robert-woodward
March 18th, 2014, 05:50 PM
Hi All,
I have been pulling my hair out with this now for some time, I can connect to my server using the less secure PPTP, but would much prefer to upgrade to using L2TP / IPSEC. My network layout is as follows:
Internal Network <===> eth0 (DHCP Server 192.168.80.1 range 192.168.80.2 - 192.168.80.159) Ubuntu Server eth1 (DHCP Client - 94.173.XXX.XXX) <======> WWW <=====> Android Mobile (O2 UK)
192.168.80.XX
Note: I do have a Virginmedia Superhub in modem mode, which I am assured by lots of Googling should be fine! and I have also Googled on O2 UK allowing VPN traffic, as well as Android 4.3 issues, all of which I believe are good to go.
/etc/sysctl.conf
net.ipv4.ip_forward=1
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.conf.eth0.send_redirects = 0
net.ipv4.conf.eth1.send_redirects = 0
net.ipv4.conf.lo.send_redirects = 0
net.ipv4.conf.default.accept_redirects = 0
net.ipv4.conf.eth0.accept_redirects = 0
net.ipv4.conf.eth1.accept_redirects = 0
net.ipv4.conf.lo.accept_redirects = 0
/etc/ipsec.conf
version 2.0
config setup
dumpdir=/var/run/pluto/
nat_traversal=yes
oe=off
protostack=netkey
virtual_private=%v4:10.0.0.0/8,%v4:192.168.80.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8
plutostderrlog=/var/log/pluto.log
nhelpers=0
conn L2TP-PSK-NAT
rightsubnet=vhost:%priv
also=L2TP-PSK-noNAT
conn L2TP-PSK-noNAT
authby=secret
pfs=no
auto=add
keyingtries=3
rekey=no
ikelifetime=8h
keylife=1h
type=transport
left=94.173.XXX.XXX #eth1 ip address
leftprotoport=17/1701
right=%any
rightprotoport=17/%any
dpddelay=15
dpdtimeout=30
dpdaction=clear
/etc/ipsec.secrets
94.173.XXX.XXX %any: PSK "MyVeryStrongPasswordHere!"
/etc/xl2tpd/xl2tpd.conf
[global]
ipsec saref = no
listen-addr = 94.173.XXX.XXX
port = 1701
debug tunnel = yes
debug avp = yes
debug packet = yes
debug network = yes
debug state = yes
[lns default]
ip range = 192.168.80.201-192.168.80.249
local ip = 192.168.80.200
refuse chap = yes
refuse pap = yes
require authentication = yes
ppp debug = yes
pppoptfile = /etc/ppp/options.xl2tpd
length bit = yes
/etc/ppp/options.xl2tpd
require-mschap-v2
ipcp-accept-remote
ms-dns 8.8.8.8
ms-dns 8.8.4.4
asyncmap 0
auth
#crtscts
lock
hide-password
noccp
modem
dump
logfile /var/log/xl2tpd.log
logfd 2
idle 1800
mtu 1410
mru 1410
name l2tpd
proxyarp
lcp-echo-interval 30
lcp-echo-failure 4
connect-delay 5000
and finally...
/etc/ppp/chap-secrets
# Secrets for authentication using CHAP
# client server secret IP addresses
testUser l2tpd MyVerySafePassword *
in /var/log/ I get the following:
pluto.log
Plutorun started on Tue Mar 18 13:02:10 GMT 2014
adjusting ipsec.d to /etc/ipsec.d
Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:20365
LEAK_DETECTIVE support [disabled]
OCF support for IKE [disabled]
SAref support [disabled]: Protocol not available
SAbind support [disabled]: Protocol not available
NSS support [disabled]
HAVE_STATSD notification support not compiled in
Setting NAT-Traversal port-4500 floating to on
port floating activation criteria nat_t=1/port_float=1
NAT-Traversal support [enabled]
using /dev/urandom as source of random entropy
ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
no helpers will be started, all cryptographic operations will be done inline
Using Linux 2.6 IPsec interface code on 3.11.0-18-generic (experimental code)
ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
added connection description "L2TP-PSK-NAT"
added connection description "L2TP-PSK-noNAT"
listening for IKE messages
adding interface eth1/eth1 94.173.XXX.XXX:500
adding interface eth1/eth1 94.173.XXX.XXX:4500
adding interface eth0/eth0 192.168.80.1:500
adding interface eth0/eth0 192.168.80.1:4500
adding interface lo/lo 127.0.0.1:500
adding interface lo/lo 127.0.0.1:4500
adding interface lo/lo ::1:500
loading secrets from "/etc/ipsec.secrets"
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [RFC 3947] method set to=115
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 82.132.XXX.XXX:56526: ignoring Vendor ID payload [FRAGMENTATION 80000000]
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [Dead Peer Detection]
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: responding to Main Mode from unknown peer 82.132.XXX.XXX
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: STATE_MAIN_R1: sent MR1, expecting MI2
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): peer is NATed
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: STATE_MAIN_R2: sent MR2, expecting MI3
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: Main mode peer ID is ID_IPV4_ADDR: '10.90.104.208'
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: switched from "L2TP-PSK-NAT" to "L2TP-PSK-NAT"
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: deleting connection "L2TP-PSK-NAT" instance with peer 82.132.XXX.XXX {isakmp=#0/ipsec=#0}
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: new NAT mapping for #1, was 82.132.XXX.XXX:56526, now 82.132.XXX.XXX:56527
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: Dead Peer Detection (RFC 3706): enabled
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: received and ignored informational message
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: the peer proposed: 94.173.XXX.XXX/32:17/1701 -> 10.90.104.208/32:17/0
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: responding to Quick Mode proposal {msgid:194007dc}
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: us: 94.173.XXX.XXX<94.173.XXX.XXX>:17/1701
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: them: 82.132.XXX.XXX[10.90.104.208]:17/0===10.90.104.208/32
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: Dead Peer Detection (RFC 3706): enabled
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x04c60f9e <0x79137141 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=82.132.XXX.XXX:56527 DPD=enabled}
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: DPD: No response from peer - declaring peer dead
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: DPD: Clearing Connection
"L2TP-PSK-NAT" #2: deleting state (STATE_QUICK_R2)
"L2TP-PSK-NAT" #1: deleting state (STATE_MAIN_R3)
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX: deleting connection "L2TP-PSK-NAT" instance with peer 82.132.XXX.XXX {isakmp=#0/ipsec=#0}
ERROR: asynchronous network error report on eth1 (sport=4500) for message to 82.132.XXX.XXX port 56527, complainant 82.132.XXX.XXX: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
ERROR: asynchronous network error report on eth1 (sport=4500) for message to 82.132.XXX.XXX port 56527, complainant 82.132.XXX.XXX: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
ERROR: asynchronous network error report on eth1 (sport=4500) for message to 82.132.XXX.XXX port 56527, complainant 82.132.XXX.XXX: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
ERROR: asynchronous network error report on eth1 (sport=4500) for message to 82.132.XXX.XXX port 56527, complainant 82.132.XXX.XXX: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
Which I'm pretty sure the "STATE_QUICK_R2: IPsec SA established transport mode" part means I have successfully established the connection, just need to authenticate! It is some time before the "DPD: No response from peer - declaring peer dead" line appears.
But...... syslog / auth.log are both dormant, nothing at all from XL2TPD after it's initial start-up in syslog
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25772]: IPsec SAref does not work with L2TP kernel mode yet, enabling forceuserspace=yes
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25772]: setsockopt recvref[30]: Protocol not available
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25772]: This binary does not support kernel L2TP.
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: xl2tpd version xl2tpd-1.3.1 started on Ubuntu-Server PID:25773
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Forked by Scott Balmos and David Stipp, (C) 2001
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Inherited by Jeff McAdams, (C) 2002
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Forked again by Xelerance (www.xelerance.com) (C) 2006
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Listening on IP address 94.173.XXX.XXX, port 1701
extra iptables commands issued:
iptables -I INPUT -p UDP --dport 4500 -j ACCEPT
iptables -I INPUT -p UDP --dport 500 -j ACCEPT
iptables -I INPUT --protocol ESP --in-interface eth1 --jump ACCEPT
Can any of you see if there's anything wrong / missing with the set up please?! I'd really like to get this up and running!! Even be happy to change to Certificates if it's know to be more reliable, and anyone can tell me how to set it up!!!!
Thanks in advance.
I have been pulling my hair out with this now for some time, I can connect to my server using the less secure PPTP, but would much prefer to upgrade to using L2TP / IPSEC. My network layout is as follows:
Internal Network <===> eth0 (DHCP Server 192.168.80.1 range 192.168.80.2 - 192.168.80.159) Ubuntu Server eth1 (DHCP Client - 94.173.XXX.XXX) <======> WWW <=====> Android Mobile (O2 UK)
192.168.80.XX
Note: I do have a Virginmedia Superhub in modem mode, which I am assured by lots of Googling should be fine! and I have also Googled on O2 UK allowing VPN traffic, as well as Android 4.3 issues, all of which I believe are good to go.
/etc/sysctl.conf
net.ipv4.ip_forward=1
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.conf.eth0.send_redirects = 0
net.ipv4.conf.eth1.send_redirects = 0
net.ipv4.conf.lo.send_redirects = 0
net.ipv4.conf.default.accept_redirects = 0
net.ipv4.conf.eth0.accept_redirects = 0
net.ipv4.conf.eth1.accept_redirects = 0
net.ipv4.conf.lo.accept_redirects = 0
/etc/ipsec.conf
version 2.0
config setup
dumpdir=/var/run/pluto/
nat_traversal=yes
oe=off
protostack=netkey
virtual_private=%v4:10.0.0.0/8,%v4:192.168.80.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8
plutostderrlog=/var/log/pluto.log
nhelpers=0
conn L2TP-PSK-NAT
rightsubnet=vhost:%priv
also=L2TP-PSK-noNAT
conn L2TP-PSK-noNAT
authby=secret
pfs=no
auto=add
keyingtries=3
rekey=no
ikelifetime=8h
keylife=1h
type=transport
left=94.173.XXX.XXX #eth1 ip address
leftprotoport=17/1701
right=%any
rightprotoport=17/%any
dpddelay=15
dpdtimeout=30
dpdaction=clear
/etc/ipsec.secrets
94.173.XXX.XXX %any: PSK "MyVeryStrongPasswordHere!"
/etc/xl2tpd/xl2tpd.conf
[global]
ipsec saref = no
listen-addr = 94.173.XXX.XXX
port = 1701
debug tunnel = yes
debug avp = yes
debug packet = yes
debug network = yes
debug state = yes
[lns default]
ip range = 192.168.80.201-192.168.80.249
local ip = 192.168.80.200
refuse chap = yes
refuse pap = yes
require authentication = yes
ppp debug = yes
pppoptfile = /etc/ppp/options.xl2tpd
length bit = yes
/etc/ppp/options.xl2tpd
require-mschap-v2
ipcp-accept-remote
ms-dns 8.8.8.8
ms-dns 8.8.4.4
asyncmap 0
auth
#crtscts
lock
hide-password
noccp
modem
dump
logfile /var/log/xl2tpd.log
logfd 2
idle 1800
mtu 1410
mru 1410
name l2tpd
proxyarp
lcp-echo-interval 30
lcp-echo-failure 4
connect-delay 5000
and finally...
/etc/ppp/chap-secrets
# Secrets for authentication using CHAP
# client server secret IP addresses
testUser l2tpd MyVerySafePassword *
in /var/log/ I get the following:
pluto.log
Plutorun started on Tue Mar 18 13:02:10 GMT 2014
adjusting ipsec.d to /etc/ipsec.d
Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:20365
LEAK_DETECTIVE support [disabled]
OCF support for IKE [disabled]
SAref support [disabled]: Protocol not available
SAbind support [disabled]: Protocol not available
NSS support [disabled]
HAVE_STATSD notification support not compiled in
Setting NAT-Traversal port-4500 floating to on
port floating activation criteria nat_t=1/port_float=1
NAT-Traversal support [enabled]
using /dev/urandom as source of random entropy
ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
no helpers will be started, all cryptographic operations will be done inline
Using Linux 2.6 IPsec interface code on 3.11.0-18-generic (experimental code)
ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
added connection description "L2TP-PSK-NAT"
added connection description "L2TP-PSK-noNAT"
listening for IKE messages
adding interface eth1/eth1 94.173.XXX.XXX:500
adding interface eth1/eth1 94.173.XXX.XXX:4500
adding interface eth0/eth0 192.168.80.1:500
adding interface eth0/eth0 192.168.80.1:4500
adding interface lo/lo 127.0.0.1:500
adding interface lo/lo 127.0.0.1:4500
adding interface lo/lo ::1:500
loading secrets from "/etc/ipsec.secrets"
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [RFC 3947] method set to=115
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 82.132.XXX.XXX:56526: ignoring Vendor ID payload [FRAGMENTATION 80000000]
packet from 82.132.XXX.XXX:56526: received Vendor ID payload [Dead Peer Detection]
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: responding to Main Mode from unknown peer 82.132.XXX.XXX
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: STATE_MAIN_R1: sent MR1, expecting MI2
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): peer is NATed
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: STATE_MAIN_R2: sent MR2, expecting MI3
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: Main mode peer ID is ID_IPV4_ADDR: '10.90.104.208'
"L2TP-PSK-NAT"[1] 82.132.XXX.XXX #1: switched from "L2TP-PSK-NAT" to "L2TP-PSK-NAT"
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: deleting connection "L2TP-PSK-NAT" instance with peer 82.132.XXX.XXX {isakmp=#0/ipsec=#0}
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: new NAT mapping for #1, was 82.132.XXX.XXX:56526, now 82.132.XXX.XXX:56527
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: Dead Peer Detection (RFC 3706): enabled
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: received and ignored informational message
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: the peer proposed: 94.173.XXX.XXX/32:17/1701 -> 10.90.104.208/32:17/0
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: responding to Quick Mode proposal {msgid:194007dc}
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: us: 94.173.XXX.XXX<94.173.XXX.XXX>:17/1701
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: them: 82.132.XXX.XXX[10.90.104.208]:17/0===10.90.104.208/32
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: Dead Peer Detection (RFC 3706): enabled
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x04c60f9e <0x79137141 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=82.132.XXX.XXX:56527 DPD=enabled}
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: DPD: No response from peer - declaring peer dead
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX #1: DPD: Clearing Connection
"L2TP-PSK-NAT" #2: deleting state (STATE_QUICK_R2)
"L2TP-PSK-NAT" #1: deleting state (STATE_MAIN_R3)
"L2TP-PSK-NAT"[2] 82.132.XXX.XXX: deleting connection "L2TP-PSK-NAT" instance with peer 82.132.XXX.XXX {isakmp=#0/ipsec=#0}
ERROR: asynchronous network error report on eth1 (sport=4500) for message to 82.132.XXX.XXX port 56527, complainant 82.132.XXX.XXX: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
ERROR: asynchronous network error report on eth1 (sport=4500) for message to 82.132.XXX.XXX port 56527, complainant 82.132.XXX.XXX: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
ERROR: asynchronous network error report on eth1 (sport=4500) for message to 82.132.XXX.XXX port 56527, complainant 82.132.XXX.XXX: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
ERROR: asynchronous network error report on eth1 (sport=4500) for message to 82.132.XXX.XXX port 56527, complainant 82.132.XXX.XXX: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
Which I'm pretty sure the "STATE_QUICK_R2: IPsec SA established transport mode" part means I have successfully established the connection, just need to authenticate! It is some time before the "DPD: No response from peer - declaring peer dead" line appears.
But...... syslog / auth.log are both dormant, nothing at all from XL2TPD after it's initial start-up in syslog
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25772]: IPsec SAref does not work with L2TP kernel mode yet, enabling forceuserspace=yes
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25772]: setsockopt recvref[30]: Protocol not available
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25772]: This binary does not support kernel L2TP.
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: xl2tpd version xl2tpd-1.3.1 started on Ubuntu-Server PID:25773
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Forked by Scott Balmos and David Stipp, (C) 2001
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Inherited by Jeff McAdams, (C) 2002
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Forked again by Xelerance (www.xelerance.com) (C) 2006
Mar 18 16:33:01 Ubuntu-Server xl2tpd[25773]: Listening on IP address 94.173.XXX.XXX, port 1701
extra iptables commands issued:
iptables -I INPUT -p UDP --dport 4500 -j ACCEPT
iptables -I INPUT -p UDP --dport 500 -j ACCEPT
iptables -I INPUT --protocol ESP --in-interface eth1 --jump ACCEPT
Can any of you see if there's anything wrong / missing with the set up please?! I'd really like to get this up and running!! Even be happy to change to Certificates if it's know to be more reliable, and anyone can tell me how to set it up!!!!
Thanks in advance.