Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 860408 Details for
Bug 1062555
NetworkManager can't connect to Cisco-VPN
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
The output of systemctl, when connecting to the vpn
systemctl-networkmanager (text/plain), 14.57 KB, created by
Niklas Fischer
on 2014-02-07 09:31:05 UTC
(
hide
)
Description:
The output of systemctl, when connecting to the vpn
Filename:
MIME Type:
Creator:
Niklas Fischer
Created:
2014-02-07 09:31:05 UTC
Size:
14.57 KB
patch
obsolete
>Feb 07 10:16:19 localhost.localdomain NetworkManager[3133]: <info> Starting VPN service 'vpnc'... >Feb 07 10:16:19 localhost.localdomain NetworkManager[3133]: <info> VPN service 'vpnc' started (org.freedesktop.NetworkManager.vpnc), PID 3427 >Feb 07 10:16:19 localhost.localdomain NetworkManager[3133]: <info> VPN service 'vpnc' appeared; activating connections >Feb 07 10:16:19 localhost.localdomain NetworkManager[3133]: <info> NetworkManager state is now CONNECTED_GLOBAL >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: <info> VPN plugin state changed: starting (3) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: ** Message: vpnc started with pid 3437 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: <info> VPN connection 'FullTunnel' (Connect) reply received. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: /usr/sbin/vpnc: unknown option --pid-file /var/run/NetworkManager/nm-vpnc-12884249-59cb-45fe-98d8-7966747e7595.pid >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Usage: /usr/sbin/vpnc [--version] [--print-config] [--help] [--long-help] [options] [config files] >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Options: >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --gateway <ip/hostname> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: IP/name of your IPSec gateway >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: IPSec gateway <ip/hostname> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --id <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: your group name >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: IPSec ID <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: (configfile only option) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: your group password (cleartext) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: IPSec secret <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: (configfile only option) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: your group password (obfuscated) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: IPSec obfuscated secret <hex string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --username <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: your username >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Xauth username <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: (configfile only option) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: your password (cleartext) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Xauth password <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: (configfile only option) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: your password (obfuscated) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Xauth obfuscated password <hex string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --domain <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: (NT-) Domain name for authentication >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Domain <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --xauth-inter >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: enable interactive extended authentication (for challenge response auth) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Xauth interactive >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --vendor <cisco/netscreen> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: vendor of your IPSec gateway >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: cisco >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Vendor <cisco/netscreen> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --natt-mode <natt/none/force-natt/cisco-udp> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Which NAT-Traversal Method to use: >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * natt -- NAT-T as defined in RFC3947 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * none -- disable use of any NAT-T method >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * force-natt -- always use NAT-T encapsulation even >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: without presence of a NAT device >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: (useful if the OS captures all ESP traffic) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * cisco-udp -- Cisco proprietary UDP encapsulation, commonly over Port 10000 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Note: cisco-tcp encapsulation is not yet supported >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: natt >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: NAT Traversal Mode <natt/none/force-natt/cisco-udp> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --script <command> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: command is executed using system() to configure the interface, >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: routing and so on. Device name, IP, etc. are passed using enviroment >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: variables, see README. This script is executed right after ISAKMP is >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: done, but before tunneling is enabled. It is called when vpnc >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: terminates, too >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: /etc/vpnc/vpnc-script >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Script <command> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --dh <dh1/dh2/dh5> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: name of the IKE DH Group >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: dh2 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: IKE DH Group <dh1/dh2/dh5> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --pfs <nopfs/dh1/dh2/dh5/server> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Diffie-Hellman group to use for PFS >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: server >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Perfect Forward Secrecy <nopfs/dh1/dh2/dh5/server> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --enable-1des >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: enables weak single DES encryption >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Enable Single DES >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --enable-no-encryption >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: enables using no encryption for data traffic (key exchanged must be encrypted) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Enable no encryption >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --application-version <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Application Version to report. Note: Default string is generated at runtime. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: Cisco Systems VPN Client 0.5.3:Linux >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Application version <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --ifname <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: visible name of the TUN/TAP interface >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Interface name <ASCII string> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --ifmode <tun/tap> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: mode of TUN/TAP interface: >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * tun: virtual point to point interface (default) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * tap: virtual ethernet interface >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: tun >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Interface mode <tun/tap> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --debug <0/1/2/3/99> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Show verbose debug messages >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * 0: Do not print debug information. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * 1: Print minimal debug information. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * 2: Show statemachine and packet/payload type information. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * 3: Dump everything exluding authentication data. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * 99: Dump everything INCLUDING AUTHENTICATION data (e.g. PASSWORDS). >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Debug <0/1/2/3/99> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --no-detach >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Don't detach from the console after login >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: No Detach >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --pid-file <filename> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: store the pid of background process in <filename> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: /var/run/vpnc/pid >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Pidfile <filename> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --local-addr <ip/hostname> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: <warn> VPN plugin failed: connect-failed (1) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: <info> VPN plugin state changed: stopped (6) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: <info> VPN plugin state change reason: unknown (0) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: <warn> error disconnecting VPN: Could not process the request because no VPN connection was active. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: local IP to use for ISAKMP / ESP / ... (0.0.0.0 == automatically assign) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: 0.0.0.0 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Local Addr <ip/hostname> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --local-port <0-65535> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: local ISAKMP port number to use (0 == use random port) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: 500 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Local Port <0-65535> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --udp-port <0-65535> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Local UDP port number to use (0 == use random port). >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: This is only relevant if cisco-udp nat-traversal is used. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: This is the _local_ port, the remote udp port is discovered automatically. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: It is especially not the cisco-tcp port. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: 10000 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Cisco UDP Encapsulation Port <0-65535> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --dpd-idle <0,10-86400> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Send DPD packet after not receiving anything for <idle> seconds. >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Use 0 to disable DPD completely (both ways). >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: 600 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: DPD idle timeout (our side) <0,10-86400> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --non-inter >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Don't ask anything, exit on missing options >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: Noninteractive >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --auth-mode <psk/cert/hybrid> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Authentication mode: >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * psk: pre-shared key (default) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * cert: server + client certificate (not implemented yet) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: * hybrid: server certificate + xauth (if built with openssl support) >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: psk >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: IKE Authmode <psk/cert/hybrid> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --ca-file <filename> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: filename and path to the CA-PEM-File >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: CA-File <filename> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --ca-dir <directory> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: path of the trusted CA-Directory >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: /etc/ssl/certs >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: CA-Dir <directory> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: --target-network <target network/netmask> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Target network in dotted decimal or CIDR notation >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Default: 0.0.0.0/0.0.0.0 >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: conf-variable: IPSEC target network <target network/netmask> >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: Report bugs to vpnc@unix-ag.uni-kl.de >Feb 07 10:16:28 localhost.localdomain NetworkManager[3133]: ** (nm-vpnc-service:3427): WARNING **: vpnc exited with error code 1 >Feb 07 10:16:33 localhost.localdomain NetworkManager[3133]: <info> VPN service 'vpnc' disappeared >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1062555
: 860408