[Openswan Users] Dropped Connection Help
Steven Lokie
steven.lokie at imemories.com
Mon Apr 1 22:52:10 UTC 2013
Help,
I'm trying to open an l2tp connection and it doesn't connect. I'm lost
as to why this is failing so badly - any help anyone can provide?
xl2tpd -D
[root@ ~]# xl2tpd -D
xl2tpd[11273]: setsockopt recvref[30]: Protocol not available
xl2tpd[11273]: This binary does not support kernel L2TP.
xl2tpd[11273]: xl2tpd version xl2tpd-1.3.1 started on vpn02 PID:11273
xl2tpd[11273]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[11273]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[11273]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[11273]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[11273]: Listening on IP address 64.211.xxx.xxx, port 1701
secure.log
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
received Vendor ID payload [RFC 3947] method set to=109
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set
to=110
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but
already using method 110
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but
already using method 110
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106,
but already using method 110
Apr 1 15:11:20 l2tp pluto[2207]: packet from 64.211.xxx.rec:18935:
received Vendor ID payload [Dead Peer Detection]
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
responding to Main Mode from unknown peer 64.211.xxx.rec
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
STATE_MAIN_R1: sent MR1, expecting MI2
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): peer
is NATed
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
STATE_MAIN_R2: sent MR2, expecting MI3
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
ignoring informational payload, type IPSEC_INITIAL_CONTACT
msgid=00000000
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
Main mode peer ID is ID_IPV4_ADDR: '10.69.18.91'
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[13] 64.211.xxx.rec #13:
switched from "L2TP-PSK-NAT" to "L2TP-PSK-NAT"
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #13:
deleting connection "L2TP-PSK-NAT" instance with peer 64.211.xxx.rec
{isakmp=#0/ipsec=#0}
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #13:
transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #13:
new NAT mapping for #13, was 64.211.xxx.rec:18935, now
64.211.xxx.rec:64113
Apr 1 15:11:20 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #13:
STATE_MAIN_R3: sent MR3, ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp1024}
Apr 1 15:11:21 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #13:
the peer proposed: 64.211.xxx.xxx/32:17/1701 -> 10.69.18.91/32:17/0
Apr 1 15:11:21 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #14:
responding to Quick Mode proposal {msgid:c8030e82}
Apr 1 15:11:21 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #14:
us: 64.211.xxx.xxx<64.211.xxx.xxx>[+S=C]:17/1701
Apr 1 15:11:21 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #14:
them: 64.211.xxx.rec[10.69.18.91,+S=C]:17/58382===10.69.18.91/32
Apr 1 15:11:21 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #14:
transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Apr 1 15:11:21 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #14:
STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Apr 1 15:11:21 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #14:
transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Apr 1 15:11:21 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #14:
STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0145a385
<0x958cc9d9 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=64.211.xxx.rec:64113
DPD=none}
Apr 1 15:11:41 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #13:
received Delete SA(0x0145a385) payload: deleting IPSEC State #14
Apr 1 15:11:41 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #13:
received and ignored informational message
Apr 1 15:11:41 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec #13:
received Delete SA payload: deleting ISAKMP State #13
Apr 1 15:11:41 l2tp pluto[2207]: "L2TP-PSK-NAT"[14] 64.211.xxx.rec:
deleting connection "L2TP-PSK-NAT" instance with peer 64.211.xxx.rec
{isakmp=#0/ipsec=#0}
Apr 1 15:11:41 l2tp pluto[2207]: packet from 64.211.xxx.rec:64113:
received and ignored informational message
ppp.log
Mon Apr 1 15:40:18 2013 : L2TP connecting to server
'64.211.xxx.xxx' (64.211.xxx.xxx)...
Mon Apr 1 15:40:18 2013 : IPSec connection started
Mon Apr 1 15:40:18 2013 : IPSec phase 1 client started
Mon Apr 1 15:40:18 2013 : IPSec phase 1 server replied
Mon Apr 1 15:40:19 2013 : IPSec phase 2 started
Mon Apr 1 15:40:19 2013 : IPSec phase 2 established
Mon Apr 1 15:40:19 2013 : IPSec connection established
Mon Apr 1 15:40:19 2013 : L2TP sent SCCRQ
Mon Apr 1 15:40:39 2013 : L2TP cannot connect to the server
ipsec.conf
version 2.0 # conforms to second version of ipsec.conf specification
config setup
dumpdir=/var/run/pluto/
#in what directory should things started by setup (notably the Pluto
daemon) be allowed to dump core?
nat_traversal=yes
#whether to accept/offer to support NAT (NAPT, also known as "IP
Masqurade") workaround for IPsec
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
#contains the networks that are allowed as subnet= for the remote
client. In other words, the address
#ranges that may live behind a NAT router through which a client
connects.
protostack=netkey
#decide which protocol stack is going to be used.
oe=off
#Disable Opertunistic Encryption.
conn L2TP-PSK-NAT
rightsubnet=vhost:%priv
also=L2TP-PSK-noNAT
conn L2TP-PSK-noNAT
authby=secret
#shared secret. Use rsasig for certificates.
pfs=no
#Disable pfs
auto=add
#start at boot
keyingtries=8
#Only negotiate a conn. 3 times.
ikelifetime=8h
keylife=1h
type=transport
#because we use l2tp as tunnel protocol
left=64.211.xxx.xxx
#fill in server IP above
leftprotoport=17/1701
right=%any
rightprotoport=17/%any
--
_______________________
Steven Lokie
iMemories
Steven.Lokie at iMemories.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20130401/da0003aa/attachment.html>
More information about the Users
mailing list