Activity log for bug #1238597

Date Who What changed Old value New value Message
2013-10-11 10:55:20 AndreK bug added bug
2013-11-21 11:33:20 AndreK description Oct 11 12:52:37.685 ipsec_setup: Stopping Openswan IPsec... Oct 11 12:52:39.513 xl2tpd[25729]: death_handler: Fatal signal 15 received Oct 11 12:52:39.513 Stopping xl2tpd: xl2tpd. Oct 11 12:52:39.536 ipsec_setup: Starting Openswan IPsec U2.6.38/K3.11.0-12-generic... Oct 11 12:52:39.776 ipsec__plutorun: Starting Pluto subsystem... Oct 11 12:52:39.779 ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d Oct 11 12:52:39.783 recvref[30]: Protocol not available Oct 11 12:52:39.783 xl2tpd[26000]: This binary does not support kernel L2TP. Oct 11 12:52:39.783 Starting xl2tpd: xl2tpd. Oct 11 12:52:39.784 xl2tpd[26005]: xl2tpd version xl2tpd-1.3.1 started on andre-OptiPlex-990 PID:26005 Oct 11 12:52:39.784 xl2tpd[26005]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc. Oct 11 12:52:39.785 xl2tpd[26005]: Forked by Scott Balmos and David Stipp, (C) 2001 Oct 11 12:52:39.785 xl2tpd[26005]: Inherited by Jeff McAdams, (C) 2002 Oct 11 12:52:39.785 xl2tpd[26005]: Forked again by Xelerance (www.xelerance.com) (C) 2006 Oct 11 12:52:39.785 xl2tpd[26005]: Listening on IP address 0.0.0.0, port 1701 Oct 11 12:52:39.818 ipsec__plutorun: 002 added connection description "Valhall" Oct 11 12:52:40.160 104 "Valhall" #1: STATE_MAIN_I1: initiate Oct 11 12:52:40.160 003 "Valhall" #1: received Vendor ID payload [RFC 3947] method set to=115 Oct 11 12:52:40.161 003 "Valhall" #1: received Vendor ID payload [Dead Peer Detection] Oct 11 12:52:40.161 003 "Valhall" #1: ignoring unknown Vendor ID payload [8299031757a36082c6a621de00040290] Oct 11 12:52:40.161 106 "Valhall" #1: STATE_MAIN_I2: sent MI2, expecting MR2 Oct 11 12:52:40.161 003 "Valhall" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): i am NATed Oct 11 12:52:40.161 108 "Valhall" #1: STATE_MAIN_I3: sent MI3, expecting MR3 Oct 11 12:52:40.162 004 "Valhall" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024} Oct 11 12:52:40.162 117 "Valhall" #2: STATE_QUICK_I1: initiate Oct 11 12:52:40.162 003 "Valhall" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=35c29287 Oct 11 12:52:40.162 003 "Valhall" #2: NAT-Traversal: received 2 NAT-OA. ignored because peer is not NATed Oct 11 12:52:40.162 004 "Valhall" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP=>0xbe11c479 <0x2484ce23 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=none DPD=none} Oct 11 12:52:41.165 xl2tpd[26005]: Connecting to host wpn.dyndns.org, port 1701 Oct 11 12:52:41.234 xl2tpd[26005]: Connection established to xx.xx.52.199, 1701. Local: 16159, Remote: 49 (ref=0/0). Oct 11 12:52:41.235 xl2tpd[26005]: Calling on tunnel 16159 Oct 11 12:52:41.307 xl2tpd[26005]: Call established with xx.xx.52.199, Local: 8472, Remote: 50, Serial: 1 (ref=0/0) Oct 11 12:52:41.308 xl2tpd[26005]: start_pppd: I'm running: Oct 11 12:52:41.308 xl2tpd[26005]: "/usr/sbin/pppd" Oct 11 12:52:41.308 xl2tpd[26005]: "passive" Oct 11 12:52:41.308 xl2tpd[26005]: "nodetach" Oct 11 12:52:41.308 xl2tpd[26005]: ":" Oct 11 12:52:41.309 xl2tpd[26005]: "file" Oct 11 12:52:41.309 xl2tpd[26005]: "/etc/ppp/Valhall.options.xl2tpd" Oct 11 12:52:41.309 xl2tpd[26005]: "ipparam" Oct 11 12:52:41.309 xl2tpd[26005]: "xx.xx.52.199" Oct 11 12:52:41.310 xl2tpd[26005]: "/dev/pts/7" Oct 11 12:52:41.310 xl2tpd[26057]: start_pppd: Exec of /usr/sbin/pppd failed! Oct 11 12:52:41.310 xl2tpd[26005]: child_handler : pppd exited for call 50 with code 1 Oct 11 12:52:41.311 xl2tpd[26005]: call_close: Call 8472 to xx.xx.52.199 disconnected Oct 11 12:52:41.376 xl2tpd[26005]: Terminating pppd: sending TERM signal to pid 26057 Oct 11 12:52:41.403 xl2tpd[26005]: get_call: can't find call 8472 in tunnel 16159#012 (ref=0/0) I used L2TP IPsec VPN Manager until upgrading to 13.10 it worked. now it does not work. The l2tp/ipsec server (Fortigate firewall, logs everything as just fine, then says the client disconnected.) The line "IPCP terminated by peer (Unauthorized remote IP address)" - makes no sense, the IP is provided by the FW, and is from the right pool. also, FW does not log any problem. Finally: connecting to the same FW using Android - works fine. Nov 21 11:58:16.839 ipsec_setup: Stopping Openswan IPsec... Nov 21 11:58:18.580 Stopping xl2tpd: xl2tpd. Nov 21 11:58:18.581 xl2tpd[19495]: death_handler: Fatal signal 15 received Nov 21 11:58:18.612 ipsec_setup: Starting Openswan IPsec U2.6.38/K3.11.0-13-generic... Nov 21 11:58:18.886 ipsec_plutorun: Starting Pluto subsystem... Nov 21 11:58:18.892 ipsec_plutorun: adjusting ipsec.d to /etc/ipsec.d Nov 21 11:58:18.900 recvref[30]: Protocol not available Nov 21 11:58:18.900 xl2tpd[21494]: This binary does not support kernel L2TP. Nov 21 11:58:18.901 xl2tpd[21497]: xl2tpd version xl2tpd-1.3.1 started on andre-OptiPlex-990 PID:21497 Nov 21 11:58:18.902 xl2tpd[21497]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc. Nov 21 11:58:18.902 xl2tpd[21497]: Forked by Scott Balmos and David Stipp, (C) 2001 Nov 21 11:58:18.902 xl2tpd[21497]: Inherited by Jeff McAdams, (C) 2002 Nov 21 11:58:18.902 xl2tpd[21497]: Forked again by Xelerance (www.xelerance.com) (C) 2006 Nov 21 11:58:18.902 xl2tpd[21497]: Listening on IP address 0.0.0.0, port 1701 Nov 21 11:58:18.903 Starting xl2tpd: xl2tpd. Nov 21 11:58:19.031 ipsec__plutorun: 002 added connection description "Valhall" Nov 21 11:58:19.386 104 "Valhall" #1: STATE_MAIN_I1: initiate Nov 21 11:58:19.387 003 "Valhall" #1: received Vendor ID payload [RFC 3947] method set to=115 Nov 21 11:58:19.387 003 "Valhall" #1: received Vendor ID payload [Dead Peer Detection] Nov 21 11:58:19.387 003 "Valhall" #1: ignoring unknown Vendor ID payload [8299031757a36082c6a621de000402a0] Nov 21 11:58:19.387 106 "Valhall" #1: STATE_MAIN_I2: sent MI2, expecting MR2 Nov 21 11:58:19.388 003 "Valhall" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): i am NATed Nov 21 11:58:19.388 108 "Valhall" #1: STATE_MAIN_I3: sent MI3, expecting MR3 Nov 21 11:58:19.388 004 "Valhall" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024} Nov 21 11:58:19.388 117 "Valhall" #2: STATE_QUICK_I1: initiate Nov 21 11:58:19.388 003 "Valhall" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME msgid=0530bd3b Nov 21 11:58:19.389 003 "Valhall" #2: NAT-Traversal: received 2 NAT-OA. ignored because peer is not NATed Nov 21 11:58:19.389 004 "Valhall" #2: STATE_QUICK_I2: sent QI2, IPsec SA established transport mode {ESP=>0xea9d24b4 <0xc36d9ff6 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=none DPD=none} Nov 21 11:58:20.391 xl2tpd[21497]: Connecting to host mydomain.com, port 1701 Nov 21 11:58:20.461 xl2tpd[21497]: Connection established to x.x.x.199, 1701. Local: 46031, Remote: 3 (ref=0/0). Nov 21 11:58:20.461 xl2tpd[21497]: Calling on tunnel 46031 Nov 21 11:58:20.529 xl2tpd[21497]: Call established with x.x.x.199, Local: 65516, Remote: 4, Serial: 1 (ref=0/0) Nov 21 11:58:20.529 xl2tpd[21497]: start_pppd: I'm running: Nov 21 11:58:20.530 xl2tpd[21497]: "/usr/sbin/pppd" Nov 21 11:58:20.530 xl2tpd[21497]: "passive" Nov 21 11:58:20.530 xl2tpd[21497]: "nodetach" Nov 21 11:58:20.530 xl2tpd[21497]: ":" Nov 21 11:58:20.531 xl2tpd[21497]: "file" Nov 21 11:58:20.531 xl2tpd[21497]: "/etc/ppp/Valhall.options.xl2tpd" Nov 21 11:58:20.531 xl2tpd[21497]: "ipparam" Nov 21 11:58:20.531 xl2tpd[21497]: "x.x.x.199" Nov 21 11:58:20.532 xl2tpd[21497]: "/dev/pts/5" Nov 21 11:58:20.539 pppd[21544]: Plugin passprompt.so loaded. Nov 21 11:58:20.547 pppd[21544]: pppd 2.4.5 started by root, uid 0 Nov 21 11:58:20.548 pppd[21544]: Using interface ppp0 Nov 21 11:58:20.548 pppd[21544]: Connect: ppp0 <--> /dev/pts/5 Nov 21 11:58:23.693 pppd[21544]: Deflate (15) compression enabled Nov 21 11:58:23.754 pppd[21544]: local IP address 192.168.1.141 Nov 21 11:58:23.755 pppd[21544]: remote IP address 192.168.1.140 Nov 21 11:58:23.755 pppd[21544]: primary DNS address x.x.x.x Nov 21 11:58:23.755 pppd[21544]: secondary DNS address x.x.x.x Nov 21 11:58:23.761 pppd[21544]: IPCP terminated by peer (Unauthorized remote IP address) Nov 21 11:58:23.761 pppd[21544]: Connect time 0.0 minutes. Nov 21 11:58:23.762 pppd[21544]: Sent 0 bytes, received 34 bytes. Nov 21 11:58:23.831 pppd[21544]: LCP terminated by peer (No network protocols running) Nov 21 11:58:24.048 xl2tpd[21497]: control_finish: Connection closed to x.x.x.199, serial 1 () Nov 21 11:58:24.049 xl2tpd[21497]: Terminating pppd: sending TERM signal to pid 21544 Nov 21 11:58:24.049 pppd[21544]: Modem hangup Nov 21 11:58:24.049 pppd[21544]: Connection terminated. Nov 21 11:58:24.074 pppd[21544]: Terminating on signal 15 Nov 21 11:58:24.075 pppd[21544]: Exit.