-
Notifications
You must be signed in to change notification settings - Fork 19
Open
Description
Hello,
I've got a problem with l2tp connection on my newly installed Ubuntu
$ cat /etc/os-release
PRETTY_NAME="Ubuntu 24.04.1 LTS"
$ sudo apt-get install network-manager-l2tp network-manager-l2tp-gnome
$ ipsec --version
Linux strongSwan U5.9.13/K6.8.0-45-generic
from ubuntu 22.04 (with xl2tpd) connection established successfully.
I was advised here: NetworkManager-l2tp, and reveting l2tp daemon from kl2tpd to the xl2tpd solved my problem.
sudo apt install xl2tpd
sudo apt purge go-l2tp
Could you help me to connect with the default daemon kl2tpd?
my log of kl2tpd connection (VPN server - Keenatic Peak), I googled nothing for message="failed to send SCCRQ message":
NetworkManager[914]: <info> [1727172563.6346] vpn[0x57971b24fdb0,90e7b805-c712-4f76-8e3e-8213353f9e1e,"VPN 1"]: starting l2tp
NetworkManager[914]: <info> [1727172563.6351] audit: op="connection-activate" uuid="90e7b805-c712-4f76-8e3e-8213353f9e1e" name="VPN 1" pid=1592 uid=1000 result="success"
NetworkManager[9605]: Stopping strongSwan IPsec failed: starter is not running
NetworkManager[9602]: Starting strongSwan 5.9.13 IPsec [starter]...
ipsec_starter[9602]: Starting strongSwan 5.9.13 IPsec [starter]...
NetworkManager[9602]: Loading config setup
NetworkManager[9602]: Loading conn '90e7b805-c712-4f76-8e3e-8213353f9e1e'
ipsec_starter[9602]: Loading config setup
ipsec_starter[9602]: Loading conn '90e7b805-c712-4f76-8e3e-8213353f9e1e'
ipsec_starter[9613]: Attempting to start charon...
charon[9614]: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.13, Linux 6.8.0-45-generic, x86_64)
charon[9614]: 00[LIB] providers loaded by OpenSSL: legacy default
charon[9614]: 00[CFG] using '/sbin/resolvconf' to install DNS servers
charon[9614]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
charon[9614]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
charon[9614]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
charon[9614]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
charon[9614]: 00[CFG] loading crls from '/etc/ipsec.d/crls'
charon[9614]: 00[CFG] loading secrets from '/etc/ipsec.secrets'
charon[9614]: 00[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
charon[9614]: 00[CFG] loaded IKE secret for %any
charon[9614]: 00[LIB] loaded plugins: charon aesni aes rc2 sha2 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp agent xcbc hmac kdf gcm drbg attr kernel-netlink resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic counters
charon[9614]: 00[LIB] dropped capabilities, running as uid 0, gid 0
charon[9614]: 00[JOB] spawning 16 worker threads
ipsec_starter[9613]: charon (9614) started after 40 ms
charon[9614]: 09[CFG] received stroke: add connection '90e7b805-c712-4f76-8e3e-8213353f9e1e'
charon[9614]: 17[LIB] resolving '(null)' failed: Name or service not known
charon[9614]: 09[CFG] left nor right host is our side, assuming left=local
charon[9614]: 09[CFG] added configuration '90e7b805-c712-4f76-8e3e-8213353f9e1e'
charon[9614]: 11[CFG] rereading secrets
charon[9614]: 11[CFG] loading secrets from '/etc/ipsec.secrets'
charon[9614]: 11[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
charon[9614]: 11[CFG] loaded IKE secret for %any
charon[9614]: 13[CFG] received stroke: initiate '90e7b805-c712-4f76-8e3e-8213353f9e1e'
charon[9614]: 17[LIB] resolving '(null)' failed: Name or service not known
charon[9614]: 15[IKE] initiating Main Mode IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] to {VPN_SERVER_IP}
charon[9614]: 15[IKE] initiating Main Mode IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] to {VPN_SERVER_IP}
charon[9614]: 15[ENC] generating ID_PROT request 0 [ SA V V V V V ]
charon[9614]: 15[NET] sending packet: from 0.0.0.0[500] to {VPN_SERVER_IP}[500] (532 bytes)
charon[9614]: 16[NET] received packet: from {VPN_SERVER_IP}[500] to 192.168.228.144[500] (144 bytes)
charon[9614]: 16[ENC] parsed ID_PROT response 0 [ SA V V V ]
charon[9614]: 16[IKE] received DPD vendor ID
charon[9614]: 16[IKE] received FRAGMENTATION vendor ID
charon[9614]: 16[IKE] received NAT-T (RFC 3947) vendor ID
charon[9614]: 16[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
charon[9614]: 16[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
charon[9614]: 16[NET] sending packet: from 192.168.228.144[500] to {VPN_SERVER_IP}[500] (244 bytes)
charon[9614]: 05[NET] received packet: from {VPN_SERVER_IP}[500] to 192.168.228.144[500] (244 bytes)
charon[9614]: 05[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
charon[9614]: 05[IKE] local host is behind NAT, sending keep alives
charon[9614]: 05[ENC] generating ID_PROT request 0 [ ID HASH ]
charon[9614]: 05[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (68 bytes)
charon[9614]: 06[NET] received packet: from {VPN_SERVER_IP}[4500] to 192.168.228.144[4500] (68 bytes)
charon[9614]: 06[ENC] parsed ID_PROT response 0 [ ID HASH ]
charon[9614]: 06[IKE] IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] established between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
charon[9614]: 06[IKE] IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] established between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
charon[9614]: 06[IKE] scheduling reauthentication in 9990s
charon[9614]: 06[IKE] maximum IKE_SA lifetime 10530s
charon[9614]: 06[ENC] generating QUICK_MODE request 66717060 [ HASH SA No ID ID NAT-OA NAT-OA ]
charon[9614]: 06[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (244 bytes)
charon[9614]: 07[NET] received packet: from {VPN_SERVER_IP}[4500] to 192.168.228.144[4500] (196 bytes)
charon[9614]: 07[ENC] parsed QUICK_MODE response 66717060 [ HASH SA No ID ID NAT-OA NAT-OA ]
charon[9614]: 07[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
charon[9614]: 07[IKE] CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} established with SPIs c75cb7cf_i cc6f3d6f_o and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
charon[9614]: 07[IKE] CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} established with SPIs c75cb7cf_i cc6f3d6f_o and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
charon[9614]: 07[ENC] generating QUICK_MODE request 66717060 [ HASH ]
charon[9614]: 07[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (60 bytes)
NetworkManager[9655]: initiating Main Mode IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] to {VPN_SERVER_IP}
NetworkManager[9655]: generating ID_PROT request 0 [ SA V V V V V ]
NetworkManager[9655]: sending packet: from 0.0.0.0[500] to {VPN_SERVER_IP}[500] (532 bytes)
NetworkManager[9655]: received packet: from {VPN_SERVER_IP}[500] to 192.168.228.144[500] (144 bytes)
NetworkManager[9655]: parsed ID_PROT response 0 [ SA V V V ]
NetworkManager[9655]: received DPD vendor ID
NetworkManager[9655]: received FRAGMENTATION vendor ID
NetworkManager[9655]: received NAT-T (RFC 3947) vendor ID
NetworkManager[9655]: selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
NetworkManager[9655]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
NetworkManager[9655]: sending packet: from 192.168.228.144[500] to {VPN_SERVER_IP}[500] (244 bytes)
NetworkManager[9655]: received packet: from {VPN_SERVER_IP}[500] to 192.168.228.144[500] (244 bytes)
NetworkManager[9655]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
NetworkManager[9655]: local host is behind NAT, sending keep alives
NetworkManager[9655]: generating ID_PROT request 0 [ ID HASH ]
NetworkManager[9655]: sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (68 bytes)
NetworkManager[9655]: received packet: from {VPN_SERVER_IP}[4500] to 192.168.228.144[4500] (68 bytes)
NetworkManager[9655]: parsed ID_PROT response 0 [ ID HASH ]
NetworkManager[9655]: IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] established between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
NetworkManager[9655]: scheduling reauthentication in 9990s
NetworkManager[9655]: maximum IKE_SA lifetime 10530s
NetworkManager[9655]: generating QUICK_MODE request 66717060 [ HASH SA No ID ID NAT-OA NAT-OA ]
NetworkManager[9655]: sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (244 bytes)
NetworkManager[9655]: received packet: from {VPN_SERVER_IP}[4500] to 192.168.228.144[4500] (196 bytes)
NetworkManager[9655]: parsed QUICK_MODE response 66717060 [ HASH SA No ID ID NAT-OA NAT-OA ]
NetworkManager[9655]: selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
NetworkManager[9655]: CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} established with SPIs c75cb7cf_i cc6f3d6f_o and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
NetworkManager[9655]: generating QUICK_MODE request 66717060 [ HASH ]
NetworkManager[9655]: connection '90e7b805-c712-4f76-8e3e-8213353f9e1e' established successfully
nm-l2tp-service[9590]: strongSwan IPsec connection is up.
nm-l2tp-service[9590]: kl2tpd started with pid 9661
NetworkManager[9661]: level=info tunnel_name=t1 session_name=s1 message="new dynamic session" session_id=19715 peer_session_id=0 pseudowire=7
NetworkManager[9661]: level=info tunnel_name=t1 message="new dynamic tunnel" version=2 encap=UDP local= peer={VPN_SERVER_IP}:1701 tunnel_id=58056 peer_tunnel_id=0
NetworkManager[9661]: level=debug tunnel_name=t1 message="fsm event" event=open
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq ns=0 nr=0 isRetransmit=false
NetworkManager[9661]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeSccrq
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq ns=0 nr=0 isRetransmit=true
NetworkManager[9661]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeSccrq
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq ns=0 nr=0 isRetransmit=true
systemd-resolved[752]: Using degraded feature set UDP instead of UDP+EDNS0 for DNS server 192.168.228.75.
NetworkManager[9661]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeSccrq
NetworkManager[9661]: level=debug tunnel_name=t1 function=transport message="send complete" message_type=avpMsgTypeSccrq error="transmit of avpMsgTypeSccrq failed after 3 retry attempts"
NetworkManager[9661]: level=error tunnel_name=t1 function=transport message="socket read failed" error="resource temporarily unavailable"
NetworkManager[9661]: level=error tunnel_name=t1 message="failed to send SCCRQ message" error="transmit of avpMsgTypeSccrq failed after 3 retry attempts"
NetworkManager[9661]: level=error tunnel_name=t1 function=transport message="transport down" error="transmit of avpMsgTypeSccrq failed after 3 retry attempts"
NetworkManager[9661]: level=info tunnel_name=t1 message=close
NetworkManager[914]: <warn> [1727172584.0197] vpn[0x57971b24fdb0,90e7b805-c712-4f76-8e3e-8213353f9e1e,"VPN 1"]: dbus: failure: connect-failed (1)
NetworkManager[914]: <warn> [1727172584.0199] vpn[0x57971b24fdb0,90e7b805-c712-4f76-8e3e-8213353f9e1e,"VPN 1"]: dbus: failure: connect-failed (1)
NetworkManager[9670]: Stopping strongSwan IPsec...
charon[9614]: 00[DMN] SIGINT received, shutting down
charon[9614]: 00[IKE] closing CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} with SPIs c75cb7cf_i (0 bytes) cc6f3d6f_o (192 bytes) and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
charon[9614]: 00[IKE] closing CHILD_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e{1} with SPIs c75cb7cf_i (0 bytes) cc6f3d6f_o (192 bytes) and TS 192.168.228.144/32 === {VPN_SERVER_IP}/32[udp/l2f]
charon[9614]: 00[IKE] sending DELETE for ESP CHILD_SA with SPI c75cb7cf
charon[9614]: 00[ENC] generating INFORMATIONAL_V1 request 320293356 [ HASH D ]
charon[9614]: 00[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (76 bytes)
charon[9614]: 00[IKE] deleting IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
charon[9614]: 00[IKE] deleting IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1] between 192.168.228.144[(null)]...{VPN_SERVER_IP}[{VPN_SERVER_IP}]
charon[9614]: 00[IKE] sending DELETE for IKE_SA 90e7b805-c712-4f76-8e3e-8213353f9e1e[1]
charon[9614]: 00[ENC] generating INFORMATIONAL_V1 request 1277003383 [ HASH D ]
charon[9614]: 00[NET] sending packet: from 192.168.228.144[4500] to {VPN_SERVER_IP}[4500] (84 bytes)
ipsec_starter[9613]: child 9614 (charon) has quit (exit code 0)
ipsec_starter[9613]:
ipsec_starter[9613]: charon stopped after 200 ms
ipsec_starter[9613]: ipsec starter stopped
nm-l2tp-service[9590]: ipsec shut down
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels