Description of problem: The current version of NetworkManager-l2tp can't establish L2TP connections to our L2TP server. Older versions (such as the version from the Fedora 20 distro CD) work fine. This is not a SELinux problem; I have SELinux disabled on my machine. Version-Release number of selected component (if applicable): NetworkManager-l2tp 0.9.8.6-1.fc20 How reproducible: Completely. All attempts to bring up L2TP connections with 0.9.8.6-1 fail. Additional info: I have logs of both failing and succeeding L2TP connections but I don't know which portions of them are meaningful (and they're big) so I'm going to defer attaching them for now. Let me know which bits are relevant (or if people want everything from /var/log/messages for a connection attempt).
Include following information in bugreport: Output of the following commands: uname -a rpm -q NetworkManager-l2tp xl2tpd ppp NetworkManager-openswan libreswan Add log output in debug mode: In one terminal start command sudo /usr/libexec/nm-l2tp-service --debug In other terminal start command tail -f -n 0 /var/log/messages Start your VPN connection and wait while it establishes or fails and plus 5-10 sec. Then copy output from previous commands. Attention: in output of first command (nm-l2tp-service --debug) can appears your password! Remove it!
Output from uname -a and rpm -q, for the version of NetworkManager-l2tp that fails: Linux heedra.red.sandbox 3.13.7-200.fc20.i686+PAE #1 SMP Mon Mar 24 22:18:14 UTC 2014 i686 i686 i386 GNU/Linux NetworkManager-l2tp-0.9.8.6-1.fc20.i686 xl2tpd-1.3.1-14.fc20.i686 ppp-2.4.5-33.fc20.i686 NetworkManager-openswan-0.9.8.0-1.fc20.i686 libreswan-3.8-1.fc20.i686 Output for /usr/libexec/nm-l2tp-service --debug (dumped to a file with both standard error and standard output): ** Message: nm-l2tp-service (version 0.9.8.5) starting... connection name : "connection" id : "CSLab L2TP" (s) uuid : "6668f5ee-a0cd-490e-a7f5-674dc58821d7" (s) interface-name : NULL (sd) type : "vpn" (s) permissions : user:cks: (s) autoconnect : FALSE (s) timestamp : 1389809684 (s) read-only : FALSE (sd) zone : NULL (sd) master : NULL (sd) slave-type : NULL (sd) secondaries : (sd) gateway-ping-timeout : 0 (sd) vpn name : "vpn" service-type : "org.freedesktop.NetworkManager.l2tp" (s) user-name : "cks" (s) data : password-flags=1,ipsec-group-name=GroupVPN,require-mppe-128=yes,ipsec-psk=computerscienceipsec,user=cks,refuse-eap=yes,refuse-chap=yes,ipsec-enabled=yes,gateway=l2tp1.cs.toronto.edu,refuse-pap=yes (s) secrets : password=XXXXXXXXX (s) ipv4 name : "ipv4" method : "auto" (s) dns : (s) dns-search : (sd) addresses : (s) routes : (s) ignore-auto-routes : FALSE (sd) ignore-auto-dns : FALSE (sd) dhcp-client-id : NULL (sd) dhcp-send-hostname : TRUE (sd) dhcp-hostname : NULL (sd) never-default : FALSE (sd) may-fail : TRUE (sd) ppp name : "ppp" noauth : TRUE (sd) refuse-eap : FALSE (sd) refuse-pap : FALSE (sd) refuse-chap : FALSE (sd) refuse-mschap : FALSE (sd) refuse-mschapv2 : FALSE (sd) nobsdcomp : FALSE (sd) nodeflate : FALSE (sd) no-vj-comp : FALSE (sd) require-mppe : FALSE (sd) require-mppe-128 : FALSE (sd) mppe-stateful : FALSE (sd) crtscts : FALSE (sd) baud : 0 (sd) mru : 1200 (s) mtu : 1200 (s) lcp-echo-failure : 0 (sd) lcp-echo-interval : 0 (sd) ** Message: Use '128.100.3.113' as a gateway ** Message: Check port 1701 ** Message: ipsec enable flag: yes ** Message: starting ipsec Redirecting to: systemctl stop+start ipsec.service whack: Pluto is not running (no "/var/run/pluto/pluto.ctl") 002 forgetting secrets 002 loading secrets from "/etc/ipsec.secrets" Warning: ignored obsolete keyword 'force_keepalive' debugging mode enabled end of file /var/run/nm-ipsec-l2tp.10372/ipsec.conf Warning: ignored obsolete keyword 'force_keepalive' Loading conn nm-ipsec-l2tpd-10372 connection's policy label: (null) starter: case KH_DEFAULTROUTE: empty conn: "nm-ipsec-l2tpd-10372" loopback=0 conn: "nm-ipsec-l2tpd-10372" labeled_ipsec=0 conn: "nm-ipsec-l2tpd-10372" policy_label=(null) conn: "nm-ipsec-l2tpd-10372" modecfgdomain=(null) conn: "nm-ipsec-l2tpd-10372" modecfgbanner=(null) opening file: /var/run/nm-ipsec-l2tp.10372/ipsec.conf loading named conns: nm-ipsec-l2tpd-10372 parse_src = 1, parse_gateway = 0, has_dst = 1 dst 128.100.3.113 via 172.17.254.254 dev p2p1 src 172.17.110.193 set addr: 172.17.110.193 002 "nm-ipsec-l2tpd-10372" #1: initiating Main Mode 104 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I1: initiate 003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [Dead Peer Detection] 003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [FRAGMENTATION] 003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [RFC 3947] 002 "nm-ipsec-l2tpd-10372" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) 002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 106 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I2: sent MI2, expecting MR2 003 "nm-ipsec-l2tpd-10372" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed 002 "nm-ipsec-l2tpd-10372" #1: Not sending INITIAL_CONTACT 002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 108 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I3: sent MI3, expecting MR3 003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [CAN-IKEv2] 002 "nm-ipsec-l2tpd-10372" #1: Main mode peer ID is ID_IPV4_ADDR: '128.100.3.113' 002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 004 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024} 002 "nm-ipsec-l2tpd-10372" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK+IKE_FRAG {using isakmp#1 msgid:2a90be35 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=no-pfs} 117 "nm-ipsec-l2tpd-10372" #2: STATE_QUICK_I1: initiate 002 "nm-ipsec-l2tpd-10372" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 004 "nm-ipsec-l2tpd-10372" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x6af2cab3 <0xc65a3429 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=128.100.3.113:4500 DPD=none} 002 forgetting secrets 002 loading secrets from "/etc/ipsec.secrets" 002 no secrets filename matched "/etc/ipsec.d/*.secrets" tail -f -n -0 /var/log/messages output: Apr 1 15:47:37 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (ConnectInteractive) reply received. Apr 1 15:47:37 heedra NetworkManager[671]: <info> VPN plugin state changed: starting (3) Apr 1 15:47:37 heedra systemd: Stopping Internet Key Exchange (IKE) Protocol Daemon for IPsec... Apr 1 15:47:37 heedra whack: 002 shutting down Apr 1 15:47:37 heedra systemd: Stopped Internet Key Exchange (IKE) Protocol Daemon for IPsec. Apr 1 15:47:37 heedra systemd: Starting Internet Key Exchange (IKE) Protocol Daemon for IPsec... Apr 1 15:47:37 heedra kernel: [ 5736.804714] intel_rng: FWH not detected Apr 1 15:47:37 heedra kernel: intel_rng: FWH not detected Apr 1 15:47:37 heedra systemd: Started Internet Key Exchange (IKE) Protocol Daemon for IPsec. Apr 1 15:47:38 heedra ipsec_starter[10542]: Warning: ignored obsolete keyword 'force_keepalive' Apr 1 15:47:38 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (Connect) reply received. Apr 1 15:47:38 heedra NetworkManager[671]: <warn> VPN connection 'CSLab L2TP' failed to connect: 'Possible error in IPSec setup.'. Apr 1 15:47:45 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' Apr 1 15:47:45 heedra dbus[598]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' Apr 1 15:47:45 heedra systemd: Starting Fingerprint Authentication Daemon... Apr 1 15:47:45 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'net.reactivated.Fprint' Apr 1 15:47:45 heedra dbus[598]: [system] Successfully activated service 'net.reactivated.Fprint' Apr 1 15:47:45 heedra systemd: Started Fingerprint Authentication Daemon. Apr 1 15:47:45 heedra fprintd: Launching FprintObject Apr 1 15:47:45 heedra fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint Apr 1 15:47:45 heedra fprintd: ** Message: entering main loop Apr 1 15:47:47 heedra su: (to root) cks on pts/2 Apr 1 15:47:58 heedra NetworkManager[671]: <info> VPN service 'l2tp' disappeared Apr 1 15:48:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service' Apr 1 15:48:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service' Apr 1 15:48:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory. Apr 1 15:48:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory. Apr 1 15:48:15 heedra fprintd: ** Message: No devices in use, exit
Reverting to NetworkManager-l2tp-0.9.8-4.fc20.i686 (from the Fedora 20 CD, the intermediate update since then is not available to me), the logged results are: nm-l2tp-service output: ** Message: nm-l2tp-service (version 0.9.8.0) starting... connection name : "connection" id : "CSLab L2TP" (s) uuid : "6668f5ee-a0cd-490e-a7f5-674dc58821d7" (s) interface-name : NULL (sd) type : "vpn" (s) permissions : user:cks: (s) autoconnect : FALSE (s) timestamp : 1389809684 (s) read-only : FALSE (sd) zone : NULL (sd) master : NULL (sd) slave-type : NULL (sd) secondaries : (sd) gateway-ping-timeout : 0 (sd) vpn name : "vpn" service-type : "org.freedesktop.NetworkManager.l2tp" (s) user-name : "cks" (s) data : password-flags=1,ipsec-group-name=GroupVPN,require-mppe-128=yes,ipsec-psk=computerscienceipsec,user=cks,refuse-eap=yes,refuse-chap=yes,ipsec-enabled=yes,gateway=l2tp1.cs.toronto.edu,refuse-pap=yes (s) secrets : password=XXXXXXXXX (s) ipv4 name : "ipv4" method : "auto" (s) dns : (s) dns-search : (sd) addresses : (s) routes : (s) ignore-auto-routes : FALSE (sd) ignore-auto-dns : FALSE (sd) dhcp-client-id : NULL (sd) dhcp-send-hostname : TRUE (sd) dhcp-hostname : NULL (sd) never-default : FALSE (sd) may-fail : TRUE (sd) ppp name : "ppp" noauth : TRUE (sd) refuse-eap : FALSE (sd) refuse-pap : FALSE (sd) refuse-chap : FALSE (sd) refuse-mschap : FALSE (sd) refuse-mschapv2 : FALSE (sd) nobsdcomp : FALSE (sd) nodeflate : FALSE (sd) no-vj-comp : FALSE (sd) require-mppe : FALSE (sd) require-mppe-128 : FALSE (sd) mppe-stateful : FALSE (sd) crtscts : FALSE (sd) baud : 0 (sd) mru : 1200 (s) mtu : 1200 (s) lcp-echo-failure : 0 (sd) lcp-echo-interval : 0 (sd) ** Message: Use '128.100.3.113' as a gateway ** Message: Check port 1701 ** Message: ipsec enable flag: yes ** Message: starting ipsec Redirecting to: systemctl stop+start ipsec.service whack: Pluto is not running (no "/var/run/pluto/pluto.ctl") 002 forgetting secrets 002 loading secrets from "/etc/ipsec.secrets" Warning: ignored obsolete keyword 'force_keepalive' debugging mode enabled end of file /var/run/nm-ipsec-l2tp.10739/ipsec.conf Warning: ignored obsolete keyword 'force_keepalive' Loading conn nm-ipsec-l2tpd-10739 connection's policy label: (null) starter: case KH_DEFAULTROUTE: empty conn: "nm-ipsec-l2tpd-10739" loopback=0 conn: "nm-ipsec-l2tpd-10739" labeled_ipsec=0 conn: "nm-ipsec-l2tpd-10739" policy_label=(null) conn: "nm-ipsec-l2tpd-10739" modecfgdomain=(null) conn: "nm-ipsec-l2tpd-10739" modecfgbanner=(null) opening file: /var/run/nm-ipsec-l2tp.10739/ipsec.conf loading named conns: nm-ipsec-l2tpd-10739 parse_src = 1, parse_gateway = 0, has_dst = 1 dst 128.100.3.113 via 172.17.254.254 dev p2p1 src 172.17.110.193 set addr: 172.17.110.193 002 "nm-ipsec-l2tpd-10739" #1: initiating Main Mode 104 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I1: initiate 003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [Dead Peer Detection] 003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [FRAGMENTATION] 003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [RFC 3947] 002 "nm-ipsec-l2tpd-10739" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) 002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 106 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I2: sent MI2, expecting MR2 003 "nm-ipsec-l2tpd-10739" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed 002 "nm-ipsec-l2tpd-10739" #1: Not sending INITIAL_CONTACT 002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 108 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I3: sent MI3, expecting MR3 003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [CAN-IKEv2] 002 "nm-ipsec-l2tpd-10739" #1: Main mode peer ID is ID_IPV4_ADDR: '128.100.3.113' 002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 004 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024} 002 "nm-ipsec-l2tpd-10739" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK+IKE_FRAG {using isakmp#1 msgid:a9d49713 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=no-pfs} 117 "nm-ipsec-l2tpd-10739" #2: STATE_QUICK_I1: initiate 002 "nm-ipsec-l2tpd-10739" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 004 "nm-ipsec-l2tpd-10739" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x4cfe8ef8 <0xb748de1f xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=128.100.3.113:4500 DPD=none} 002 forgetting secrets 002 loading secrets from "/etc/ipsec.secrets" 002 no secrets filename matched "/etc/ipsec.d/*.secrets" ** (nm-l2tp-service:10739): WARNING **: Possible error in IPSec setup. ** Message: ipsec ready for action ** Message: xl2tpd started with pid 10931 xl2tpd[10931]: setsockopt recvref[30]: Protocol not available xl2tpd[10931]: Using l2tp kernel support. xl2tpd[10931]: xl2tpd version xl2tpd-1.3.1 started on heedra.red.sandbox PID:10931 xl2tpd[10931]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc. xl2tpd[10931]: Forked by Scott Balmos and David Stipp, (C) 2001 xl2tpd[10931]: Inherited by Jeff McAdams, (C) 2002 xl2tpd[10931]: Forked again by Xelerance (www.xelerance.com) (C) 2006 xl2tpd[10931]: Listening on IP address 0.0.0.0, port 1701 xl2tpd[10931]: get_call: allocating new tunnel for host 128.100.3.113, port 1701. xl2tpd[10931]: Connecting to host 128.100.3.113, port 1701 xl2tpd[10931]: control_finish: message type is (null)(0). Tunnel is 0, call is 0. xl2tpd[10931]: control_finish: sending SCCRQ xl2tpd[10931]: handle_avps: handling avp's for tunnel 15930, call 0 xl2tpd[10931]: message_type_avp: message type 2 (Start-Control-Connection-Reply) xl2tpd[10931]: protocol_version_avp: peer is using version 1, revision 0. xl2tpd[10931]: framing_caps_avp: supported peer frames: async sync xl2tpd[10931]: bearer_caps_avp: supported peer bearers: xl2tpd[10931]: firmware_rev_avp: peer reports firmware version 1680 (0x0690) xl2tpd[10931]: hostname_avp: peer reports hostname 'l2tpfedora19-1.cs.toronto.edu' xl2tpd[10931]: vendor_avp: peer reports vendor 'xelerance.com' xl2tpd[10931]: assigned_tunnel_avp: using peer's tunnel 39567 xl2tpd[10931]: receive_window_size_avp: peer wants RWS of 4. Will use flow control. xl2tpd[10931]: control_finish: message type is Start-Control-Connection-Reply(2). Tunnel is 39567, call is 0. xl2tpd[10931]: control_finish: sending SCCCN xl2tpd[10931]: Connection established to 128.100.3.113, 1701. Local: 15930, Remote: 39567 (ref=0/0). xl2tpd[10931]: Calling on tunnel 15930 xl2tpd[10931]: control_finish: message type is (null)(0). Tunnel is 39567, call is 0. xl2tpd[10931]: control_finish: sending ICRQ xl2tpd[10931]: check_control: Received out of order control packet on tunnel 39567 (got 0, expected 1) xl2tpd[10931]: handle_packet: bad control packet! xl2tpd[10931]: network_thread: bad packet xl2tpd[10931]: handle_avps: handling avp's for tunnel 15930, call 47000 xl2tpd[10931]: message_type_avp: message type 11 (Incoming-Call-Reply) xl2tpd[10931]: assigned_call_avp: using peer's call 30592 xl2tpd[10931]: control_finish: message type is Incoming-Call-Reply(11). Tunnel is 39567, call is 30592. xl2tpd[10931]: control_finish: Sending ICCN xl2tpd[10931]: Call established with 128.100.3.113, Local: 47000, Remote: 30592, Serial: 1 (ref=0/0) ** Message: nm-l2tp-ppp-plugin: (plugin_init): initializing ** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 3 / phase 'serial connection' ** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 5 / phase 'establish' ** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 6 / phase 'authenticate' ** Message: nm-l2tp-ppp-plugin: (get_credentials): passwd-hook, requesting credentials... ** Message: nm-l2tp-ppp-plugin: (get_credentials): got credentials from NetworkManager-l2tp ** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 8 / phase 'network' ** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 9 / phase 'running' ** Message: nm-l2tp-ppp-plugin: (nm_ip_up): ip-up event ** Message: nm-l2tp-ppp-plugin: (nm_ip_up): sending Ip4Config to NetworkManager-l2tp... ** Message: L2TP service (IP Config Get) reply received. ** Message: Terminated l2tp daemon with PID 10931. xl2tpd[10931]: death_handler: Fatal signal 15 received xl2tpd[10931]: Connection 39567 closed to 128.100.3.113, port 1701 (Server closing) ** (nm-l2tp-service:10739): WARNING **: xl2tpd exited with error code 1 tail -f -n 0 /var/log/messages: Apr 1 15:53:54 heedra NetworkManager[671]: <info> VPN service 'l2tp' appeared; activating connections Apr 1 15:53:59 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (ConnectInteractive) reply received. Apr 1 15:53:59 heedra NetworkManager[671]: <info> VPN plugin state changed: starting (3) Apr 1 15:53:59 heedra systemd: Stopping Internet Key Exchange (IKE) Protocol Daemon for IPsec... Apr 1 15:53:59 heedra whack: 002 shutting down Apr 1 15:53:59 heedra systemd: Stopped Internet Key Exchange (IKE) Protocol Daemon for IPsec. Apr 1 15:53:59 heedra systemd: Starting Internet Key Exchange (IKE) Protocol Daemon for IPsec... Apr 1 15:53:59 heedra kernel: [ 6118.945165] intel_rng: FWH not detected Apr 1 15:53:59 heedra kernel: intel_rng: FWH not detected Apr 1 15:53:59 heedra systemd: Started Internet Key Exchange (IKE) Protocol Daemon for IPsec. Apr 1 15:54:00 heedra ipsec_starter[10901]: Warning: ignored obsolete keyword 'force_keepalive' Apr 1 15:54:00 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (Connect) reply received. Apr 1 15:54:02 heedra pppd[10933]: Plugin /usr/lib/pppd/2.4.5/nm-l2tp-pppd-plugin.so loaded. Apr 1 15:54:02 heedra pppd[10933]: Plugin pppol2tp.so loaded. Apr 1 15:54:02 heedra pppd[10933]: pppd 2.4.5 started by cks, uid 0 Apr 1 15:54:02 heedra pppd[10933]: Using interface ppp0 Apr 1 15:54:02 heedra pppd[10933]: Connect: ppp0 <--> Apr 1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): new Generic device (driver: 'unknown' ifindex: 8) Apr 1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): exported as /org/freedesktop/NetworkManager/Devices/7 Apr 1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): No existing connection detected. Apr 1 15:54:02 heedra /etc/gdm/Xsession: JS LOG: Removing a network device that was not added Apr 1 15:54:02 heedra /etc/gdm/Xsession: JS LOG: Invalid network device type, is 14 Apr 1 15:54:05 heedra pppd[10933]: CHAP authentication succeeded Apr 1 15:54:05 heedra pppd[10933]: peer from calling number 128.100.3.113 authorized Apr 1 15:54:05 heedra pppd[10933]: local IP address 172.17.30.8 Apr 1 15:54:05 heedra pppd[10933]: remote IP address 172.17.30.1 Apr 1 15:54:05 heedra pppd[10933]: primary DNS address 128.100.3.250 Apr 1 15:54:05 heedra pppd[10933]: secondary DNS address 128.100.3.251 Apr 1 15:54:05 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (IP4 Config Get) reply received from old-style plugin. Apr 1 15:54:05 heedra NetworkManager[671]: <info> VPN Gateway: 128.100.3.113 Apr 1 15:54:05 heedra NetworkManager[671]: <info> Tunnel Device: ppp0 Apr 1 15:54:05 heedra NetworkManager[671]: <info> IPv4 configuration: Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal Address: 172.17.30.8 Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal Prefix: 32 Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal Point-to-Point Address: 172.17.30.1 Apr 1 15:54:05 heedra NetworkManager[671]: <info> Maximum Segment Size (MSS): 0 Apr 1 15:54:05 heedra NetworkManager[671]: <info> Forbid Default Route: no Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal DNS: 128.100.3.250 Apr 1 15:54:05 heedra NetworkManager[671]: <info> Internal DNS: 128.100.3.251 Apr 1 15:54:05 heedra NetworkManager[671]: <info> DNS Domain: '(none)' Apr 1 15:54:05 heedra NetworkManager[671]: <info> No IPv6 configuration Apr 1 15:54:05 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (IP Config Get) complete. Apr 1 15:54:05 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' Apr 1 15:54:05 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' Apr 1 15:54:05 heedra systemd: Starting Network Manager Script Dispatcher Service... Apr 1 15:54:05 heedra NetworkManager[671]: <info> VPN plugin state changed: started (4) Apr 1 15:54:05 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Apr 1 15:54:05 heedra dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Apr 1 15:54:05 heedra systemd: Started Network Manager Script Dispatcher Service. Apr 1 15:54:05 heedra systemd: Unit iscsi.service cannot be reloaded because it is inactive. Apr 1 15:54:05 heedra nm-dispatcher.action: Job for iscsi.service failed. See 'systemctl status iscsi.service' and 'journalctl -xn' for details. Apr 1 15:54:05 heedra systemd: Stopping Sendmail Mail Transport Client... Apr 1 15:54:05 heedra systemd: Stopping Sendmail Mail Transport Agent... Apr 1 15:54:05 heedra systemd: Starting Sendmail Mail Transport Agent... Apr 1 15:54:05 heedra systemd: Started Sendmail Mail Transport Agent. Apr 1 15:54:05 heedra systemd: Starting Sendmail Mail Transport Client... Apr 1 15:54:05 heedra systemd: Started Sendmail Mail Transport Client. Apr 1 15:54:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service' Apr 1 15:54:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service' Apr 1 15:54:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory. Apr 1 15:54:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory. Apr 1 15:54:19 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' Apr 1 15:54:19 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' Apr 1 15:54:19 heedra systemd: Starting Network Manager Script Dispatcher Service... Apr 1 15:54:19 heedra avahi-daemon[564]: Withdrawing workstation service for ppp0. Apr 1 15:54:19 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Apr 1 15:54:19 heedra dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' Apr 1 15:54:19 heedra systemd: Started Network Manager Script Dispatcher Service. Apr 1 15:54:19 heedra systemd: Stopping Sendmail Mail Transport Client... Apr 1 15:54:19 heedra systemd: Stopping Sendmail Mail Transport Agent... Apr 1 15:54:19 heedra systemd: Starting Sendmail Mail Transport Agent... Apr 1 15:54:19 heedra systemd: Started Sendmail Mail Transport Agent. Apr 1 15:54:19 heedra systemd: Starting Sendmail Mail Transport Client... Apr 1 15:54:19 heedra systemd: Started Sendmail Mail Transport Client. Apr 1 15:54:39 heedra NetworkManager[671]: <info> VPN service 'l2tp' disappeared Apr 1 15:56:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service' Apr 1 15:56:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory. Apr 1 15:56:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service' Apr 1 15:56:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Use attachments for logs
Oops, sorry. Will do in the future. For these logs, do you need them regenerated and recreated as attachments or is the current state usable?
Hello, Fedora 20 same issue NetworkManager-l2tp.x86_64 0:0.9.8.6-1.fc20. Fedora 20 same issue NetworkManager-l2tp.x86_64 0:0.9.8-4.fc20 is ok. I will update you with more logs if needed. Server is openswan centos rhel-6.5 Regards, Lukas
This message is a reminder that Fedora 20 is nearing its end of life. Approximately 4 (four) weeks from now Fedora will stop maintaining and issuing updates for Fedora 20. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a Fedora 'version' of '20'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later Fedora version. Thank you for reporting this issue and we are sorry that we were not able to fix it before Fedora 20 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged change the 'version' to a later Fedora version prior this bug is closed as described in the policy above. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete.
seems that problem in Fedora 22 is the same
(In reply to j.c from comment #8) > seems that problem in Fedora 22 is the same l2tp connection with PSK key, configured using network manager "activation of network connection failed"
NetworkManager-l2tp-1.0.2-1.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-54c8a74b61
NetworkManager-l2tp-1.0.2-1.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-54c8a74b61
NetworkManager-l2tp-1.0.2-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.