Hi,
what is involved in this bug exactly?
I'm using xubuntu 14.04
lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 14.04.2 LTS
Release: 14.04
Codename: trusty
I also get:
death_handler: Fatal signal 15 received
and the connection, is closed after a few seconds. The VPN connection
was working, but throught another country.
Here is an anonymized log, from "L2TP IPsec VPN Manager 1.0.9":
févr. 25 07:15:02.147 ipsec_setup: Stopping Openswan IPsec...
févr. 25 07:15:04.100 ipsec_setup: Starting Openswan IPsec
U2.6.38/K3.13.0-46-generic...
févr. 25 07:15:05.032 ipsec__plutorun: Starting Pluto subsystem...
févr. 25 07:15:05.065 ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d
févr. 25 07:15:05.131 recvref[30]: Protocol not available
févr. 25 07:15:05.131 xl2tpd[3257]: This binary does not support kernel L2TP.
févr. 25 07:15:05.133 xl2tpd[3263]: xl2tpd version xl2tpd-1.3.6 started on
sylvain-laptop PID:3263
févr. 25 07:15:05.134 xl2tpd[3263]: Written by Mark Spencer, Copyright (C)
1998, Adtran, Inc.
févr. 25 07:15:05.134 xl2tpd[3263]: Forked by Scott Balmos and David Stipp, (C)
2001
févr. 25 07:15:05.134 xl2tpd[3263]: Inherited by Jeff McAdams, (C) 2002
févr. 25 07:15:05.135 xl2tpd[3263]: Forked again by Xelerance
(www.xelerance.com) (C) 2006
févr. 25 07:15:05.135 xl2tpd[3263]: Listening on IP address 0.0.0.0, port 1701
févr. 25 07:15:05.135 Starting xl2tpd: xl2tpd.
févr. 25 07:15:05.197 ipsec__plutorun: 002 added connection description
"vpn-name"
févr. 25 07:15:06.072 104 "vpn-name" #1: STATE_MAIN_I1: initiate
févr. 25 07:15:06.072 003 "vpn-name" #1: ignoring unknown Vendor ID payload
[f758f22668750f03b08df6ebe1d00403]
févr. 25 07:15:06.072 003 "vpn-name" #1: ignoring unknown Vendor ID payload
[afcad71368a1f1c96b8696fc7757]
févr. 25 07:15:06.072 003 "vpn-name" #1: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02] method set to=107
févr. 25 07:15:06.072 003 "vpn-name" #1: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 107
févr. 25 07:15:06.072 003 "vpn-name" #1: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] method set to=108
févr. 25 07:15:06.073 003 "vpn-name" #1: received Vendor ID payload [RFC 3947]
method set to=115
févr. 25 07:15:06.073 003 "vpn-name" #1: received Vendor ID payload [Dead Peer
Detection]
févr. 25 07:15:06.073 003 "vpn-name" #1: ignoring unknown Vendor ID payload
[afcad71368a1f1c96b8696fc7757]
févr. 25 07:15:06.073 106 "vpn-name" #1: STATE_MAIN_I2: sent MI2, expecting MR2
févr. 25 07:15:06.073 003 "vpn-name" #1: NAT-Traversal: Result using
draft-ietf-ipsec-nat-t-ike (MacOS X): i am NATed
févr. 25 07:15:06.073 108 "vpn-name" #1: STATE_MAIN_I3: sent MI3, expecting MR3
févr. 25 07:15:06.073 004 "vpn-name" #1: STATE_MAIN_I4: ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_md5
group=modp1024}
févr. 25 07:15:06.073 117 "vpn-name" #2: STATE_QUICK_I1: initiate
févr. 25 07:15:06.073 003 "vpn-name" #2: NAT-Traversal: received 2 NAT-OA.
ignored because peer is not NATed
févr. 25 07:15:06.073 004 "vpn-name" #2: STATE_QUICK_I2: sent QI2, IPsec SA
established transport mode {ESP=>0x7a9b2c7f <0xb4f93d6a xfrm=3DES_0-HMAC_SHA1
NATOA=none NATD=none DPD=none}
févr. 25 07:15:07.076 xl2tpd[3263]: Connecting to host 11.22.33.44, port 1701
févr. 25 07:15:07.175 xl2tpd[3263]: Connection established to 11.22.33.44,
1701. Local: 56208, Remote: 31599 (ref=0/0).
févr. 25 07:15:07.176 xl2tpd[3263]: Calling on tunnel 56208
févr. 25 07:15:07.205 xl2tpd[3263]: Call established with 11.22.33.44, Local:
63444, Remote: 30177, Serial: 1 (ref=0/0)
févr. 25 07:15:07.205 xl2tpd[3263]: start_pppd: I'm running:
févr. 25 07:15:07.205 xl2tpd[3263]: "/usr/sbin/pppd"
févr. 25 07:15:07.206 xl2tpd[3263]: "passive"
févr. 25 07:15:07.206 xl2tpd[3263]: "nodetach"
févr. 25 07:15:07.206 xl2tpd[3263]: ":"
févr. 25 07:15:07.207 xl2tpd[3263]: "file"
févr. 25 07:15:07.207 xl2tpd[3263]: "/etc/ppp/vpn-name.options.xl2tpd"
févr. 25 07:15:07.207 xl2tpd[3263]: "/dev/pts/13"
févr. 25 07:15:07.258 pppd[3325]: Plugin passprompt.so loaded.
févr. 25 07:15:07.258 pppd[3325]: pppd 2.4.5 started by root, uid 0
févr. 25 07:15:07.296 pppd[3325]: using channel 1
févr. 25 07:15:07.296 pppd[3325]: Using interface ppp0
févr. 25 07:15:07.299 pppd[3325]: Connect: ppp0 <--> /dev/pts/13
févr. 25 07:15:07.299 pppd[3325]: sent [LCP ConfReq id=0x1 <asyncmap 0x0>
<magic 0x63ecab6e> <pcomp> <accomp>]
févr. 25 07:15:07.319 pppd[3325]: rcvd [LCP ConfAck id=0x1 <asyncmap 0x0>
<magic 0x63ecab6e> <pcomp> <accomp>]
févr. 25 07:15:09.249 pppd[3325]: rcvd [LCP ConfReq id=0x3c <mru 1400> <auth
pap> <pcomp> <accomp> <asyncmap 0x0>]
févr. 25 07:15:09.250 pppd[3325]: sent [LCP ConfAck id=0x3c <mru 1400> <auth
pap> <pcomp> <accomp> <asyncmap 0x0>]
févr. 25 07:15:09.250 pppd[3325]: sent [LCP EchoReq id=0x0 magic=0x63ecab6e]
févr. 25 07:15:09.317 pppd[3325]: sent [PAP AuthReq id=0x1 user="myvpnuser"
password=<hidden>]
févr. 25 07:15:09.318 pppd[3325]: rcvd [LCP EchoRep id=0x0 magic=0x0]
févr. 25 07:15:09.456 pppd[3325]: rcvd [PAP AuthAck id=0x1 ""]
févr. 25 07:15:09.456 pppd[3325]: PAP authentication succeeded
févr. 25 07:15:09.482 pppd[3325]: sent [CCP ConfReq id=0x1 <deflate 15>
<deflate(old#) 15> <bsd v1 15>]
févr. 25 07:15:09.482 pppd[3325]: sent [IPCP ConfReq id=0x1 <compress VJ 0f 01>
<addr 0.0.0.0>]
févr. 25 07:15:09.482 pppd[3325]: rcvd [IPCP ConfReq id=0x33]
févr. 25 07:15:09.483 pppd[3325]: sent [IPCP ConfNak id=0x33 <addr 0.0.0.0>]
févr. 25 07:15:09.515 pppd[3325]: rcvd [LCP ProtRej id=0x42 80 fd 01 01 00 0f
1a 04 78 00 18 04 78 00 15 03 2f]
févr. 25 07:15:09.516 pppd[3325]: Protocol-Reject for 'Compression Control
Protocol' (0x80fd) received
févr. 25 07:15:09.516 pppd[3325]: rcvd [IPCP ConfRej id=0x1 <compress VJ 0f 01>]
févr. 25 07:15:09.516 pppd[3325]: sent [IPCP ConfReq id=0x2 <addr 0.0.0.0>]
févr. 25 07:15:09.517 pppd[3325]: rcvd [IPCP ConfReq id=0x34]
févr. 25 07:15:09.517 pppd[3325]: sent [IPCP ConfAck id=0x34]
févr. 25 07:15:09.547 pppd[3325]: rcvd [IPCP ConfNak id=0x2 <addr 192.168.2.1>]
févr. 25 07:15:09.547 pppd[3325]: sent [IPCP ConfReq id=0x3 <addr 192.168.2.1>]
févr. 25 07:15:09.588 pppd[3325]: rcvd [IPCP ConfAck id=0x3 <addr 192.168.2.1>]
févr. 25 07:15:09.588 pppd[3325]: Could not determine remote IP address:
defaulting to 10.64.64.64
févr. 25 07:15:09.591 pppd[3325]: local IP address 192.168.2.1
févr. 25 07:15:09.591 pppd[3325]: remote IP address 10.64.64.64
févr. 25 07:15:09.592 pppd[3325]: Script /etc/ppp/ip-up started (pid 3360)
févr. 25 07:15:09.646 pppd[3325]: Script /etc/ppp/ip-up finished (pid 3360),
status = 0x0
févr. 25 07:15:57.476 xl2tpd[3263]: death_handler: Fatal signal 15 received
févr. 25 07:15:57.479 pppd[3325]: Modem hangup
févr. 25 07:15:57.482 pppd[3325]: Connect time 0.8 minutes.
févr. 25 07:15:57.483 pppd[3325]: Sent 7187 bytes, received 23292 bytes.
févr. 25 07:15:57.484 pppd[3325]: Script /etc/ppp/ip-down started (pid 3393)
févr. 25 07:15:57.484 pppd[3325]: Connection terminated.
févr. 25 07:15:57.487 Stopping xl2tpd: xl2tpd.
févr. 25 07:15:57.514 pppd[3325]: Waiting for 1 child processes...
févr. 25 07:15:57.515 pppd[3325]: script /etc/ppp/ip-down, pid 3393
févr. 25 07:15:57.578 pppd[3325]: Script /etc/ppp/ip-down finished (pid 3393),
status = 0x0
févr. 25 07:15:57.578 pppd[3325]: Exit.
févr. 25 07:15:57.579 ipsec_setup: Stopping Openswan IPsec...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/933139
Title:
l2tp-ipsec-vpn failed trying to connect to l2tp VPN
To manage notifications about this bug go to:
https://bugs.launchpad.net/l2tp-ipsec-vpn/+bug/933139/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs