Bug 1083223 - NetworkManager-l2tp 0.9.8.6-1.fc20 can't establish L2TP connections
Summary: NetworkManager-l2tp 0.9.8.6-1.fc20 can't establish L2TP connections
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: NetworkManager-l2tp
Version: 22
Hardware: i686
OS: Linux
unspecified
high
Target Milestone: ---
Assignee: Ivan Romanov
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-04-01 17:33 UTC by Chris Siebenmann
Modified: 2016-06-02 14:56 UTC (History)
5 users (show)

Fixed In Version: NetworkManager-l2tp-1.0.2-1.fc23
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-06-02 14:56:11 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Chris Siebenmann 2014-04-01 17:33:49 UTC
Description of problem:
The current version of NetworkManager-l2tp can't establish L2TP connections
to our L2TP server. Older versions (such as the version from the Fedora 20
distro CD) work fine.

This is not a SELinux problem; I have SELinux disabled on my machine.

Version-Release number of selected component (if applicable):

NetworkManager-l2tp 0.9.8.6-1.fc20

How reproducible:

Completely. All attempts to bring up L2TP connections with 0.9.8.6-1
fail.

Additional info:

I have logs of both failing and succeeding L2TP connections but I don't
know which portions of them are meaningful (and they're big) so I'm going
to defer attaching them for now. Let me know which bits are relevant (or if
people want everything from /var/log/messages for a connection attempt).

Comment 1 Ivan Romanov 2014-04-01 19:42:40 UTC
Include following information in bugreport:

Output of the following commands:

uname -a
rpm -q NetworkManager-l2tp xl2tpd ppp NetworkManager-openswan libreswan

Add log output in debug mode:

In one terminal start command

sudo /usr/libexec/nm-l2tp-service --debug

In other terminal start command

tail -f -n 0 /var/log/messages

Start your VPN connection and wait while it establishes or fails and plus 5-10 sec. Then copy output from previous commands.

Attention: in output of first command (nm-l2tp-service --debug) can appears your password! Remove it!

Comment 2 Chris Siebenmann 2014-04-01 19:52:04 UTC
Output from uname -a and rpm -q, for the version of NetworkManager-l2tp
that fails:

Linux heedra.red.sandbox 3.13.7-200.fc20.i686+PAE #1 SMP Mon Mar 24 22:18:14 UTC 2014 i686 i686 i386 GNU/Linux
NetworkManager-l2tp-0.9.8.6-1.fc20.i686
xl2tpd-1.3.1-14.fc20.i686
ppp-2.4.5-33.fc20.i686
NetworkManager-openswan-0.9.8.0-1.fc20.i686
libreswan-3.8-1.fc20.i686

Output for /usr/libexec/nm-l2tp-service --debug (dumped to a file
with both standard error and standard output):

** Message: nm-l2tp-service (version 0.9.8.5) starting...
connection
	name : "connection"
	id : "CSLab L2TP" (s)
	uuid : "6668f5ee-a0cd-490e-a7f5-674dc58821d7" (s)
	interface-name : NULL (sd)
	type : "vpn" (s)
	permissions : user:cks: (s)
	autoconnect : FALSE (s)
	timestamp : 1389809684 (s)
	read-only : FALSE (sd)
	zone : NULL (sd)
	master : NULL (sd)
	slave-type : NULL (sd)
	secondaries :  (sd)
	gateway-ping-timeout : 0 (sd)


vpn
	name : "vpn"
	service-type : "org.freedesktop.NetworkManager.l2tp" (s)
	user-name : "cks" (s)
	data : password-flags=1,ipsec-group-name=GroupVPN,require-mppe-128=yes,ipsec-psk=computerscienceipsec,user=cks,refuse-eap=yes,refuse-chap=yes,ipsec-enabled=yes,gateway=l2tp1.cs.toronto.edu,refuse-pap=yes (s)
	secrets : password=XXXXXXXXX (s)


ipv4
	name : "ipv4"
	method : "auto" (s)
	dns :  (s)
	dns-search :  (sd)
	addresses :  (s)
	routes :  (s)
	ignore-auto-routes : FALSE (sd)
	ignore-auto-dns : FALSE (sd)
	dhcp-client-id : NULL (sd)
	dhcp-send-hostname : TRUE (sd)
	dhcp-hostname : NULL (sd)
	never-default : FALSE (sd)
	may-fail : TRUE (sd)


ppp
	name : "ppp"
	noauth : TRUE (sd)
	refuse-eap : FALSE (sd)
	refuse-pap : FALSE (sd)
	refuse-chap : FALSE (sd)
	refuse-mschap : FALSE (sd)
	refuse-mschapv2 : FALSE (sd)
	nobsdcomp : FALSE (sd)
	nodeflate : FALSE (sd)
	no-vj-comp : FALSE (sd)
	require-mppe : FALSE (sd)
	require-mppe-128 : FALSE (sd)
	mppe-stateful : FALSE (sd)
	crtscts : FALSE (sd)
	baud : 0 (sd)
	mru : 1200 (s)
	mtu : 1200 (s)
	lcp-echo-failure : 0 (sd)
	lcp-echo-interval : 0 (sd)


** Message: Use '128.100.3.113' as a gateway
** Message: Check port 1701
** Message: ipsec enable flag: yes
** Message: starting ipsec
Redirecting to: systemctl stop+start ipsec.service
whack: Pluto is not running (no "/var/run/pluto/pluto.ctl")
002 forgetting secrets
002 loading secrets from "/etc/ipsec.secrets"
Warning: ignored obsolete keyword 'force_keepalive'
debugging mode enabled
end of file /var/run/nm-ipsec-l2tp.10372/ipsec.conf
Warning: ignored obsolete keyword 'force_keepalive'
Loading conn nm-ipsec-l2tpd-10372
connection's  policy label: (null)
starter: case KH_DEFAULTROUTE: empty
conn: "nm-ipsec-l2tpd-10372" loopback=0
conn: "nm-ipsec-l2tpd-10372" labeled_ipsec=0
conn: "nm-ipsec-l2tpd-10372" policy_label=(null)
conn: "nm-ipsec-l2tpd-10372" modecfgdomain=(null)
conn: "nm-ipsec-l2tpd-10372" modecfgbanner=(null)
opening file: /var/run/nm-ipsec-l2tp.10372/ipsec.conf
loading named conns: nm-ipsec-l2tpd-10372
parse_src = 1, parse_gateway = 0, has_dst = 1
dst 128.100.3.113 via 172.17.254.254 dev p2p1 src 172.17.110.193
set addr: 172.17.110.193
002 "nm-ipsec-l2tpd-10372" #1: initiating Main Mode
104 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I1: initiate
003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [Dead Peer Detection]
003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [FRAGMENTATION]
003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [RFC 3947]
002 "nm-ipsec-l2tpd-10372" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
106 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "nm-ipsec-l2tpd-10372" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed
002 "nm-ipsec-l2tpd-10372" #1: Not sending INITIAL_CONTACT
002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
108 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I3: sent MI3, expecting MR3
003 "nm-ipsec-l2tpd-10372" #1: received Vendor ID payload [CAN-IKEv2]
002 "nm-ipsec-l2tpd-10372" #1: Main mode peer ID is ID_IPV4_ADDR: '128.100.3.113'
002 "nm-ipsec-l2tpd-10372" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
004 "nm-ipsec-l2tpd-10372" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
002 "nm-ipsec-l2tpd-10372" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK+IKE_FRAG {using isakmp#1 msgid:2a90be35 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=no-pfs}
117 "nm-ipsec-l2tpd-10372" #2: STATE_QUICK_I1: initiate
002 "nm-ipsec-l2tpd-10372" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "nm-ipsec-l2tpd-10372" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x6af2cab3 <0xc65a3429 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=128.100.3.113:4500 DPD=none}
002 forgetting secrets
002 loading secrets from "/etc/ipsec.secrets"
002 no secrets filename matched "/etc/ipsec.d/*.secrets"

tail -f -n -0 /var/log/messages output:

Apr  1 15:47:37 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (ConnectInteractive) reply received.
Apr  1 15:47:37 heedra NetworkManager[671]: <info> VPN plugin state changed: starting (3)
Apr  1 15:47:37 heedra systemd: Stopping Internet Key Exchange (IKE) Protocol Daemon for IPsec...
Apr  1 15:47:37 heedra whack: 002 shutting down
Apr  1 15:47:37 heedra systemd: Stopped Internet Key Exchange (IKE) Protocol Daemon for IPsec.
Apr  1 15:47:37 heedra systemd: Starting Internet Key Exchange (IKE) Protocol Daemon for IPsec...
Apr  1 15:47:37 heedra kernel: [ 5736.804714] intel_rng: FWH not detected
Apr  1 15:47:37 heedra kernel: intel_rng: FWH not detected
Apr  1 15:47:37 heedra systemd: Started Internet Key Exchange (IKE) Protocol Daemon for IPsec.
Apr  1 15:47:38 heedra ipsec_starter[10542]: Warning: ignored obsolete keyword 'force_keepalive'
Apr  1 15:47:38 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (Connect) reply received.
Apr  1 15:47:38 heedra NetworkManager[671]: <warn> VPN connection 'CSLab L2TP' failed to connect: 'Possible error in IPSec setup.'.
Apr  1 15:47:45 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service'
Apr  1 15:47:45 heedra dbus[598]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service'
Apr  1 15:47:45 heedra systemd: Starting Fingerprint Authentication Daemon...
Apr  1 15:47:45 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'net.reactivated.Fprint'
Apr  1 15:47:45 heedra dbus[598]: [system] Successfully activated service 'net.reactivated.Fprint'
Apr  1 15:47:45 heedra systemd: Started Fingerprint Authentication Daemon.
Apr  1 15:47:45 heedra fprintd: Launching FprintObject
Apr  1 15:47:45 heedra fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint
Apr  1 15:47:45 heedra fprintd: ** Message: entering main loop
Apr  1 15:47:47 heedra su: (to root) cks on pts/2
Apr  1 15:47:58 heedra NetworkManager[671]: <info> VPN service 'l2tp' disappeared
Apr  1 15:48:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr  1 15:48:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr  1 15:48:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr  1 15:48:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr  1 15:48:15 heedra fprintd: ** Message: No devices in use, exit

Comment 3 Chris Siebenmann 2014-04-01 19:57:46 UTC
Reverting to NetworkManager-l2tp-0.9.8-4.fc20.i686 (from the Fedora 20 CD,
the intermediate update since then is not available to me), the logged results
are:

nm-l2tp-service output:

** Message: nm-l2tp-service (version 0.9.8.0) starting...
connection
	name : "connection"
	id : "CSLab L2TP" (s)
	uuid : "6668f5ee-a0cd-490e-a7f5-674dc58821d7" (s)
	interface-name : NULL (sd)
	type : "vpn" (s)
	permissions : user:cks: (s)
	autoconnect : FALSE (s)
	timestamp : 1389809684 (s)
	read-only : FALSE (sd)
	zone : NULL (sd)
	master : NULL (sd)
	slave-type : NULL (sd)
	secondaries :  (sd)
	gateway-ping-timeout : 0 (sd)


vpn
	name : "vpn"
	service-type : "org.freedesktop.NetworkManager.l2tp" (s)
	user-name : "cks" (s)
	data : password-flags=1,ipsec-group-name=GroupVPN,require-mppe-128=yes,ipsec-psk=computerscienceipsec,user=cks,refuse-eap=yes,refuse-chap=yes,ipsec-enabled=yes,gateway=l2tp1.cs.toronto.edu,refuse-pap=yes (s)
	secrets : password=XXXXXXXXX (s)


ipv4
	name : "ipv4"
	method : "auto" (s)
	dns :  (s)
	dns-search :  (sd)
	addresses :  (s)
	routes :  (s)
	ignore-auto-routes : FALSE (sd)
	ignore-auto-dns : FALSE (sd)
	dhcp-client-id : NULL (sd)
	dhcp-send-hostname : TRUE (sd)
	dhcp-hostname : NULL (sd)
	never-default : FALSE (sd)
	may-fail : TRUE (sd)


ppp
	name : "ppp"
	noauth : TRUE (sd)
	refuse-eap : FALSE (sd)
	refuse-pap : FALSE (sd)
	refuse-chap : FALSE (sd)
	refuse-mschap : FALSE (sd)
	refuse-mschapv2 : FALSE (sd)
	nobsdcomp : FALSE (sd)
	nodeflate : FALSE (sd)
	no-vj-comp : FALSE (sd)
	require-mppe : FALSE (sd)
	require-mppe-128 : FALSE (sd)
	mppe-stateful : FALSE (sd)
	crtscts : FALSE (sd)
	baud : 0 (sd)
	mru : 1200 (s)
	mtu : 1200 (s)
	lcp-echo-failure : 0 (sd)
	lcp-echo-interval : 0 (sd)


** Message: Use '128.100.3.113' as a gateway
** Message: Check port 1701
** Message: ipsec enable flag: yes
** Message: starting ipsec
Redirecting to: systemctl stop+start ipsec.service
whack: Pluto is not running (no "/var/run/pluto/pluto.ctl")
002 forgetting secrets
002 loading secrets from "/etc/ipsec.secrets"
Warning: ignored obsolete keyword 'force_keepalive'
debugging mode enabled
end of file /var/run/nm-ipsec-l2tp.10739/ipsec.conf
Warning: ignored obsolete keyword 'force_keepalive'
Loading conn nm-ipsec-l2tpd-10739
connection's  policy label: (null)
starter: case KH_DEFAULTROUTE: empty
conn: "nm-ipsec-l2tpd-10739" loopback=0
conn: "nm-ipsec-l2tpd-10739" labeled_ipsec=0
conn: "nm-ipsec-l2tpd-10739" policy_label=(null)
conn: "nm-ipsec-l2tpd-10739" modecfgdomain=(null)
conn: "nm-ipsec-l2tpd-10739" modecfgbanner=(null)
opening file: /var/run/nm-ipsec-l2tp.10739/ipsec.conf
loading named conns: nm-ipsec-l2tpd-10739
parse_src = 1, parse_gateway = 0, has_dst = 1
dst 128.100.3.113 via 172.17.254.254 dev p2p1 src 172.17.110.193
set addr: 172.17.110.193
002 "nm-ipsec-l2tpd-10739" #1: initiating Main Mode
104 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I1: initiate
003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [Dead Peer Detection]
003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [FRAGMENTATION]
003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [RFC 3947]
002 "nm-ipsec-l2tpd-10739" #1: enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal)
002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
106 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "nm-ipsec-l2tpd-10739" #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed
002 "nm-ipsec-l2tpd-10739" #1: Not sending INITIAL_CONTACT
002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
108 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I3: sent MI3, expecting MR3
003 "nm-ipsec-l2tpd-10739" #1: received Vendor ID payload [CAN-IKEv2]
002 "nm-ipsec-l2tpd-10739" #1: Main mode peer ID is ID_IPV4_ADDR: '128.100.3.113'
002 "nm-ipsec-l2tpd-10739" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
004 "nm-ipsec-l2tpd-10739" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
002 "nm-ipsec-l2tpd-10739" #2: initiating Quick Mode PSK+ENCRYPT+UP+IKEv2ALLOW+SAREFTRACK+IKE_FRAG {using isakmp#1 msgid:a9d49713 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=no-pfs}
117 "nm-ipsec-l2tpd-10739" #2: STATE_QUICK_I1: initiate
002 "nm-ipsec-l2tpd-10739" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "nm-ipsec-l2tpd-10739" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP/NAT=>0x4cfe8ef8 <0xb748de1f xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=128.100.3.113:4500 DPD=none}
002 forgetting secrets
002 loading secrets from "/etc/ipsec.secrets"
002 no secrets filename matched "/etc/ipsec.d/*.secrets"

** (nm-l2tp-service:10739): WARNING **: Possible error in IPSec setup.
** Message: ipsec ready for action
** Message: xl2tpd started with pid 10931
xl2tpd[10931]: setsockopt recvref[30]: Protocol not available
xl2tpd[10931]: Using l2tp kernel support.
xl2tpd[10931]: xl2tpd version xl2tpd-1.3.1 started on heedra.red.sandbox PID:10931
xl2tpd[10931]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
xl2tpd[10931]: Forked by Scott Balmos and David Stipp, (C) 2001
xl2tpd[10931]: Inherited by Jeff McAdams, (C) 2002
xl2tpd[10931]: Forked again by Xelerance (www.xelerance.com) (C) 2006
xl2tpd[10931]: Listening on IP address 0.0.0.0, port 1701
xl2tpd[10931]: get_call: allocating new tunnel for host 128.100.3.113, port 1701.
xl2tpd[10931]: Connecting to host 128.100.3.113, port 1701
xl2tpd[10931]: control_finish: message type is (null)(0).  Tunnel is 0, call is 0.
xl2tpd[10931]: control_finish: sending SCCRQ
xl2tpd[10931]: handle_avps: handling avp's for tunnel 15930, call 0
xl2tpd[10931]: message_type_avp: message type 2 (Start-Control-Connection-Reply)
xl2tpd[10931]: protocol_version_avp: peer is using version 1, revision 0.
xl2tpd[10931]: framing_caps_avp: supported peer frames: async sync
xl2tpd[10931]: bearer_caps_avp: supported peer bearers:
xl2tpd[10931]: firmware_rev_avp: peer reports firmware version 1680 (0x0690)
xl2tpd[10931]: hostname_avp: peer reports hostname 'l2tpfedora19-1.cs.toronto.edu'
xl2tpd[10931]: vendor_avp: peer reports vendor 'xelerance.com'
xl2tpd[10931]: assigned_tunnel_avp: using peer's tunnel 39567
xl2tpd[10931]: receive_window_size_avp: peer wants RWS of 4.  Will use flow control.
xl2tpd[10931]: control_finish: message type is Start-Control-Connection-Reply(2).  Tunnel is 39567, call is 0.
xl2tpd[10931]: control_finish: sending SCCCN
xl2tpd[10931]: Connection established to 128.100.3.113, 1701.  Local: 15930, Remote: 39567 (ref=0/0).
xl2tpd[10931]: Calling on tunnel 15930
xl2tpd[10931]: control_finish: message type is (null)(0).  Tunnel is 39567, call is 0.
xl2tpd[10931]: control_finish: sending ICRQ
xl2tpd[10931]: check_control: Received out of order control packet on tunnel 39567 (got 0, expected 1)
xl2tpd[10931]: handle_packet: bad control packet!
xl2tpd[10931]: network_thread: bad packet
xl2tpd[10931]: handle_avps: handling avp's for tunnel 15930, call 47000
xl2tpd[10931]: message_type_avp: message type 11 (Incoming-Call-Reply)
xl2tpd[10931]: assigned_call_avp: using peer's call 30592
xl2tpd[10931]: control_finish: message type is Incoming-Call-Reply(11).  Tunnel is 39567, call is 30592.
xl2tpd[10931]: control_finish: Sending ICCN
xl2tpd[10931]: Call established with 128.100.3.113, Local: 47000, Remote: 30592, Serial: 1 (ref=0/0)
** Message: nm-l2tp-ppp-plugin: (plugin_init): initializing
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 3 / phase 'serial connection'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 5 / phase 'establish'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 6 / phase 'authenticate'
** Message: nm-l2tp-ppp-plugin: (get_credentials): passwd-hook, requesting credentials...
** Message: nm-l2tp-ppp-plugin: (get_credentials): got credentials from NetworkManager-l2tp
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 8 / phase 'network'
** Message: nm-l2tp-ppp-plugin: (nm_phasechange): status 9 / phase 'running'
** Message: nm-l2tp-ppp-plugin: (nm_ip_up): ip-up event
** Message: nm-l2tp-ppp-plugin: (nm_ip_up): sending Ip4Config to NetworkManager-l2tp...
** Message: L2TP service (IP Config Get) reply received.
** Message: Terminated l2tp daemon with PID 10931.
xl2tpd[10931]: death_handler: Fatal signal 15 received
xl2tpd[10931]: Connection 39567 closed to 128.100.3.113, port 1701 (Server closing)

** (nm-l2tp-service:10739): WARNING **: xl2tpd exited with error code 1

tail -f -n 0 /var/log/messages:

Apr  1 15:53:54 heedra NetworkManager[671]: <info> VPN service 'l2tp' appeared; activating connections
Apr  1 15:53:59 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (ConnectInteractive) reply received.
Apr  1 15:53:59 heedra NetworkManager[671]: <info> VPN plugin state changed: starting (3)
Apr  1 15:53:59 heedra systemd: Stopping Internet Key Exchange (IKE) Protocol Daemon for IPsec...
Apr  1 15:53:59 heedra whack: 002 shutting down
Apr  1 15:53:59 heedra systemd: Stopped Internet Key Exchange (IKE) Protocol Daemon for IPsec.
Apr  1 15:53:59 heedra systemd: Starting Internet Key Exchange (IKE) Protocol Daemon for IPsec...
Apr  1 15:53:59 heedra kernel: [ 6118.945165] intel_rng: FWH not detected
Apr  1 15:53:59 heedra kernel: intel_rng: FWH not detected
Apr  1 15:53:59 heedra systemd: Started Internet Key Exchange (IKE) Protocol Daemon for IPsec.
Apr  1 15:54:00 heedra ipsec_starter[10901]: Warning: ignored obsolete keyword 'force_keepalive'
Apr  1 15:54:00 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (Connect) reply received.
Apr  1 15:54:02 heedra pppd[10933]: Plugin /usr/lib/pppd/2.4.5/nm-l2tp-pppd-plugin.so loaded.
Apr  1 15:54:02 heedra pppd[10933]: Plugin pppol2tp.so loaded.
Apr  1 15:54:02 heedra pppd[10933]: pppd 2.4.5 started by cks, uid 0
Apr  1 15:54:02 heedra pppd[10933]: Using interface ppp0
Apr  1 15:54:02 heedra pppd[10933]: Connect: ppp0 <-->
Apr  1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): new Generic device (driver: 'unknown' ifindex: 8)
Apr  1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): exported as /org/freedesktop/NetworkManager/Devices/7
Apr  1 15:54:02 heedra NetworkManager[671]: <info> (ppp0): No existing connection detected.
Apr  1 15:54:02 heedra /etc/gdm/Xsession: JS LOG: Removing a network device that was not added
Apr  1 15:54:02 heedra /etc/gdm/Xsession: JS LOG: Invalid network device type, is 14
Apr  1 15:54:05 heedra pppd[10933]: CHAP authentication succeeded
Apr  1 15:54:05 heedra pppd[10933]: peer from calling number 128.100.3.113 authorized
Apr  1 15:54:05 heedra pppd[10933]: local  IP address 172.17.30.8
Apr  1 15:54:05 heedra pppd[10933]: remote IP address 172.17.30.1
Apr  1 15:54:05 heedra pppd[10933]: primary   DNS address 128.100.3.250
Apr  1 15:54:05 heedra pppd[10933]: secondary DNS address 128.100.3.251
Apr  1 15:54:05 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (IP4 Config Get) reply received from old-style plugin.
Apr  1 15:54:05 heedra NetworkManager[671]: <info> VPN Gateway: 128.100.3.113
Apr  1 15:54:05 heedra NetworkManager[671]: <info> Tunnel Device: ppp0
Apr  1 15:54:05 heedra NetworkManager[671]: <info> IPv4 configuration:
Apr  1 15:54:05 heedra NetworkManager[671]: <info>   Internal Address: 172.17.30.8
Apr  1 15:54:05 heedra NetworkManager[671]: <info>   Internal Prefix: 32
Apr  1 15:54:05 heedra NetworkManager[671]: <info>   Internal Point-to-Point Address: 172.17.30.1
Apr  1 15:54:05 heedra NetworkManager[671]: <info>   Maximum Segment Size (MSS): 0
Apr  1 15:54:05 heedra NetworkManager[671]: <info>   Forbid Default Route: no
Apr  1 15:54:05 heedra NetworkManager[671]: <info>   Internal DNS: 128.100.3.250
Apr  1 15:54:05 heedra NetworkManager[671]: <info>   Internal DNS: 128.100.3.251
Apr  1 15:54:05 heedra NetworkManager[671]: <info>   DNS Domain: '(none)'
Apr  1 15:54:05 heedra NetworkManager[671]: <info> No IPv6 configuration
Apr  1 15:54:05 heedra NetworkManager[671]: <info> VPN connection 'CSLab L2TP' (IP Config Get) complete.
Apr  1 15:54:05 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service'
Apr  1 15:54:05 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service'
Apr  1 15:54:05 heedra systemd: Starting Network Manager Script Dispatcher Service...
Apr  1 15:54:05 heedra NetworkManager[671]: <info> VPN plugin state changed: started (4)
Apr  1 15:54:05 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Apr  1 15:54:05 heedra dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Apr  1 15:54:05 heedra systemd: Started Network Manager Script Dispatcher Service.
Apr  1 15:54:05 heedra systemd: Unit iscsi.service cannot be reloaded because it is inactive.
Apr  1 15:54:05 heedra nm-dispatcher.action: Job for iscsi.service failed. See 'systemctl status iscsi.service' and 'journalctl -xn' for details.
Apr  1 15:54:05 heedra systemd: Stopping Sendmail Mail Transport Client...
Apr  1 15:54:05 heedra systemd: Stopping Sendmail Mail Transport Agent...
Apr  1 15:54:05 heedra systemd: Starting Sendmail Mail Transport Agent...
Apr  1 15:54:05 heedra systemd: Started Sendmail Mail Transport Agent.
Apr  1 15:54:05 heedra systemd: Starting Sendmail Mail Transport Client...
Apr  1 15:54:05 heedra systemd: Started Sendmail Mail Transport Client.
Apr  1 15:54:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr  1 15:54:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr  1 15:54:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr  1 15:54:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr  1 15:54:19 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service'
Apr  1 15:54:19 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service'
Apr  1 15:54:19 heedra systemd: Starting Network Manager Script Dispatcher Service...
Apr  1 15:54:19 heedra avahi-daemon[564]: Withdrawing workstation service for ppp0.
Apr  1 15:54:19 heedra dbus-daemon: dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Apr  1 15:54:19 heedra dbus[598]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Apr  1 15:54:19 heedra systemd: Started Network Manager Script Dispatcher Service.
Apr  1 15:54:19 heedra systemd: Stopping Sendmail Mail Transport Client...
Apr  1 15:54:19 heedra systemd: Stopping Sendmail Mail Transport Agent...
Apr  1 15:54:19 heedra systemd: Starting Sendmail Mail Transport Agent...
Apr  1 15:54:19 heedra systemd: Started Sendmail Mail Transport Agent.
Apr  1 15:54:19 heedra systemd: Starting Sendmail Mail Transport Client...
Apr  1 15:54:19 heedra systemd: Started Sendmail Mail Transport Client.
Apr  1 15:54:39 heedra NetworkManager[671]: <info> VPN service 'l2tp' disappeared
Apr  1 15:56:11 heedra dbus-daemon: dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr  1 15:56:11 heedra dbus-daemon: dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.
Apr  1 15:56:11 heedra dbus[598]: [system] Activating via systemd: service name='org.freedesktop.ModemManager1' unit='dbus-org.freedesktop.ModemManager1.service'
Apr  1 15:56:11 heedra dbus[598]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.ModemManager1.service': Unit dbus-org.freedesktop.ModemManager1.service failed to load: No such file or directory.

Comment 4 Ivan Romanov 2014-04-02 03:21:50 UTC
Use attachments for logs

Comment 5 Chris Siebenmann 2014-04-02 03:30:35 UTC
Oops, sorry. Will do in the future. For these logs, do you need them
regenerated and recreated as attachments or is the current state usable?

Comment 6 Lukas Herbolt 2014-05-08 19:46:44 UTC
Hello,

Fedora 20 same issue NetworkManager-l2tp.x86_64 0:0.9.8.6-1.fc20. 
Fedora 20 same issue NetworkManager-l2tp.x86_64 0:0.9.8-4.fc20 is ok.
I will update you with more logs if needed.

Server is openswan centos rhel-6.5

Regards,
Lukas

Comment 7 Fedora End Of Life 2015-05-29 11:25:53 UTC
This message is a reminder that Fedora 20 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 20. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as EOL if it remains open with a Fedora  'version'
of '20'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 20 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 8 j.c 2015-06-01 05:47:35 UTC
seems that problem in Fedora 22 is the same

Comment 9 j.c 2015-06-08 14:04:15 UTC
(In reply to j.c from comment #8)
> seems that problem in Fedora 22 is the same

l2tp connection with PSK key, configured using network manager

"activation of network connection failed"

Comment 10 Fedora Update System 2016-05-30 16:50:55 UTC
NetworkManager-l2tp-1.0.2-1.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-54c8a74b61

Comment 11 Fedora Update System 2016-05-31 09:53:18 UTC
NetworkManager-l2tp-1.0.2-1.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-54c8a74b61

Comment 12 Fedora Update System 2016-06-02 14:55:56 UTC
NetworkManager-l2tp-1.0.2-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.