetworkManager[9661]: level=error tunnel_name=t1 function=transport message="transport down" error="transmit of avpMsgTypeSccrq failed after 3 retry attempts"
NetworkManager[9661]: level=info tunnel_name=t1 message=close
NetworkManager[914]: <warn>  [1727172584.0197] vpn[0x57971b24fdb0,90e7b805-c712-4f76-8e3e-8213353f9e1e,"VPN 1"]: dbus: failure: connect-failed (1)
NetworkManager[914]: <warn>  [1727172584.0199] vpn[0x57971b24fdb0,90e7b805-c712-4f76-8e3e-8213353f9e1e,"VPN 1"]: dbus: failure: connect-failed (1)
NetworkManager[9670]: Stopping strongSwan IPsec...
charon[9614]: 00[DMN] SIGINT received, shutting down
charon[9614]: 00[IKE] closing CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} with SPIs c75cb7cf_i (0 bytes) cc6f3d6f_o (192 bytes) and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
charon[9614]: 00[IKE] closing CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} with SPIs c75cb7cf_i (0 bytes) cc6f3d6f_o (192 bytes) and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
charon[9614]: 00[IKE] sending DELETE for ESP CHILD_SA with SPI c75cb7cf
charon[9614]: 00[ENC] generating INFORMATIONAL_V1 request 320293356 [ HASH D ]
charon[9614]: 00[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (76 bytes)
charon[9614]: 00[IKE] deleting IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
charon[9614]: 00[IKE] deleting IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
charon[9614]: 00[IKE] sending DELETE for IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1]
charon[9614]: 00[ENC] generating INFORMATIONAL_V1 request 1277003383 [ HASH D ]
charon[9614]: 00[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (84 bytes)
ipsec_starter[9613]: child 9614 (charon) has quit (exit code 0)
ipsec_starter[9613]: 
ipsec_starter[9613]: charon stopped after 200 ms
ipsec_starter[9613]: ipsec starter stopped
nm-l2tp-service[9590]: ipsec shut down

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions