Illegal Parameter Number in Definition of Test. N L.73 End{itemize}

View previous topic :: View side by side topic
Author Message
Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Mon Aug 18, 2014 8:56 am   Postal service subject: VPN Client not connecting [SOLVED] Reply with quote

Hi in that location,

For the past week and a scrap I accept been trying to connect to my function VPN, without success. The instructions for connecting presume the client is a Windows 7 organization.

The vpn is "IPSec (L2TP/IPSEC)" using a Pre-Shared Key.

For the purpose of this mail I will use faux details and values:

gateway: vpn.function.com
PSK: vpn-role-com
username: your-login-username
password: your-login-countersign
domain (optional): office-proper noun

What I have tried and so far, includes:

compiled every IPSEC kernel module -> No observable difference.

KVPN -> Gives an mistake racoon config error and then a long list of other debug info which as information technology is security related I don't want mail service indiscriminately.

VPNC -> reports "No responce from target"
Cisco and regular UPD
I have tried setting various ports to use, 47, l, 51, 443, 500, 1701, 1723, 10000

Strongswan -> the demon starts merely I cannot find evidence of a connection
ipsec.conf and ipsec.secret configured for the above details respectively.

I tin can only guess that this isn't a firewall consequence as a colleague who already connects to the vpn can only do then using a virtual machine running Windows 7. My colleague says this is because of
firewall and routing problems from his Linux desktop. My assertion beingness that the virtual machines has to pass through the host and any other firewall in his network.

Please assistance...

Last edited past Duco Ergo Sum on Tue October 14, 2014 12:eleven am; edited ane fourth dimension in total

Back to height

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Tue Aug 19, 2014 8:56 pm   Post subject field: Reply with quote

I wrote a Gentoo wiki commodity covering setting up the server side of it: https://wiki.gentoo.org/wiki/IPsec_L2TP_VPN_server . Because all the protocols (ipsec, lt2p and pppd) are peer-to-peer, configuring information technology on the customer side has a lot of similarities.
Dorsum to meridian

View user's profile Send private message

Duco Ergo Sum
Amateur
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Thu Aug 21, 2014 7:59 am   Post subject: Reply with quote

Give thanks yous.

I think what I need is the "Ipsec ID" (grouping id/name) parameter. I have a working Windows organization at present then I'll interrogate that.

Dorsum to superlative

View user's profile Send private message

Duco Ergo Sum
Amateur
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Mon Aug 25, 2014 ten:20 pm   Post subject: Reply with quote

This is actually frustrating.

I now have:


  • VPNC which times out without much indication of annihilation happening.
  • StrongSwan which starts just I don't see whatsoever sign of a VPN nor take I found a way to test it.
  • OpenL2TP which I've had to install an overlay (booboo) to get. This doesn't seem to be able to initiate sessions, tunnel id not found, while tunnel testify - shows the tunnel I configured.
  • NetworkManager seems to allow a sub-set of functionality in its configuration of different sub-systems simply information technology protests that its unable to find an agent when I try to offset a session.

Additionally, I've experimented with Windows. The initial setup is catchy merely the VPN works. No additional information needed. With security in mind I'thousand sure, they've hidden the config details from prying optics thus thwarting my plan to find the IP Sec ID there.

I am beginning to question if it this is a propriety MS VPN implementation or could my system be just missing ane niggling screw somewhere?

I have read the IPsec L2TP VPN server wiki page and attempted to adapt its wisdom to my needs just unfortunately unsuccessfully.

Please tell me how I can test a VPN connectedness, merely to see if information technology exists?

--
You know you lot really need aid when the voices tell y'all that you're becoming obsessed!

Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Wed Aug 27, 2014 3:39 am   Post subject area: Reply with quote

The kickoff, and most dificult layer, is the ipsec layer. Here's a simple config file you tin can suit. As the wiki page show, uncomment the "include" line at the very bottom of /etc/ipsec.conf and create a /etc/ipsec.d/office.vpn.com.conf with content similar to the following:
Code:

conn vpnclient
type=transport
authby=secret
pfs=no
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
right=vpn.office.com
rightprotoport=udp/l2tp
auto=add

Don't forgot to create a /etc/ipsec.d/role.vpn.com.secret file also:

Code:

vpn.office.com %whatever : PSK "vpn-part-com"

Then start the ipsec service, and bring upwards your connection with "ipsec auto --up vpnclient" If you get a line in the log similar to "STATE_QUICK_I2: Sent QI2, IPsec SA established...." and so you have ipsec connectivity.

ipsec is the hard role. Once yous've got that, the l2tp tunnel is much simpler.

Back to top

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Thu Aug 28, 2014 12:48 am   Post bailiwick: Reply with quote

Howdy Salahx,

Thanks for over again answering, I am very grateful.

The command 'ipsec up vpnclient' has been about illustrative. StrongSwan doesn't get a response from the part network either.

Code:

initiating IKE_SA vpn.office.com[1] to 17.xi.seven.5
generating IKE_SA_INIT request 0 [ SA KE No North(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from 1.2.iii.4[500] to 17.11.7.5[500] (996 bytes)
received package: from 17.11.7.v[500] to one.2.3.4[500] (68 bytes)
ignoring INFORMATIONAL_V1 IKEv1 exchange on IKEv2 SA
retransmit 1 of request with bulletin ID 0
sending packet: from i.two.3.4[500] to 17.11.7.5[500] (996 bytes)
received packet: from 17.eleven.vii.5[500] to 1.two.3.4[500] (68 bytes)
ignoring INFORMATIONAL_V1 IKEv1 exchange on IKEv2 SA
retransmit 2 of request with message ID 0
sending package: from 1.2.3.4[500] to 17.11.7.5[500] (996 bytes)
received parcel: from 17.11.seven.v[500] to one.2.three.4[500] (68 bytes)
ignoring INFORMATIONAL_V1 IKEv1 substitution on IKEv2 SA
retransmit three of request with bulletin ID 0
sending packet: from 1.2.3.4[500] to 17.eleven.7.5[500] (996 bytes)
received packet: from 17.xi.7.v[500] to one.2.3.four[500] (68 bytes)
ignoring INFORMATIONAL_V1 IKEv1 exchange on IKEv2 SA

[  ...  ]

giving upwards after 5 retransmits

So at present both VPNC and StrongSwan time out.

Food for thought.

Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Thu Aug 28, 2014 6:53 am   Post subject: Reply with quote

Its seeing SOMETHING on the other side, its just having problem negotiating with information technology. It appears its trying to negoitate an IKEv2 connection, but we want IKEv1.

So lets tweak the config a bit:

Code:

conn vpnclient
keyexchange=ikev1
type=send
authby=hush-hush
pfs=no
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
right=vpn.part.com
rightprotoport=udp/l2tp
auto=add
Back to meridian

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Thu Aug 28, 2014 8:49 am   Post subject: Reply with quote

Thanks.

We're making progress, new response message:

Lawmaking:

ipsec up vpn.office.com
initiating Main Way IKE_SA vpn.part.com[ane] to 17.11.7.5
generating ID_PROT request 0 [ SA V 5 V Five ]
sending packet: from 1.2.three.iv[500] to 17.11.vii.v[500] (220 bytes)
received packet: from 17.xi.7.5[500] to 1.two.iii.iv[500] (160 bytes)
parsed INFORMATIONAL_V1 request 0 [ N(NO_PROP) ]
received NO_PROPOSAL_CHOSEN error notify
establishing connectedness 'vpn.office.com' failed

My installed version of StrongSwan does not back up the

Code:
psf=no
cardinal word. Therefore this is what my config looks like at the moment:
Lawmaking:

conn vpn.role.com
keyexchange=ikev1
type=transport
authby=clandestine
esp=des-sha1-modp1024
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
right=vpn.role.com
rightprotoport=udp/l2tp
motorcar=add
Back to tiptop

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Thu Aug 28, 2014 9:12 am   Postal service subject: Reply with quote

Looking in Windows

Control Panel - Administrative Tools - Windows Firewall with Advanced Security - Windows Firewall Properites (IPsec Settings) - Customize IPsec Defaults (Primal exchange (Main Mode) - Advanced [Customize]) - Customize Avant-garde Central Exchange Settings

Code:

Security methods:
Integrity       Encryption          Key exchange algorithm
SHA-one          AES-CBC 128     Diffie-Hellman Group 2 (default)
SHA-ane          3DES                 Diffie-Hellman Group 2

I'm off to work at present merely will experiment with these values when I get back.

Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Thu Aug 28, 2014 4:14 pm   Post subject: Reply with quote

Its "pfs=no" not "psf=no". It doesn't matter anyway because the command is ignored under strongSwan and "no" is the default. You lot shouldn't demand the "esp=des-sha1-modp1024" as it should choose the correct method during proffer process. In fact that will negotate PFS which is Non what you want - Microsoft's IKEv1 daemon doesn't support PFS.

Note that Windows has 2 implementations of ipsec: the IKEv1 one used for l2tp tunnel, and and IKEv2 ane which is controlled via the ipsec snap-in. The windows Firewall and other ipsec settings refer to the latter, simply we want to apply the former.

Back to top

View user's profile Send private message

Duco Ergo Sum
Amateur
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Friday Aug 29, 2014 12:04 am   Mail subject: Reply with quote

Apologies, "psf" was a typo.

All the same, at present mater how I try to configure the pfs pick, I get the aforementioned result.

Code:

parsed INFORMATIONAL_V1 request 0 [ N(NO_PROP) ]
received NO_PROPOSAL_CHOSEN error notify
establishing connection 'vpn.office.com' failed
Dorsum to tiptop

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Friday Aug 29, 2014 12:xiv am   Postal service subject field: Reply with quote

pfs option is ignored in strongSwan anyway. But that "esp" line has to exist removed, considering i know its wrong. If the server However won't take whatsoever proposals offered by strongswan, even without the "esp" line there an "ike-browse" bundle in portage that should give some information on what proposals the gateway will accept.
Back to top

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Fri Aug 29, 2014 8:45 am   Postal service subject field: Reply with quote

Hi,

I take used IKE-Scan which prompted me to change my Config as below and this has generated the follow information.

ike-scan output

Code:

ike-scan --verbose vpn.office.com
DEBUG: pkt len=336 bytes, bandwidth=56000 bps, int=52000 us
Starting ike-scan 1.9 with one hosts (http://www.nta-monitor.com/tools/ike-browse/)
17.xi.7.five  Principal Mode Handshake returned HDR=(CKY-R=[Available On Request]) SA=(Enc=3DES Hash=SHA1 Group=ii:modp1024 Auth=PSK LifeType=Seconds LifeDuration=28800)
VID=[Available On Request] (IKE Fragmentation)

Ending ike-scan 1.9: ane hosts scanned in 0.037 seconds (27.14 hosts/sec).  1 returned handshake; 0 returned notify

New Config

Lawmaking:

conn vpn.office.com
keyexchange=ikev1
type=transport
authby=secret
ike=3des-sha1-modp1024
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
correct=vpn.office.com
rightprotoport=udp/l2tp
auto=add

ipsec output

Code:

ipsec upwardly vpn.function.com
initiating Main Mode IKE_SA vpn.office.com[three] to 17.11.vii.5
generating ID_PROT request 0 [ SA Five V V V ]
sending packet: from 1.two.three.4[500] to 17.11.7.5[500] (184 bytes)
received packet: from 17.xi.7.5[500] to 1.2.3.4[500] (116 bytes)
parsed ID_PROT response 0 [ SA V 5 ]
received typhoon-ietf-ipsec-nat-t-ike-02\due north vendor ID
received FRAGMENTATION vendor ID
generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
sending packet: from 1.2.iii.4[500] to 17.eleven.7.5[500] (244 bytes)
received packet: from 17.11.vii.five[500] to 1.2.three.4[500] (304 bytes)
parsed ID_PROT response 0 [ KE No Five V Five 5 NAT-D NAT-D ]
received Cisco Unity vendor ID
received XAuth vendor ID
received unknown vendor ID: [Bachelor On Asking]
received unknown vendor ID: [Available On Asking]
generating INFORMATIONAL_V1 request [Available On Request] [ Due north(INVAL_KE) ]
sending packet: from 1.2.three.4[500] to 17.eleven.7.5[500] (56 bytes)
establishing connection 'vpn.function.com' failed

Charon Log

Lawmaking:

Aug 29 09:xiv:39 sveta charon: 02[CFG] received stroke: initiate 'vpn.part.com'
Aug 29 09:14:39 sveta charon: 13[IKE] initiating Primary Style IKE_SA vpn.role.com[3] to 17.11.7.5
Aug 29 09:14:39 sveta charon: thirteen[IKE] initiating Main Manner IKE_SA vpn.role.com[3] to 17.11.7.5
Aug 29 09:14:39 sveta charon: 13[ENC] generating ID_PROT request 0 [ SA Five V Five V ]
Aug 29 09:xiv:39 sveta charon: 13[NET] sending packet: from 1.2.iii.4[500] to 17.11.vii.v[500] (184 bytes)
Aug 29 09:14:39 sveta charon: 06[Internet] received packet: from 17.11.vii.five[500] to one.2.3.4[500] (116 bytes)
Aug 29 09:14:39 sveta charon: 06[ENC] parsed ID_PROT response 0 [ SA V V ]
Aug 29 09:14:39 sveta charon: 06[IKE] received typhoon-ietf-ipsec-nat-t-ike-02\n vendor ID
Aug 29 09:14:39 sveta charon: 06[IKE] received FRAGMENTATION vendor ID
Aug 29 09:xiv:39 sveta charon: 06[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
Aug 29 09:14:39 sveta charon: 06[Cyberspace] sending packet: from 1.ii.3.4[500] to 17.xi.7.five[500] (244 bytes)
Aug 29 09:14:40 sveta charon: 05[NET] received parcel: from 17.11.7.v[500] to i.2.three.iv[500] (304 bytes)
Aug 29 09:fourteen:40 sveta charon: 05[ENC] parsed ID_PROT response 0 [ KE No V Five Five V NAT-D NAT-D ]
Aug 29 09:14:xl sveta charon: 05[IKE] received Cisco Unity vendor ID
Aug 29 09:14:twoscore sveta charon: 05[IKE] received XAuth vendor ID
Aug 29 09:14:40 sveta charon: 05[ENC] received unknown vendor ID: [Available On Asking]
Aug 29 09:14:40 sveta charon: 05[ENC] received unknown vendor ID: [Available On Request]
Aug 29 09:14:forty sveta charon: 05[ENC] generating INFORMATIONAL_V1 request [Bachelor On Asking] [ N(INVAL_KE) ]
Aug 29 09:14:40 sveta charon: 05[Net] sending packet: from 1.2.3.4[500] to 17.11.7.v[500] (56 bytes)
Back to meridian

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Fri Aug 29, 2014 3:12 pm   Post subject: Reply with quote

OK now its accepting the proposal only its having problem with the PSK. It probably has to exercise with how the VPN server is ideifying itself. So lets change the secrets file to
Lawmaking:
 : PSK "vpn-function-com"

This will make strongSwan use the key for all connections.
Back to top

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Fri Aug 29, 2014 9:51 pm   Post subject field: Reply with quote

Awesome! Thanks!
Code:

ipsec upwards vpn.office.com
initiating Primary Style IKE_SA vpn.office.com[1] to 17.eleven.seven.v
generating ID_PROT asking 0 [ SA 5 5 5 V ]
sending package: from one.2.iii.4[500] to 17.11.7.5[500] (184 bytes)
received packet: from 17.11.7.5[500] to 1.2.3.4[500] (116 bytes)
parsed ID_PROT response 0 [ SA 5 V ]
received draft-ietf-ipsec-nat-t-ike-02\due north vendor ID
received FRAGMENTATION vendor ID
generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
sending parcel: from ane.two.3.4[500] to 17.11.7.5[500] (244 bytes)
received packet: from 17.11.7.v[500] to i.ii.3.4[500] (304 bytes)
parsed ID_PROT response 0 [ KE No Five V V V NAT-D NAT-D ]
received Cisco Unity vendor ID
received XAuth vendor ID
received unknown vendor ID: [Available On Request]
received unknown vendor ID: [Available On Request]
local host is behind NAT, sending keep alives
generating ID_PROT asking 0 [ ID HASH ]
sending packet: from ane.2.3.4[4500] to 17.11.7.5[4500] (68 bytes)
received parcel: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
parsed ID_PROT response 0 [ ID HASH V ]
received DPD vendor ID
IDir '17.11.7.5' does not friction match to 'vpn.office.com'
deleting IKE_SA vpn.part.com[ane] between ane.2.3.four[1.2.3.4]...17.11.7.five[%any]
sending DELETE for IKE_SA vpn.office.com[1]
generating INFORMATIONAL_V1 asking [Available On Request] [ HASH D ]
sending packet: from 1.2.iii.four[4500] to 17.xi.vii.five[4500] (84 bytes)
connectedness 'vpn.part.com' established successfully

I have pinged my office PC and did not become any returned packets. I haven't attempted to prepare the L2TP layer yet but your guide says that is comparatively easy.

These lines though do worry me:

Code:

IDir '17.11.7.5' does not friction match to 'vpn.office.com'
deleting IKE_SA vpn.office.com[i] between 1.two.3.4[1.ii.3.four]...17.11.7.5[%whatsoever]
sending DELETE for IKE_SA vpn.office.com[1]
Back to superlative

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Fri Aug 29, 2014 eleven:03 pm   Post subject: Reply with quote

Were almost in that location, simply were not there nevertheless. This goes back with "how the server is identifty itself" problem with the PSK: Instead of identify itself via its name (vpn.example.com), information technology does so past its IP accost (17.eleven.7.5).

Nosotros just need to brand one tweak:

Code:

conn vpn.part.com
keyexchange=ikev1
type=ship
authby=secret
ike=3des-sha1-modp1024
rekey=no
left=%defaultroute
leftprotoport=udp/l2tp
right=vpn.office.com
rightprotoport=udp/l2tp
rightid=17.11.7.five
automobile=add together

Or failing that, change the value of "right=" from "vpn.office.com" to "17.eleven.7.five" instead. Note you lot still can't do annihilation with the connexion yet, every bit only L2TP packets will be passed across the ipsec link (thus you lot cannot ping annihilation across the link).

Back to height

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Sat Aug 30, 2014 5:21 pm   Mail service subject: Reply with quote

Perfect, next pace L2TP!
Code:

ipsec upwardly vpn.office.com
initiating Main Style IKE_SA vpn.office.com[i] to 17.eleven.vii.5
generating ID_PROT asking 0 [ SA 5 5 V V ]
sending packet: from i.ii.iii.4[500] to 17.xi.7.5[500] (184 bytes)
received packet: from 17.11.7.5[500] to 1.2.3.4[500] (116 bytes)
parsed ID_PROT response 0 [ SA V Five ]
received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
received FRAGMENTATION vendor ID
generating ID_PROT asking 0 [ KE No NAT-D NAT-D ]
sending package: from ane.two.iii.4[500] to 17.xi.7.5[500] (244 bytes)
received packet: from 17.11.7.5[500] to 1.2.3.iv[500] (304 bytes)
parsed ID_PROT response 0 [ KE No Five V V 5 NAT-D NAT-D ]
received Cisco Unity vendor ID
received XAuth vendor ID
received unknown vendor ID: [Available On Request]
received unknown vendor ID: [Available On Request]
local host is behind NAT, sending keep alives
generating ID_PROT asking 0 [ ID HASH ]
sending packet: from ane.2.3.4[4500] to 17.11.vii.v[4500] (68 bytes)
received packet: from 17.xi.7.5[4500] to ane.two.3.4[4500] (84 bytes)
parsed ID_PROT response 0 [ ID HASH 5 ]
received DPD vendor ID
IKE_SA vpn.office.com[i] established between i.ii.3.iv[i.2.3.4]...17.11.7.5[17.11.7.5]
generating QUICK_MODE asking [Available On Request] [ HASH SA No ID ID NAT-OA NAT-OA ]
sending parcel: from one.two.3.4[4500] to 17.eleven.7.5[4500] (220 bytes)
received packet: from 17.11.vii.5[4500] to ane.2.iii.4[4500] (180 bytes)
parsed QUICK_MODE response [Available On Request] [ HASH SA No ID ID N((24576)) NAT-OA ]
received 28800s lifetime, configured 0s
CHILD_SA vpn.office.com{1} established with SPIs [Available On Request] [Available On Asking] and TS ane.2.3.four/32[udp/l2tp] === 17.11.7.5/32[udp/l2tp]

connectedness 'vpn.office.com' established successfully

Thank you. I expect as soon equally I attempt L2TP I'll be back hither confused every bit ever. Either way, I'll report back.

Back to top

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Sabbatum Aug 30, 2014 10:04 pm   Post subject field: Reply with quote

I thought this might happen.

/etc/xl2tp/xl2tpd.conf

Code:

[global]                                                                ; Global parameters:
port = 1701                                                     ; * Demark to port 1701
; auth file = /etc/l2tpd/l2tp-secrets   ; * Where our challenge secrets are
admission command = no                                     ; * Refuse connections without IP match
; rand source = dev                     ; Source for entropy for random
;                                       ; numbers, options are:
;                                       ; dev - reads of /dev/urandom
;                                       ; sys - uses rand()
;                                       ; egd - reads from egd socket
;                                       ; egd is not yet implemented
;
[lns default]                                                   ; Our fallthrough LNS definition
; ip range = 192.168.0.1-192.168.0.20   ; * Classify from this IP range
; ip range = lac1-lac2                                  ; * And annihilation from lac1 to lac2's IP
; lac = 192.168.ane.4 - 192.168.i.8               ; * These can connect as LAC's
; no lac = untrusted.marko.net                  ; * This guy can't connect
; hidden chip = no                                               ; * Use hidden AVP'southward?
local ip = 1.2.iii.4                             ; * Our local IP to use
; refuse authentication = no                    ; * Refuse hallmark altogether
crave hallmark = yep                    ; * Require peer to authenticate
unix authentication = no                                ; * Utilise /etc/passwd for auth.
name = vpn.role.com                                                ; * Report this as our hostname
pppoptfile = /etc/ppp/options.l2tpd         ; * ppp options file

/etc/ppp/options.l2tpd

Code:

noccp
auth
crtscts
mtu 1410
mru 1410
nodefaultroute
lock
proxyarp
silent

I started xl2tpd with: /etc/init.d/xl2tpd start

So cypher, I'm sure I'one thousand missing something this is a client after all and your instructions are for a server. Then shut!

Dorsum to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Dominicus Aug 31, 2014 eight:46 am   Post subject: Reply with quote

Configuring an l2tp the customer is a different that the server - thakfully client side is even easier:

The /etc/xl2tpd/xl2tpd.conf is even simpler then the server one:

Code:

[lac vpnclient]
lns = vpn.office.com
pppoptfile = /etc/ppp/options.xl2tpd.client

Y'all may not need the /etc/ppp/options.xl2tpd.client file (in which case comment that line out), but if you do, here's ane that should piece of work:

Code:

ipcp-accept-local
ipcp-accept-remote
refuse-eap
crave-mschap-v2
noccp
noauth
mtu 1410
mru 1410
nodefaultroute
usepeerdns
lock
#debug

Get-go up the xl2tpd service, then initiate a connexion:

Code:
xl2tpd-command connect vpnclient Office-Proper noun\\your-login-username your-login-password

Note TWO backslashes (the Function-Name\\ part may be optinal)

xl2tpd may fail with " open_controlfd: Unable to open /var/run/xl2tpd/l2tp-control for reading". If you run across this, just practise a "mkdir /var/run/xl2tpd"

Notation that xl2tpd-command will always just render "00 OK", to actually see if it works, you lot demand to bank check the organisation logs.

Back to pinnacle

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Sun Aug 31, 2014 eleven:58 pm   Post subject: Reply with quote

Hi,

I take now tried a number of variations on a theme. Mostly where vpn.office.com could mean the url vpn.office.com or the ipsec connection name VPN.Office.COM, capitalise to accent the distinciton
of these two roles. As well with and without Role-NAME\\login-name login-password and in combination with including excluding options.xl2tpd.client.

/etc/xl2tpd/xl2tpd.conf

Code:

[lac vpnclient]
lns = vpn.role.com
pppoptfile = /etc/ppp/options.xl2tpd.client

/etc/ppp/options.xl2tpd.client

Code:

ipcp-take-local
ipcp-take-remote
decline-eap
require-mschap-v2
noccp
noauth
mtu 1410
mru 1410
nodefaultroute
usepeerdns
lock
Code:

xl2tpd-control connect vpnclient Function-NAME\\your-login-username your-login-password
Lawmaking:

Sep  ane 00:39:58 sveta xl2tpd[4845]: Connecting to host vpn.office.com, port 1701
Sep  1 00:xl:01 sveta cron[4865]: (OhCaptian) CMD (test -x /usr/sbin/run-crons && /usr/sbin/run-crons)
Sep  ane 00:40:03 sveta xl2tpd[4845]: Maximum retries exceeded for tunnel 16278.  Closing.
Sep  i 00:40:03 sveta xl2tpd[4845]: Connectedness 0 closed to 17.11.vii.5, port 1701 (Timeout)
Sep  1 00:40:08 sveta xl2tpd[4845]: Unable to deliver closing message for tunnel 16278. Destroying anyhow.

If I get the opportunity, I will exist more methodical in the morning.

Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Mon Sep 01, 2014 four:02 am   Post bailiwick: Reply with quote

xl2tpd and strongswan are unconnect, thus the "lns" value in the LAC section is but the server's domain proper noun or IP accost. In this case though, its non seeing the L2TP LNS (server) on the other side . This usually ways the ipsec tunnel is down. Check and restart the tunnel if needed.

To run across if data is going over the tunnel:

Code:
tcpdump proto 50
You won't run across anything cantankerous the tunnel until xl2tpd-connect is started. You should see packets going in both directions. If not, either the tunnel is down, strongSwan is configured wrong or something (similar a local firewall) is getting in the way.
In contrast, no l2tp packets should seen in the articulate:
Code:
tcpdump udp port 1701
This control should produce NO output when xl2tpd-connect is invoked. If it does either the tunnel is downward, or strongSwan is configured wrong.
Back to pinnacle

View user's profile Send private message

Duco Ergo Sum
Apprentice
Apprentice

Joined: 06 December 2005
Posts: 154
Location: Winsford


Post Posted: Tue Sep 02, 2014 nine:09 am   Postal service subject: Reply with quote

Hi,

I have tried diversity configurations of xl2tp. Just to add to the confusion my mobo has two lan ports and wifi, I fearfulness now this feature is coming back to confuse me and my set-up. 'eno1' is the lan port which is would be eth0 and is currently the only operational network connection in this machine.

It appears that tcpdump is looking at 'bond0' and so not finding anything. Could xl2tp be doing the aforementioned?

tcpdump -i eno1 produces the same output as below.

Make connection

Code:

# xl2tpd-control connect vpnclient vpn.office.com\\Uname Upassword
00 OK

Exam proto 50

Code:

# tcpdump proto 50
tcpdump: Alert: bond0: no IPv4 accost assigned
error : ret -1
tcpdump: verbose output suppressed, use -5 or -vv for total protocol decode
listening on bond0, link-type EN10MB (Ethernet), capture size 65535 bytes
0 packets captured
0 packets received by filter
0 packets dropped by kernel

Test udp port 1701

Code:

# tcpdump udp port 1701
tcpdump: Alert: bond0: no IPv4 address assigned
error : ret -1
tcpdump: verbose output suppressed, use -five or -vv for full protocol decode
listening on bond0, link-type EN10MB (Ethernet), capture size 65535 bytes
0 packets captured
0 packets received by filter
0 packets dropped by kernel

Some network devices

Lawmaking:

# ifconfig
bond0: flags=5123<UP,Circulate,Primary,MULTICAST>  mtu 1500
ether ce:71:b2:5a:c2:1d  txqueuelen 0  (Ethernet)
RX packets 0  bytes 0 (0.0 B)
RX errors 0  dropped 0  overruns 0  frame 0
TX packets 0  bytes 0 (0.0 B)
TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

eno1: flags=4163<Upwards,Circulate,RUNNING,MULTICAST>  mtu 1500
inet ane.ii.3.iv  netmask 255.255.255.0  broadcast 10.1.ane.255
inet6 fd00::ca60:ff:fecc:4614  prefixlen 64  scopeid 0x0<global>
inet6 fe80::ca60:ff:fecc:4614  prefixlen 64  scopeid 0x20<link>
ether c8:lx:00:cc:46:14  txqueuelen chiliad  (Ethernet)
RX packets 14060  bytes 14971920 (14.2 MiB)
RX errors 0  dropped 3  overruns 0  frame 0
TX packets 10353  bytes 1465328 (i.three MiB)
TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
device interrupt twenty  memory #x########-########

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
inet 127.0.0.one  netmask 255.0.0.0
inet6 ::ane  prefixlen 128  scopeid 0x10<host>
loop  txqueuelen 0  (Local Loopback)
RX packets forty  bytes 16841 (16.4 KiB)
RX errors 0  dropped 0  overruns 0  frame 0
TX packets xl  bytes 16841 (xvi.4 KiB)
TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

Log

Code:

Sep  2 08:55:31 sveta xl2tpd[4128]: xl2tpd version xl2tpd-one.3.1 started on sveta PID:4128
Sep  2 08:55:31 sveta xl2tpd[4128]: Written past Marker Spencer, Copyright (C) 1998, Adtran, Inc.
Sep  two 08:55:31 sveta xl2tpd[4128]: Forked past Scott Balmos and David Stipp, (C) 2001
Sep  2 08:55:31 sveta xl2tpd[4128]: Inherited by Jeff McAdams, (C) 2002
Sep  two 08:55:31 sveta xl2tpd[4128]: Forked once again past Xelerance (www.xelerance.com) (C) 2006
Sep  2 08:55:31 sveta xl2tpd[4128]: Listening on IP address 0.0.0.0, port 1701
Sep  2 08:55:37 sveta charon: 09[IKE] sending continue alive to 17.11.7.5[4500]
Sep  2 08:55:49 sveta charon: 10[NET] received parcel: from 17.11.7.five[4500] to 1.ii.iii.4[4500] (84 bytes)
Sep  ii 08:55:49 sveta charon: ten[ENC] parsed INFORMATIONAL_V1 request [Available On Request] [ HASH Northward(DPD) ]
Sep  ii 08:55:49 sveta charon: 10[ENC] generating INFORMATIONAL_V1 request [Available On Request] [ HASH N(DPD_ACK) ]
Sep  2 08:55:49 sveta charon: 10[NET] sending bundle: from 1.ii.3.four[4500] to 17.11.7.5[4500] (92 bytes)
Sep  2 08:55:59 sveta xl2tpd[4128]: Connecting to host vpn.office.com, port 1701
Sep  2 08:55:59 sveta xl2tpd[4128]: Connection established to 17.11.seven.5, 1701.  Local: [Available On Request], Remote: [Bachelor On Request] (ref=0/0).
Sep  ii 08:55:59 sveta xl2tpd[4128]: Calling on tunnel [Bachelor On Asking]
Sep  2 08:55:59 sveta xl2tpd[4128]: Call established with 17.11.seven.v, Local: [Bachelor On Request], Remote: [Bachelor On Request], Series: one (ref=0/0)
Sep  2 08:55:59 sveta xl2tpd[4128]: start_pppd: I'm running:
Sep  2 08:55:59 sveta xl2tpd[4128]: "/usr/sbin/pppd"
Sep  ii 08:55:59 sveta xl2tpd[4128]: "passive"
Sep  2 08:55:59 sveta xl2tpd[4128]: "nodetach"
Sep  2 08:55:59 sveta xl2tpd[4128]: ":"
Sep  2 08:55:59 sveta xl2tpd[4128]: "name"
Sep  two 08:55:59 sveta xl2tpd[4128]: "vpn.office.com\Uname"
Sep  2 08:55:59 sveta xl2tpd[4128]: "plugin"
Sep  2 08:55:59 sveta xl2tpd[4128]: "passwordfd.so"
Sep  ii 08:55:59 sveta xl2tpd[4128]: "passwordfd"
Sep  2 08:55:59 sveta xl2tpd[4128]: "8"
Sep  2 08:55:59 sveta xl2tpd[4128]: "file"
Sep  ii 08:55:59 sveta xl2tpd[4128]: "/etc/ppp/options.l2tpd.lns"
Sep  2 08:55:59 sveta xl2tpd[4128]: "ipparam"
Sep  2 08:55:59 sveta xl2tpd[4128]: "17.11.7.v"
Sep  two 08:55:59 sveta xl2tpd[4128]: "plugin"
Sep  two 08:55:59 sveta xl2tpd[4128]: "pppol2tp.then"
Sep  2 08:55:59 sveta xl2tpd[4128]: "pppol2tp"
Sep  ii 08:55:59 sveta xl2tpd[4128]: "9"
Sep  2 08:55:59 sveta pppd[4138]: Plugin passwordfd.so loaded.
Sep  2 08:55:59 sveta pppd[4138]: Can't open options file /etc/ppp/options.l2tpd.lns: No such file or directory
Sep  2 08:55:59 sveta xl2tpd[4128]: child_handler : pppd exited for call [Available On Asking] with code 2
Sep  2 08:55:59 sveta xl2tpd[4128]: call_close: Phone call [Bachelor On Request] to 17.11.vii.5 disconnected
Sep  2 08:55:59 sveta xl2tpd[4128]: Terminating pppd: sending TERM bespeak to pid 4138
Sep  two 08:55:59 sveta xl2tpd[4128]: get_call: can't find telephone call [Available On Request] in tunnel [Available On Request]
(ref=0/0)
Sep  ii 08:55:59 sveta xl2tpd[4128]: get_call: can't observe call [Available On Asking] in tunnel [Available On Request]
(ref=0/0)
Sep  ii 08:55:59 sveta xl2tpd[4128]: check_control: Received out of gild command packet on tunnel [Available On Request] (got iii, expected iv)
Sep  2 08:55:59 sveta xl2tpd[4128]: handle_packet: bad control packet!
Sep  two 08:55:59 sveta charon: 13[Cyberspace] received package: from 17.11.7.v[4500] to i.two.3.iv[4500] (68 bytes)
Sep  ii 08:55:59 sveta charon: 13[ENC] parsed INFORMATIONAL_V1 request [Available On Asking] [ HASH D ]
Sep  2 08:55:59 sveta charon: xiii[IKE] received DELETE for ESP CHILD_SA with SPI ca6241bf
Sep  two 08:55:59 sveta charon: 13[IKE] closing CHILD_SA VPN.OFFICE.COM{1} with SPIs [Available On Request] (318 bytes) [Available On Request] (398 bytes) and TS 1.two.3.4/32[udp/l2tp] ===
17.11.7.5/32[udp/l2tp]
Sep  2 08:55:59 sveta charon: xiii[IKE] closing CHILD_SA VPN.Function.COM{ane} with SPIs [Available On Request] (318 bytes) [Available On Request] (398 bytes) and TS 1.2.three.4/32[udp/l2tp] ===
17.11.7.five/32[udp/l2tp]
Sep  ii 08:55:59 sveta charon: 08[NET] received bundle: from 17.xi.7.5[4500] to ane.2.three.iv[4500] (84 bytes)
Sep  two 08:55:59 sveta charon: 08[ENC] parsed INFORMATIONAL_V1 request [Bachelor On Asking] [ HASH D ]
Sep  2 08:55:59 sveta charon: 08[IKE] received DELETE for IKE_SA VPN.Office.COM[i]
Sep  two 08:55:59 sveta charon: 08[IKE] deleting IKE_SA VPN.OFFICE.COM[i] between 1.ii.three.4[1.2.3.4]...17.11.seven.5[17.11.7.5]
Sep  two 08:55:59 sveta charon: 08[IKE] deleting IKE_SA VPN.Function.COM[one] between 1.2.iii.4[1.2.three.4]...17.xi.7.5[17.11.vii.five]
Sep  2 08:56:21 sveta kernel: [  387.050043] device bond0 entered promiscuous mode
Sep  2 08:56:41 sveta kernel: [  406.710209] device bond0 left promiscuous manner
Sep  2 08:56:51 sveta kernel: [  417.080010] device bond0 entered promiscuous mode
Sep  ii 08:57:04 sveta xl2tpd[4128]: Maximum retries exceeded for tunnel [Available On Request].  Closing.
Sep  2 08:57:04 sveta xl2tpd[4128]: Connectedness [Available On Request] airtight to 17.11.seven.5, port 1701 (Timeout)
Sep  2 08:57:09 sveta xl2tpd[4128]: Unable to deliver closing message for tunnel [Bachelor On Request]. Destroying anyway.
Sep  2 08:57:11 sveta kernel: [  436.160583] device bond0 left promiscuous mode
Sep  2 08:57:15 sveta kernel: [  441.038056] device bond0 entered promiscuous mode
Sep  two 08:57:21 sveta kernel: [  446.590475] device bond0 left promiscuous mode
Sep  2 08:57:36 sveta kernel: [  461.822270] device bond0 entered promiscuous mode
Sep  two 08:57:54 sveta kernel: [  479.973547] device bond0 left promiscuous style
Sep  two 08:58:06 sveta kernel: [  491.341755] device bond0 entered promiscuous mode
Sep  2 08:58:thirteen sveta kernel: [  498.971002] device bond0 left promiscuous mode
Back to top

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Tue Sep 02, 2014 5:01 pm   Post subject: Reply with quote

We're making progress. According to the log, it seeing the l2tp server on the other end. That ways the ipsec is up and configurated properly, and traffic is flowing across information technology..Now the problem is pppd. pppd is getting some extraneous options from somewhere. Namely, the nonexistent "/etc/ppp/options.l2tpd.lns" is causing pppd to get out. Nonetheless information technology shouldn't even be looking for that.

Very little configuration should be needed on the l2tp side,, but there may exist one tweak we need:

Code:

[lac vpnclient]
lns = vpn.office.com
pppoptfile = /etc/ppp/options.xl2tpd.client
name = your-login-username

Some Cisco access concentrators demand the "proper name" matter, merely commonly, its non needed. Nonetheless, adding it won't hurt. Everything else in /etc/xl2tpd/xl2tpd.conf should exist gone or commented out.

Dorsum to top

View user's profile Send private message

Duco Ergo Sum
Amateur
Apprentice

Joined: 06 Dec 2005
Posts: 154
Location: Winsford


Post Posted: Wed Sep 03, 2014 12:41 am   Post subject: Reply with quote

I discovered a typo in the /etc/ppp/options.xl2tpd.client path namely the missing '10'. As well I accept added the user proper name as you lot have brash and no joy.
Code:

[lac vpnclient]
lns = vpn.office.com
pppoptfile = /etc/ppp/options.[b]ten[/b]l2tpd.customer
name = Uname

pppoptfile = /etc/ppp/options.xl2tpd.client

Code:

ipcp-accept-local
ipcp-have-remote
refuse-eap
crave-mschap-v2
noccp
noauth
mtu 1410
mru 1410
nodefaultroute
usepeerdns
lock

Using a sparse xl2tpd.conf no comments simply the config we need the post-obit log entry is produced.

Code:

Sep  3 01:28:26 sveta xl2tpd[4750]: setsockopt recvref[30]: Protocol not available
Sep  iii 01:28:26 sveta xl2tpd[4750]: Using l2tp kernel back up.
Sep  3 01:28:26 sveta xl2tpd[4752]: xl2tpd version xl2tpd-1.3.one started on sveta PID:4752
Sep  three 01:28:26 sveta xl2tpd[4752]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Sep  3 01:28:26 sveta xl2tpd[4752]: Forked by Scott Balmos and David Stipp, (C) 2001
Sep  3 01:28:26 sveta xl2tpd[4752]: Inherited by Jeff McAdams, (C) 2002
Sep  3 01:28:26 sveta xl2tpd[4752]: Forked once more past Xelerance (world wide web.xelerance.com) (C) 2006
Sep  3 01:28:26 sveta xl2tpd[4752]: Listening on IP address 0.0.0.0, port 1701
Sep  3 01:28:thirty sveta xl2tpd[4752]: Connecting to host vpn.office.com, port 1701
Sep  3 01:28:35 sveta xl2tpd[4752]: Maximum retries exceeded for tunnel 41.  Closing.
Sep  3 01:28:35 sveta xl2tpd[4752]: Connection 0 closed to 17.11.7.5, port 1701 (Timeout)
Sep  3 01:28:35 sveta kernel: [ 5494.780053] device eno1 entered promiscuous way
Sep  3 01:28:39 sveta kernel: [ 5498.420761] device eno1 left promiscuous mode
Sep  3 01:28:40 sveta xl2tpd[4752]: Unable to deliver endmost message for tunnel 41. Destroying anyway.

I have even tried swapping the [lac vpnclien]' for [lac VPN.Role.COM], it just served to prove that the config is read at the start up of xl2ptd.

Back to meridian

View user's profile Send private message

salahx
Guru
Guru

Joined: 12 Mar 2005
Posts: 499


Post Posted: Wed Sep 03, 2014 12:58 am   Post subject area: Reply with quote

The proper noun used for the lac isn't important. Its non seeing the l2tp server again. Be sure the strongSwan connectedness is up, and try again. If it still won'r piece of work, stop strongswan and xl2tp, in some other windows exercise a "ip xfrm monitor", starts strongswan and xl2tpd. Connect via strongSwan and the window "ip xfrm monitor" should display some stuff. Make a connectedness with xl2tpd-connect and more than stuff volition appear in the other window (warning: this control outputs the secrets keys for the ipsec connectedness. The real keys have been replaced with 0's)

Something like this:

Lawmaking:

Updated src 192.168.10.108 dst 192.168.ten.17
proto esp spi 0xc3e3e289 reqid 4 mode transport
replay-window 32
auth-trunc hmac(sha1) 0x000000000000000000000000000000000000000 96
enc cbc(aes) 0x0000000000000000000000000000000
sel src 192.168.10.108/32 dst 192.168.ten.17/32
src 192.168.10.17 dst 192.168.ten.108
proto esp spi 0xcdfbb1d9 reqid 4 manner transport
replay-window 32
auth-trunc hmac(sha1) 0x000000000000000000000000000000000000000 96
enc cbc(aes) 0x0000000000000000000000000000000
sel src 192.168.10.17/32 dst 192.168.10.108/32
src 192.168.x.17/32 dst 192.168.10.108/32 proto udp sport 1701 dport 1701
dir out action block priority 7936 ptype main
src 192.168.ten.108/32 dst 192.168.ten.17/32 proto udp sport 1701 dport 1701
dir in action block priority 7936 ptype main
Updated src 192.168.10.17/32 dst 192.168.ten.108/32 proto udp sport 1701 dport 1701
dir out priority 1792 ptype main
tmpl src 0.0.0.0 dst 0.0.0.0
proto esp reqid 4 mode transport
Updated src 192.168.10.108/32 dst 192.168.x.17/32 proto udp sport 1701 dport 1701
dir in priority 1792 ptype main
tmpl src 0.0.0.0 dst 0.0.0.0
proto esp reqid iv manner send
Async event  (0x20)  timer expired
src 192.168.x.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async consequence  (0x20)  timer expired
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async event  (0x20)  timer expired
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async event  (0x20)  timer expired
src 192.168.10.17 dst 192.168.10.108  reqid 0x4 protocol esp  SPI 0xcdfbb1d9
Async upshot  (0x10)  replay update
src 192.168.ten.17 dst 192.168.10.108  reqid 0x4 protocol esp  SPI 0xcdfbb1d9
Async upshot  (0x10)  replay update
src 192.168.10.108 dst 192.168.x.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async result  (0x10)  replay update
src 192.168.ten.17 dst 192.168.10.108  reqid 0x4 protocol esp  SPI 0xcdfbb1d9
Async consequence  (0x10)  replay update
src 192.168.x.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async effect  (0x10)  replay update
src 192.168.10.17 dst 192.168.x.108  reqid 0x4 protocol esp  SPI 0xcdfbb1d9
Async event  (0x10)  replay update
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
Async event  (0x10)  replay update
src 192.168.10.108 dst 192.168.10.17  reqid 0x4 protocol esp  SPI 0xc3e3e289
....
Back to top

View user's profile Send private message

Display posts from previous:  
You cannot post new topics in this forum
You cannot answer to topics in this forum
You cannot edit your posts in this forum
Y'all cannot delete your posts in this forum
You cannot vote in polls in this forum

woottenlartax.blogspot.com

Source: https://forums.gentoo.org/viewtopic-t-998042-start-0.html

0 Response to "Illegal Parameter Number in Definition of Test. N L.73 End{itemize}"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel