<html dir="ltr"><head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css">DIV {
        MARGIN: 0px
}
</style>
<meta content="MSHTML 6.00.6000.16890" name="GENERATOR">
<style title="owaParaStyle"><!--P {
        MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px
}
--></style>
</head>
<body ocsi="x">
<div dir="ltr"><font face="Tahoma" color="#000000" size="2"><font face="Times New Roman">Hi.</font></font></div>
<div dir="ltr"><font face="Tahoma" color="#000000" size="2"><font face="Times New Roman"></font></font> </div>
<div dir="ltr"><font face="times new roman" size="2">Using</font></div>
<div dir="ltr"><font face="times new roman" size="2"></font> </div>
<div dir="ltr"><font face="Tahoma" color="#000000" size="2"><font face="Times New Roman">listen-addr = 192.168.0.1</font><br>
</div>
</font>
<div dir="ltr"><font face="tahoma" size="2">Just checked my setup and without giving listen-addr it does no longer work. So uncommenting listen-add might do the trick.</font></div>
<div dir="ltr"><font face="tahoma" size="2"></font> </div>
<div dir="ltr"><font face="tahoma" size="2">HTH</font></div>
<div dir="ltr"><font face="tahoma" size="2"></font> </div>
<div dir="ltr"><font face="tahoma" size="2">Michael Karlinsky</font></div>
<div dir="ltr"><font face="tahoma" size="2"></font> </div>
<div id="divRpF472965" style="DIRECTION: ltr">
<hr tabindex="-1">
<font face="Tahoma" size="2"><b>From:</b> users-bounces@openswan.org [users-bounces@openswan.org] On Behalf Of Ronald [loloski@yahoo.com]<br>
<b>Sent:</b> Thursday, January 07, 2010 8:07 PM<br>
<b>To:</b> users@openswan.org<br>
<b>Subject:</b> [Openswan Users] ipsec + xl2tpd + maximum retries exceeded<br>
</font><br>
</div>
<div></div>
<div>
<div style="FONT-SIZE: 10pt; FONT-FAMILY: times new roman,new york,times,serif">
<div>Hi List,</div>
<div> </div>
<div>I have a centos 5.4 + xl2tpd 1.2.5 compiled from source, openswan stock from centos 5.4 2.6.21</div>
<div> </div>
<div>ipsec was able to established, but an error in xl2tpd with maximum retries exceed appears on log file this is</div>
<div>the same config i have on different machine before without a hiccup. can some one shed some light thanks in advance</div>
<div> </div>
<div> </div>
<div>please find the following excerpt log,</div>
<div> </div>
<div>Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: responding to Quick Mode proposal {msgid:01000000}<br>
Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: us: 222.xx.xx.162<222.xx.xx.162>[+S=C]:17/1701---222.xx.xx.161<br>
Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: them: 58.69.86.62[192.168.2.254,+S=C]:17/1701===192.168.2.254/32<br>
Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1<br>
Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2<br>
Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2<br>
Jan 8 03:02:29 tcmr pluto[10436]: "roadwarrior-l2tp"[1] 58.69.86.62 #2: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=>0x0589839b <0xdfb44f01 xfrm=AES_128-HMAC_SHA1 NATOA=192.168.2.254 NATD=58.69.86.62:4500 DPD=none}</div>
<div> </div>
<div>Jan 8 02:36:08 tcmr xl2tpd[6518]: Maximum retries exceeded for tunnel 1127. Closing.<br>
Jan 8 02:45:04 tcmr xl2tpd[6518]: Connection 63 closed to 58.69.86.62, port 1701 (Timeout)<br>
Jan 8 02:45:09 tcmr xl2tpd[6518]: Maximum retries exceeded for tunnel 5511. Closing.</div>
<div> </div>
<div>my config snippet is</div>
<div> </div>
<div>version 2.0 # conforms to second version of ipsec.conf specification<br>
config setup<br>
interfaces=%defaultroute<br>
klipsdebug=none<br>
plutodebug=none<br>
nat_traversal=yes<br>
virtual_private=%v4:192.168.0.0/24,%v4:192.168.1.0/24,%v4:192.168.2.0/24<br>
protostack=netkey<br>
oe=off</div>
<div>conn %default<br>
keyingtries=3<br>
disablearrivalcheck=no<br>
authby=secret<br>
type=tunnel<br>
keyexchange=ike<br>
ikelifetime=240m<br>
keylife=60m</div>
<div>conn roadwarrior-net<br>
leftsubnet=192.168.0.0/24<br>
also=roadwarrior</div>
<div>conn roadwarrior-all<br>
leftsubnet=0.0.0.0/0<br>
also=roadwarrior</div>
<div>conn roadwarrior-l2tp<br>
leftprotoport=17/1701<br>
rightprotoport=17/%any<br>
also=roadwarrior</div>
<div>conn roadwarrior<br>
pfs=no<br>
left=222.xxx.xxx.162<br>
leftnexthop=222.xx.xx.161<br>
right=%any<br>
rightsubnet=vhost:%no,%priv<br>
auto=add<br>
</div>
<div> </div>
<div>[global]<br>
port=1701<br>
;listen-addr = 192.168.0.1<br>
;<br>
; requires openswan-3.1 or higher<br>
;ipsec saref = yes<br>
;<br>
debug tunnel = yes</div>
<div>[lns default]<br>
ip range = 192.168.0.180-192.168.0.185<br>
local ip = 192.168.0.1<br>
require chap = yes<br>
refuse pap = yes<br>
require authentication = yes<br>
name = LinuxVPNserver<br>
ppp debug = yes<br>
pppoptfile = /etc/ppp/options.xl2tpd<br>
length bit = yes<br>
</div>
</div>
<br>
</div>
</body>
</html>