[Openswan Users] VPN Transport Mode, Windows 7, xl2tpd, openswan - setup feasibility check

Simon Deziel simon at xelerance.com
Sun Oct 7 18:01:32 EDT 2012


For l2tp logs, you can try to look in one of those:

/var/log/syslog
/var/log/daemon
/var/log/messages

Simon

On 12-10-06 06:00 PM, Karl wrote:
> Hi,
> 
>  
> 
> thanks for the tip. I set the registry key but the error remains. The
> tunnel is established in State-quick-r2 but in windows I can see the
> window “verify username and password” for 0.5 seconds and the error
> windows with message “Error 619 …” comes up.
> 
>  
> 
> // pluto.log //
> 
> packet from 2.204.210.70:54963: received Vendor ID payload [RFC 3947]
> method set to=115
> 
> packet from 2.204.210.70:54963: received Vendor ID payload
> [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
> 
> packet from 2.204.210.70:54963: ignoring Vendor ID payload [FRAGMENTATION]
> 
> packet from 2.204.210.70:54963: ignoring Vendor ID payload
> [MS-Negotiation Discovery Capable]
> 
> packet from 2.204.210.70:54963: ignoring Vendor ID payload
> [Vid-Initial-Contact]
> 
> packet from 2.204.210.70:54963: ignoring Vendor ID payload [IKE CGA
> version 1]
> 
> "vpnhome"[15] 2.204.210.70 #15: responding to Main Mode from unknown
> peer 2.204.210.70
> 
> "vpnhome"[15] 2.204.210.70 #15: OAKLEY_GROUP 20 not supported. 
> Attribute OAKLEY_GROUP_DESCRIPTION
> 
> "vpnhome"[15] 2.204.210.70 #15: OAKLEY_GROUP 19 not supported. 
> Attribute OAKLEY_GROUP_DESCRIPTION
> 
> "vpnhome"[15] 2.204.210.70 #15: transition from state STATE_MAIN_R0 to
> state STATE_MAIN_R1
> 
> "vpnhome"[15] 2.204.210.70 #15: STATE_MAIN_R1: sent MR1, expecting MI2
> 
> "vpnhome"[15] 2.204.210.70 #15: NAT-Traversal: Result using
> draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
> 
> "vpnhome"[15] 2.204.210.70 #15: transition from state STATE_MAIN_R1 to
> state STATE_MAIN_R2
> 
> "vpnhome"[15] 2.204.210.70 #15: STATE_MAIN_R2: sent MR2, expecting MI3
> 
> "vpnhome"[15] 2.204.210.70 #15: Main mode peer ID is ID_IPV4_ADDR:
> '10.0.0.2'
> 
> "vpnhome"[15] 2.204.210.70 #15: switched from "vpnhome" to "vpnhome"
> 
> "vpnhome"[16] 2.204.210.70 #15: deleting connection "vpnhome" instance
> with peer 2.204.210.70 {isakmp=#0/ipsec=#0}
> 
> "vpnhome"[16] 2.204.210.70 #15: transition from state STATE_MAIN_R2 to
> state STATE_MAIN_R3
> 
> "vpnhome"[16] 2.204.210.70 #15: new NAT mapping for #15, was
> 2.204.210.70:54963, now 2.204.210.70:54964
> 
> "vpnhome"[16] 2.204.210.70 #15: STATE_MAIN_R3: sent MR3, ISAKMP SA
> established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha
> group=modp2048}
> 
> "vpnhome"[16] 2.204.210.70 #15: Dead Peer Detection (RFC 3706): not
> enabled because peer did not advertise it
> 
> "vpnhome"[16] 2.204.210.70 #15: the peer proposed:
> 85.177.250.149/32:17/1701 -> 10.0.0.2/32:17/0
> 
> "vpnhome"[16] 2.204.210.70 #15: NAT-Traversal: received 2 NAT-OA. using
> first, ignoring others
> 
> "vpnhome"[16] 2.204.210.70 #16: responding to Quick Mode proposal
> {msgid:01000000}
> 
> "vpnhome"[16] 2.204.210.70 #16:     us:
> 192.168.1.30<192.168.1.30>:17/1701---192.168.1.1
> 
> "vpnhome"[16] 2.204.210.70 #16:   them:
> 2.204.210.70[10.0.0.2]:17/1701===10.0.0.2/32
> 
> "vpnhome"[16] 2.204.210.70 #16: transition from state STATE_QUICK_R0 to
> state STATE_QUICK_R1
> 
> "vpnhome"[16] 2.204.210.70 #16: STATE_QUICK_R1: sent QR1, inbound IPsec
> SA installed, expecting QI2
> 
> "vpnhome"[16] 2.204.210.70 #16: Dead Peer Detection (RFC 3706): not
> enabled because peer did not advertise it
> 
> "vpnhome"[16] 2.204.210.70 #16: transition from state STATE_QUICK_R1 to
> state STATE_QUICK_R2
> 
> "vpnhome"[16] 2.204.210.70 #16: STATE_QUICK_R2: IPsec SA established
> transport mode {ESP/NAT=>0x3e674b5b <0xcc1fbfea xfrm=AES_128-HMAC_SHA1
> NATOA=10.0.0.2 NATD=2.204.210.70:54964 DPD=none}
> 
> "vpnhome"[16] 2.204.210.70 #15: received Delete SA(0x3e674b5b) payload:
> deleting IPSEC State #16
> 
> "vpnhome"[16] 2.204.210.70 #15: received and ignored informational message
> 
> "vpnhome"[16] 2.204.210.70 #15: received Delete SA payload: deleting
> ISAKMP State #15
> 
> "vpnhome"[16] 2.204.210.70: deleting connection "vpnhome" instance with
> peer 2.204.210.70 {isakmp=#0/ipsec=#0}
> 
> packet from 2.204.210.70:54964: received and ignored informational message
> 
>  
> 
>  
> 
> Windows log says “Event ID 20226 with reason code 829”. I googled a
> little bit and only found explanations into the direction of modem
> connect problems. (?). I am going to focus on PPP configuration now. I
> cannot find l2tpd.log file?
> 
>  
> 
> Any ideas?
> 
>  
> 
> Regards,
> 
> Horst
> 
>  
> 
> --- PPP config file ---
> 
> /etc/ppp/options.xl2tpd   [B---] 19 L:[  1+25  26/ 27] *(294 / 295b)
> 0010 0x00A
> 
> require-mschap-v2
> 
> asyncmap 0
> 
> hide-password
> 
> modem
> 
>  
> 
> ipcp-accept-local
> 
> ipcp-accept-remote
> 
> noccp
> 
> auth
> 
> crtscts
> 
> idle 1800
> 
> mtu 1400
> 
> mre 1400
> 
> nodefaultroute
> 
> debug
> 
> lock
> 
> proxyarp
> 
> connect-delay 5000
> 
> logfd 2
> 
> logfile /var/log/l2tpd.log
> 
>  
> 
>  
> 
> ms-dns 8.8.8.8
> 
> ms-dns 8.8.4.4
> 
> lcp-echo-failure 12
> 
> lcp-echo-interval 5
> 
>  
> 
>  
> 
>  
> 
> 
> 
> _______________________________________________
> Users at lists.openswan.org
> https://lists.openswan.org/mailman/listinfo/users
> Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> 



More information about the Users mailing list