Bug 1083223
| Summary: | NetworkManager-l2tp 0.9.8.6-1.fc20 can't establish L2TP connections | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Chris Siebenmann <cks-rhbugzilla> |
| Component: | NetworkManager-l2tp | Assignee: | Ivan Romanov <drizt72> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | high | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 22 | CC: | drizt72, j.c, jkaluza, lherbolt, massi.ergosum |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | i686 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | NetworkManager-l2tp-1.0.2-1.fc23 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-06-02 14:56:11 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Chris Siebenmann
2014-04-01 17:33:49 UTC
Include following information in bugreport: Output of the following commands: uname -a rpm -q NetworkManager-l2tp xl2tpd ppp NetworkManager-openswan libreswan Add log output in debug mode: In one terminal start command sudo /usr/libexec/nm-l2tp-service --debug In other terminal start command tail -f -n 0 /var/log/messages Start your VPN connection and wait while it establishes or fails and plus 5-10 sec. Then copy output from previous commands. Attention: in output of first command (nm-l2tp-service --debug) can appears your password! Remove it! Output from uname -a and rpm -q, for the version of NetworkManager-l2tp
that fails:
Linux heedra.red.sandbox 3.13.7-200.fc20.i686+PAE #1 SMP Mon Mar 24 22:18:14 UTC 2014 i686 i686 i386 GNU/Linux
NetworkManager-l2tp-0.9.8.6-1.fc20.i686
xl2tpd-1.3.1-14.fc20.i686
ppp-2.4.5-33.fc20.i686
NetworkManager-openswan-0.9.8.0-1.fc20.i686
libreswan-3.8-1.fc20.i686
Output for /usr/libexec/nm-l2tp-service --debug (dumped to a file
with both standard error and standard output):
** Message: nm-l2tp-service (version 0.9.8.5) starting...
connection
name : "connection"
id : "CSLab L2TP" (s)
uuid : "6668f5ee-a0cd-490e-a7f5-674dc58821d7" (s)
interface-name : NULL (sd)
type : "vpn" (s)
permissions : user:cks: (s)
autoconnect : FALSE (s)
timestamp : 1389809684 (s)
read-only : FALSE (sd)
zone : NULL (sd)
master : NULL (sd)
slave-type : NULL (sd)
secondaries : (sd)
gateway-ping-timeout : 0 (sd)
vpn
name : "vpn"
service-type : "org.freedesktop.NetworkManager.l2tp" (s)
user-name : "cks" (s)
data : password-flags=1,ipsec-group-name=GroupVPN,require-mppe-128=yes,ipsec-psk=computerscienceipsec,user=cks,refuse-eap=yes,refuse-chap=yes,ipsec-enabled=yes,gateway=l2tp1.cs.toronto.edu,refuse-pap=yes (s)
secrets : password=XXXXXXXXX (s)
ipv4
name : "ipv4"
method : "auto" (s)
dns : (s)
dns-search : (sd)
addresses : (s)
routes : (s)
ignore-auto-routes : FALSE (sd)
ignore-auto-dns : FALSE (sd)
dhcp-client-id : NULL (sd)
dhcp-send-hostname : TRUE (sd)
dhcp-hostname : NULL (sd)
never-default : FALSE (sd)
may-fail : TRUE (sd)
ppp
name : "ppp"
noauth : TRUE (sd)
refuse-eap : FALSE (sd)
refuse-pap : FALSE (sd)
refuse-chap : FALSE (sd)
refuse-mschap : FALSE (sd)
refuse-mschapv2 : FALSE (sd)
nobsdcomp : FALSE (sd)
nodeflate : FALSE (sd)
no-vj-comp : FALSE (sd)
require-mppe : FALSE (sd)
require-mppe-128 : FALSE (sd)
mppe-stateful : FALSE (sd)
crtscts : FALSE (sd)
baud : 0 (sd)
mru : 1200 (s)
mtu : 1200 (s)
lcp-echo-failure : 0 (sd)
lcp-echo-interval : 0 (sd)
** Message: Use '128.100.3.113' as a gateway
** Message: Check port 1701
** Message: ipsec enable flag: yes
** Message: starting ipsec
Redirecting to: systemctl stop+start ipsec.service
whack: Pluto is not running (no "/var/run/pluto/pluto.ctl")
002 forgetting secrets
002 loading secrets from "/etc/ipsec.secrets"
Warning: ignored obsolete keyword 'force_keepalive'
debugging mode enabled
end of file /var/run/nm-ipsec-l2tp.10372/ipsec.conf
Warning: ignored obsolete keyword 'force_keepalive'
Loading conn nm-ipsec-l2tpd-10372
connection's policy label: (null)
starter: case KH_DEFAULTROUTE: empty
conn: "nm-ipsec-l2tpd-10372" loopback=0
conn: "nm-ipsec-l2tpd-10372" labeled_ipsec=0
conn: "nm-ipsec-l2tpd-10372" policy_label=(null)
conn: "nm-ipsec-l2tpd-10372" modecfgdomain=(null)
conn: "nm-ipsec-l2tpd-10372" modecfgbanner=(null)
opening file: /var/run/nm-ipsec-l2tp.10372/ipsec.conf
loading named conns: nm-ipsec-l2tpd-10372
parse_src = 1, parse_gateway = 0, has_dst = 1
dst 128.100.3.113 via 172.17.254.254 dev p2p1 src 172.17.110.193
set addr: 172.17.110.193
002 "nm-ipsec-l2tpd-10372" #1: initiating Main Mode
104 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I1: initiate
003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [Dead Peer Detection]
003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [FRAGMENTATION]
003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [RFC 3947]
002 "nm-ipsec-l2tpd-10372" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
106 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "nm-ipsec-l2tpd-10372" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed
002 "nm-ipsec-l2tpd-10372" #1: Not sending INITIAL_CONTACT
002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
108 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I3: sent MI3, expecting MR3
003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [CAN-IKEv2]
002 "nm-ipsec-l2tpd-10372" #1: Main mode peer ID is ID_IPV4_ADDR: '128.100.3.113'
002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
004 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
002 "nm-ipsec-l2tpd-10372" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK+IKE_FRAG {using isakmp#1 msgid:2a90be35 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=no-pfs}
117 "nm-ipsec-l2tpd-10372" #2: STATE_QUICK_I1: initiate
002 "nm-ipsec-l2tpd-10372" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "nm-ipsec-l2tpd-10372" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x6af2cab3 <0xc65a3429 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=128.100.3.113:4500 DPD=none}
002 forgetting secrets
002 loading secrets from "/etc/ipsec.secrets"
002 no secrets filename matched "/etc/ipsec.d/*.secrets"
tail -f -n -0 /var/log/messages output:
Apr 1 15:47:37 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (ConnectInteractive) reply received.
Apr 1 15:47:37 heedra NetworkManager[671]: <info> VPN plugin state changed: starting (3)
Apr 1 15:47:37 heedra systemd: Stopping Internet Key Exchange (IKE) Protocol Daemon for IPsec...
Apr 1 15:47:37 heedra whack: 002 shutting down
Apr 1 15:47:37 heedra systemd: Stopped Internet Key Exchange (IKE) Protocol Daemon for IPsec.
Apr 1 15:47:37 heedra systemd: Starting Internet Key Exchange (IKE) Protocol Daemon for IPsec...
Apr 1 15:47:37 heedra kernel: [ 5736.804714] intel_rng: FWH not detected
Apr 1 15:47:37 heedra kernel: intel_rng: FWH not detected
Apr 1 15:47:37 heedra systemd: Started Internet Key Exchange (IKE) Protocol Daemon for IPsec.
Apr 1 15:47:38 heedra ipsec_starter[10542]: Warning: ignored obsolete keyword 'force_keepalive'
Apr 1 15:47:38 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (Connect) reply received.
Apr 1 15:47:38 heedra NetworkManager[671]: <warn> VPN connection 'CSLab L2TP' failed to connect: 'Possible error in IPSec setup.'.
Apr 1 15:47:45 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service'
Apr 1 15:47:45 heedra dbus[598]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service'
Apr 1 15:47:45 heedra systemd: Starting Fingerprint Authentication Daemon...
Apr 1 15:47:45 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'net.reactivated.Fprint'
Apr 1 15:47:45 heedra dbus[598]: [system] Successfully activated service 'net.reactivated.Fprint'
Apr 1 15:47:45 heedra systemd: Started Fingerprint Authentication Daemon.
Apr 1 15:47:45 heedra fprintd: Launching FprintObject
Apr 1 15:47:45 heedra fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint
Apr 1 15:47:45 heedra fprintd: ** Message: entering main loop
Apr 1 15:47:47 heedra su: (to root) cks on pts/2
Apr 1 15:47:58 heedra NetworkManager[671]: <info> VPN service 'l2tp' disappeared
Apr 1 15:48:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr 1 15:48:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr 1 15:48:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr 1 15:48:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr 1 15:48:15 heedra fprintd: ** Message: No devices in use, exit
Reverting to NetworkManager-l2tp-0.9.8-4.fc20.i686 (from the Fedora 20 CD,
the intermediate update since then is not available to me), the logged results
are:
nm-l2tp-service output:
** Message: nm-l2tp-service (version 0.9.8.0) starting...
connection
name : "connection"
id : "CSLab L2TP" (s)
uuid : "6668f5ee-a0cd-490e-a7f5-674dc58821d7" (s)
interface-name : NULL (sd)
type : "vpn" (s)
permissions : user:cks: (s)
autoconnect : FALSE (s)
timestamp : 1389809684 (s)
read-only : FALSE (sd)
zone : NULL (sd)
master : NULL (sd)
slave-type : NULL (sd)
secondaries : (sd)
gateway-ping-timeout : 0 (sd)
vpn
name : "vpn"
service-type : "org.freedesktop.NetworkManager.l2tp" (s)
user-name : "cks" (s)
data : password-flags=1,ipsec-group-name=GroupVPN,require-mppe-128=yes,ipsec-psk=computerscienceipsec,user=cks,refuse-eap=yes,refuse-chap=yes,ipsec-enabled=yes,gateway=l2tp1.cs.toronto.edu,refuse-pap=yes (s)
secrets : password=XXXXXXXXX (s)
ipv4
name : "ipv4"
method : "auto" (s)
dns : (s)
dns-search : (sd)
addresses : (s)
routes : (s)
ignore-auto-routes : FALSE (sd)
ignore-auto-dns : FALSE (sd)
dhcp-client-id : NULL (sd)
dhcp-send-hostname : TRUE (sd)
dhcp-hostname : NULL (sd)
never-default : FALSE (sd)
may-fail : TRUE (sd)
ppp
name : "ppp"
noauth : TRUE (sd)
refuse-eap : FALSE (sd)
refuse-pap : FALSE (sd)
refuse-chap : FALSE (sd)
refuse-mschap : FALSE (sd)
refuse-mschapv2 : FALSE (sd)
nobsdcomp : FALSE (sd)
nodeflate : FALSE (sd)
no-vj-comp : FALSE (sd)
require-mppe : FALSE (sd)
require-mppe-128 : FALSE (sd)
mppe-stateful : FALSE (sd)
crtscts : FALSE (sd)
baud : 0 (sd)
mru : 1200 (s)
mtu : 1200 (s)
lcp-echo-failure : 0 (sd)
lcp-echo-interval : 0 (sd)
** Message: Use '128.100.3.113' as a gateway
** Message: Check port 1701
** Message: ipsec enable flag: yes
** Message: starting ipsec
Redirecting to: systemctl stop+start ipsec.service
whack: Pluto is not running (no "/var/run/pluto/pluto.ctl")
002 forgetting secrets
002 loading secrets from "/etc/ipsec.secrets"
Warning: ignored obsolete keyword 'force_keepalive'
debugging mode enabled
end of file /var/run/nm-ipsec-l2tp.10739/ipsec.conf
Warning: ignored obsolete keyword 'force_keepalive'
Loading conn nm-ipsec-l2tpd-10739
connection's policy label: (null)
starter: case KH_DEFAULTROUTE: empty
conn: "nm-ipsec-l2tpd-10739" loopback=0
conn: "nm-ipsec-l2tpd-10739" labeled_ipsec=0
conn: "nm-ipsec-l2tpd-10739" policy_label=(null)
conn: "nm-ipsec-l2tpd-10739" modecfgdomain=(null)
conn: "nm-ipsec-l2tpd-10739" modecfgbanner=(null)
opening file: /var/run/nm-ipsec-l2tp.10739/ipsec.conf
loading named conns: nm-ipsec-l2tpd-10739
parse_src = 1, parse_gateway = 0, has_dst = 1
dst 128.100.3.113 via 172.17.254.254 dev p2p1 src 172.17.110.193
set addr: 172.17.110.193
002 "nm-ipsec-l2tpd-10739" #1: initiating Main Mode
104 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I1: initiate
003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [Dead Peer Detection]
003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [FRAGMENTATION]
003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [RFC 3947]
002 "nm-ipsec-l2tpd-10739" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
106 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "nm-ipsec-l2tpd-10739" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed
002 "nm-ipsec-l2tpd-10739" #1: Not sending INITIAL_CONTACT
002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
108 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I3: sent MI3, expecting MR3
003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [CAN-IKEv2]
002 "nm-ipsec-l2tpd-10739" #1: Main mode peer ID is ID_IPV4_ADDR: '128.100.3.113'
002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
004 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
002 "nm-ipsec-l2tpd-10739" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK+IKE_FRAG {using isakmp#1 msgid:a9d49713 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=no-pfs}
117 "nm-ipsec-l2tpd-10739" #2: STATE_QUICK_I1: initiate
002 "nm-ipsec-l2tpd-10739" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "nm-ipsec-l2tpd-10739" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x4cfe8ef8 <0xb748de1f xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=128.100.3.113:4500 DPD=none}
002 forgetting secrets
002 loading secrets from "/etc/ipsec.secrets"
002 no secrets filename matched "/etc/ipsec.d/*.secrets"
** (nm-l2tp-service:10739): WARNING **: Possible error in IPSec setup.
** Message: ipsec ready for action
** Message: xl2tpd started with pid 10931
xl2tpd[10931]: setsockopt recvref[30]: Protocol not available
xl2tpd[10931]: Using l2tp kernel support.
xl2tpd[10931]: xl2tpd version xl2tpd-1.3.1 started on heedra.red.sandbox PID:10931
xl2tpd[10931]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[10931]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[10931]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[10931]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[10931]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[10931]: get_call: allocating new tunnel for host 128.100.3.113, port 1701.
xl2tpd[10931]: Connecting to host 128.100.3.113, port 1701
xl2tpd[10931]: control_finish: message type is (null)(0). Tunnel is 0, call is 0.
xl2tpd[10931]: control_finish: sending SCCRQ
xl2tpd[10931]: handle_avps: handling avp's for tunnel 15930, call 0
xl2tpd[10931]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
xl2tpd[10931]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[10931]: framing_caps_avp: supported peer frames: async sync
xl2tpd[10931]: bearer_caps_avp: supported peer bearers:
xl2tpd[10931]: firmware_rev_avp: peer reports firmware version 1680 (0x0690)
xl2tpd[10931]: hostname_avp: peer reports hostname 'l2tpfedora19-1.cs.toronto.edu'
xl2tpd[10931]: vendor_avp: peer reports vendor 'xelerance.com'
xl2tpd[10931]: assigned_tunnel_avp: using peer's tunnel 39567
xl2tpd[10931]: receive_window_size_avp: peer wants RWS of 4. Will use flow control.
xl2tpd[10931]: control_finish: message type is Start-Control-Connection-Reply(2). Tunnel is 39567, call is 0.
xl2tpd[10931]: control_finish: sending SCCCN
xl2tpd[10931]: Connection established to 128.100.3.113, 1701. Local: 15930, Remote: 39567 (ref=0/0).
xl2tpd[10931]: Calling on tunnel 15930
xl2tpd[10931]: control_finish: message type is (null)(0). Tunnel is 39567, call is 0.
xl2tpd[10931]: control_finish: sending ICRQ
xl2tpd[10931]: check_control: Received out of order control packet on tunnel 39567 (got 0, expected 1)
xl2tpd[10931]: handle_packet: bad control packet!
xl2tpd[10931]: network_thread: bad packet
xl2tpd[10931]: handle_avps: handling avp's for tunnel 15930, call 47000
xl2tpd[10931]: message_type_avp: message type 11 (Incoming-Call-Reply)
xl2tpd[10931]: assigned_call_avp: using peer's call 30592
xl2tpd[10931]: control_finish: message type is Incoming-Call-Reply(11). Tunnel is 39567, call is 30592.
xl2tpd[10931]: control_finish: Sending ICCN
xl2tpd[10931]: Call established with 128.100.3.113, Local: 47000, Remote: 30592, Serial: 1 (ref=0/0)
** Message: nm-l2tp-ppp-plugin: (plugin_init): initializing
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 3 / phase 'serial connection'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 5 / phase 'establish'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 6 / phase 'authenticate'
** Message: nm-l2tp-ppp-plugin: (get_credentials): passwd-hook, requesting credentials...
** Message: nm-l2tp-ppp-plugin: (get_credentials): got credentials from NetworkManager-l2tp
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 8 / phase 'network'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 9 / phase 'running'
** Message: nm-l2tp-ppp-plugin: (nm_ip_up): ip-up event
** Message: nm-l2tp-ppp-plugin: (nm_ip_up): sending Ip4Config to NetworkManager-l2tp...
** Message: L2TP service (IP Config Get) reply received.
** Message: Terminated l2tp daemon with PID 10931.
xl2tpd[10931]: death_handler: Fatal signal 15 received
xl2tpd[10931]: Connection 39567 closed to 128.100.3.113, port 1701 (Server closing)
** (nm-l2tp-service:10739): WARNING **: xl2tpd exited with error code 1
tail -f -n 0 /var/log/messages:
Apr 1 15:53:54 heedra NetworkManager[671]: <info> VPN service 'l2tp' appeared; activating connections
Apr 1 15:53:59 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (ConnectInteractive) reply received.
Apr 1 15:53:59 heedra NetworkManager[671]: <info> VPN plugin state changed: starting (3)
Apr 1 15:53:59 heedra systemd: Stopping Internet Key Exchange (IKE) Protocol Daemon for IPsec...
Apr 1 15:53:59 heedra whack: 002 shutting down
Apr 1 15:53:59 heedra systemd: Stopped Internet Key Exchange (IKE) Protocol Daemon for IPsec.
Apr 1 15:53:59 heedra systemd: Starting Internet Key Exchange (IKE) Protocol Daemon for IPsec...
Apr 1 15:53:59 heedra kernel: [ 6118.945165] intel_rng: FWH not detected
Apr 1 15:53:59 heedra kernel: intel_rng: FWH not detected
Apr 1 15:53:59 heedra systemd: Started Internet Key Exchange (IKE) Protocol Daemon for IPsec.
Apr 1 15:54:00 heedra ipsec_starter[10901]: Warning: ignored obsolete keyword 'force_keepalive'
Apr 1 15:54:00 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (Connect) reply received.
Apr 1 15:54:02 heedra pppd[10933]: Plugin /usr/lib/pppd/2.4.5/nm-l2tp-pppd-plugin.so loaded.
Apr 1 15:54:02 heedra pppd[10933]: Plugin pppol2tp.so loaded.
Apr 1 15:54:02 heedra pppd[10933]: pppd 2.4.5 started by cks, uid 0
Apr 1 15:54:02 heedra pppd[10933]: Using interface ppp0
Apr 1 15:54:02 heedra pppd[10933]: Connect: ppp0 <-->
Apr 1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): new Generic device (driver: 'unknown' ifindex: 8)
Apr 1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): exported as /org/freedesktop/NetworkManager/Devices/7
Apr 1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): No existing connection detected.
Apr 1 15:54:02 heedra /etc/gdm/Xsession: JS LOG: Removing a network device that was not added
Apr 1 15:54:02 heedra /etc/gdm/Xsession: JS LOG: Invalid network device type, is 14
Apr 1 15:54:05 heedra pppd[10933]: CHAP authentication succeeded
Apr 1 15:54:05 heedra pppd[10933]: peer from calling number 128.100.3.113 authorized
Apr 1 15:54:05 heedra pppd[10933]: local IP address 172.17.30.8
Apr 1 15:54:05 heedra pppd[10933]: remote IP address 172.17.30.1
Apr 1 15:54:05 heedra pppd[10933]: primary DNS address 128.100.3.250
Apr 1 15:54:05 heedra pppd[10933]: secondary DNS address 128.100.3.251
Apr 1 15:54:05 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (IP4 Config Get) reply received from old-style plugin.
Apr 1 15:54:05 heedra NetworkManager[671]: <info> VPN Gateway: 128.100.3.113
Apr 1 15:54:05 heedra NetworkManager[671]: <info> Tunnel Device: ppp0
Apr 1 15:54:05 heedra NetworkManager[671]: <info> IPv4 configuration:
Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal Address: 172.17.30.8
Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal Prefix: 32
Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal Point-to-Point Address: 172.17.30.1
Apr 1 15:54:05 heedra NetworkManager[671]: <info> Maximum Segment Size (MSS): 0
Apr 1 15:54:05 heedra NetworkManager[671]: <info> Forbid Default Route: no
Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal DNS: 128.100.3.250
Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal DNS: 128.100.3.251
Apr 1 15:54:05 heedra NetworkManager[671]: <info> DNS Domain: '(none)'
Apr 1 15:54:05 heedra NetworkManager[671]: <info> No IPv6 configuration
Apr 1 15:54:05 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (IP Config Get) complete.
Apr 1 15:54:05 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service'
Apr 1 15:54:05 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service'
Apr 1 15:54:05 heedra systemd: Starting Network Manager Script Dispatcher Service...
Apr 1 15:54:05 heedra NetworkManager[671]: <info> VPN plugin state changed: started (4)
Apr 1 15:54:05 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Apr 1 15:54:05 heedra dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Apr 1 15:54:05 heedra systemd: Started Network Manager Script Dispatcher Service.
Apr 1 15:54:05 heedra systemd: Unit iscsi.service cannot be reloaded because it is inactive.
Apr 1 15:54:05 heedra nm-dispatcher.action: Job for iscsi.service failed. See 'systemctl status iscsi.service' and 'journalctl -xn' for details.
Apr 1 15:54:05 heedra systemd: Stopping Sendmail Mail Transport Client...
Apr 1 15:54:05 heedra systemd: Stopping Sendmail Mail Transport Agent...
Apr 1 15:54:05 heedra systemd: Starting Sendmail Mail Transport Agent...
Apr 1 15:54:05 heedra systemd: Started Sendmail Mail Transport Agent.
Apr 1 15:54:05 heedra systemd: Starting Sendmail Mail Transport Client...
Apr 1 15:54:05 heedra systemd: Started Sendmail Mail Transport Client.
Apr 1 15:54:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr 1 15:54:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr 1 15:54:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr 1 15:54:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr 1 15:54:19 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service'
Apr 1 15:54:19 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service'
Apr 1 15:54:19 heedra systemd: Starting Network Manager Script Dispatcher Service...
Apr 1 15:54:19 heedra avahi-daemon[564]: Withdrawing workstation service for ppp0.
Apr 1 15:54:19 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Apr 1 15:54:19 heedra dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Apr 1 15:54:19 heedra systemd: Started Network Manager Script Dispatcher Service.
Apr 1 15:54:19 heedra systemd: Stopping Sendmail Mail Transport Client...
Apr 1 15:54:19 heedra systemd: Stopping Sendmail Mail Transport Agent...
Apr 1 15:54:19 heedra systemd: Starting Sendmail Mail Transport Agent...
Apr 1 15:54:19 heedra systemd: Started Sendmail Mail Transport Agent.
Apr 1 15:54:19 heedra systemd: Starting Sendmail Mail Transport Client...
Apr 1 15:54:19 heedra systemd: Started Sendmail Mail Transport Client.
Apr 1 15:54:39 heedra NetworkManager[671]: <info> VPN service 'l2tp' disappeared
Apr 1 15:56:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr 1 15:56:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr 1 15:56:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr 1 15:56:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Use attachments for logs Oops, sorry. Will do in the future. For these logs, do you need them regenerated and recreated as attachments or is the current state usable? Hello, Fedora 20 same issue NetworkManager-l2tp.x86_64 0:0.9.8.6-1.fc20. Fedora 20 same issue NetworkManager-l2tp.x86_64 0:0.9.8-4.fc20 is ok. I will update you with more logs if needed. Server is openswan centos rhel-6.5 Regards, Lukas This message is a reminder that Fedora 20 is nearing its end of life. Approximately 4 (four) weeks from now Fedora will stop maintaining and issuing updates for Fedora 20. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a Fedora 'version' of '20'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later Fedora version. Thank you for reporting this issue and we are sorry that we were not able to fix it before Fedora 20 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged change the 'version' to a later Fedora version prior this bug is closed as described in the policy above. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete. seems that problem in Fedora 22 is the same (In reply to j.c from comment #8) > seems that problem in Fedora 22 is the same l2tp connection with PSK key, configured using network manager "activation of network connection failed" NetworkManager-l2tp-1.0.2-1.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-54c8a74b61 NetworkManager-l2tp-1.0.2-1.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-54c8a74b61 NetworkManager-l2tp-1.0.2-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. |