[Openswan Users] xl2tpd never receiving or replying to packets
straterra at fuhell.com
Sat Jun 8 00:17:49 UTC 2013
Try running a strace on xl2tpd while connecting. If it's the same issue
I've seen, you should see errors with every packet. I've only seen this
with Debian and Ubuntu with SARef. However, it works perfectly for me on
Unfortunately, I haven't been able to find a fix. I was told to ask the
mailing list, but haven't gotten around to it.
On Jun 7, 2013 6:36 PM, "Rob Emanuele" <rje at shoreis.com> wrote:
> I'm trying to set up a new ipsec/l2tp vpn server on Ubuntu 13.04. They
> have an FC5 system that they want to upgrade since it has a NAT-T bug
> where two clients behind the same NAT address cannot connect
> simultaneously. We never see any log messages that log data into xl2tpd.
> We do see an ipsec SA established. We do see ESP data coming into the box
> with tcpdump.
> I'm wondering if my kernel isn't passing the data to xl2tpd correctly or
> at all. Would you guys have any suggestions for debugging it further? Do
> we need any particular sysctl settings other than ipv4 forwarding?
> Notes on our set up below.
> Thank you,
> Linux vpnserver2 3.8.0-23-generic #34-Ubuntu SMP Wed May 29 20:24:54 UTC
> 2013 i686 i686 i686 GNU/Linux
> xl2tpd 1.3.1+dfsg-1
> openswan 1:2.6.38-1
> ipsec.conf ===========
> config setup
> #contains the networks that are allowed as subnet= for the remote
> client. In other words, the address ranges that may live behind a NAT
> router through which a client connects.
> conn L2TP-PSK-NAT
> conn L2TP-PSK-noNAT
> # Apple iOS doesn't send delete notify so we need dead peer detection
> # to detect vanishing clients
> # Set ikelifetime and keylife to same defaults windows has
> # Replace IP address with your local IP (private, behind NAT IP is
> okay as well)
> left=<OUR EXTERNAL IP>
> # For updated Windows 2000/XP clients,
> # to support old clients as well, use leftprotoport=17/%any
> #force all to be nat'ed. because of iOS
> xl2tpd.conf ===========
> [lns default]
> ip range = 192.168.113.176-192.168.113.200
> local ip = 192.168.113.252
> require chap = yes
> refuse pap = yes
> require authentication = yes
> name = LinuxVPNserver2
> ppp debug = yes
> pppoptfile = /etc/ppp/options.xl2tpd
> length bit = yes
> Users at lists.openswan.org
> Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
> Building and Integrating Virtual Private Networks with Openswan:
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Users