Announcement

Collapse
No announcement yet.

I can't connect to my VPN provider, I don't know how to setup Kubuntu client

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    I can't connect to my VPN provider, I don't know how to setup Kubuntu client

    My VPN won't work. It keeps disconnecting. I've included logs. The logs have been cleaned of personal details, but should provide a clue. They don't make sense to me. It connects then hangs up.
    My VPN provider is using Strongswan. L2TP with IPsec. This is my providers Widows instructions. What do you think I should modify in the Kubuntu VPN GUI settings based on the logs. I created the VPN using the GUI.

    Thanks guys.

    In this section, we are using a Windows 10 machine as the L2TP client. Find the macOS instructions below.

    1. Add a new VPN connection.
    Settings > Network & Internet > VPN > Add a VPN connection
    VPN Provider: Windows
    Connection name: L2TP
    Server name: xxx
    VPN Type: L2TP/IPsec with pre-shared key
    Pre-shared key: xxx
    Type of sign-in info: User name and password
    User name: xxx
    Password: xxx 2. Navigate to the Windows 10 Network connections.
    Settings > Network & Internet > Status > Change Adapter Options > L2TP Adapter properties
    Security > Allow these protocols > Microsoft CHAP Version 2 (MS-CHAP v2)

    Log
    Code:
    2/7/19 9:37 AM    NetworkManager    <info>  [1549557479.6076] audit:
    op="connection-activate" uuid="xxx" name="L2TP"
    pid=1571 uid=1000 result="success" 2/7/19 9:37 AM    NetworkManager    <info>  [1549557479.6235] vpn-connection[0x556b9cdc20a0,xxx,"L2TP",0]: Started the VPN service, PID 2008
    2/7/19 9:37 AM    NetworkManager    <info>  [1549557479.6402] vpn-connection[0x556b9cdc20a0,xxx,"L2TP",0]: Saw the service appear; activating connection
    2/7/19 9:37 AM    NetworkManager.service    Check port 1701
    2/7/19 9:37 AM    NetworkManager.service    Can't bind to port 1701
    2/7/19 9:37 AM    NetworkManager    Stopping strongSwan IPsec...
    2/7/19 9:37 AM    charon    00[DMN] signal of type SIGINT received. Shutting down
    2/7/19 9:37 AM    ipsec    00[DMN] Starting IKE charon daemon (strongSwan 5.6.3, Linux 4.18.0-14-generic, x86_64)
    2/7/19 9:37 AM    ipsec    00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
    2/7/19 9:37 AM    ipsec    00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
    2/7/19 9:37 AM    ipsec    00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
    2/7/19 9:37 AM    ipsec    00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
    2/7/19 9:37 AM    ipsec    00[CFG] loading crls from '/etc/ipsec.d/crls'
    2/7/19 9:37 AM    ipsec    00[CFG] loading secrets from '/etc/ipsec.secrets'
    2/7/19 9:37 AM    ipsec    00[CFG] expanding file expression '/etc/ipsec.d/*.secrets' failed
    2/7/19 9:37 AM    ipsec    00[LIB] loaded plugins: charon aesni aes rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic counters
    2/7/19 9:37 AM    ipsec    00[LIB] dropped capabilities, running as uid 0, gid 0
    2/7/19 9:37 AM    ipsec    00[JOB] spawning 16 worker threads
    2/7/19 9:37 AM    ipsec    00[DMN] signal of type SIGINT received. Shutting down
    2/7/19 9:37 AM    ipsec    charon stopped after 200 ms
    2/7/19 9:37 AM    ipsec    ipsec starter stopped
    2/7/19 9:37 AM    ipsec_starter    charon stopped after 200 ms
    2/7/19 9:37 AM    ipsec_starter    ipsec starter stopped
    2/7/19 9:38 AM    NetworkManager    Starting strongSwan 5.6.3 IPsec [starter]...
    2/7/19 9:38 AM    NetworkManager    Loading config setup
    2/7/19 9:38 AM    NetworkManager    Loading conn 'xxx'
    2/7/19 9:38 AM    ipsec_starter    Starting strongSwan 5.6.3 IPsec [starter]...
    2/7/19 9:38 AM    ipsec_starter    Loading config setup
    2/7/19 9:38 AM    ipsec_starter    Loading conn 'xxx'
    2/7/19 9:38 AM    NetworkManager    found netkey IPsec stack
    2/7/19 9:38 AM    ipsec_starter    found netkey IPsec stack
    2/7/19 9:38 AM    ipsec_starter    Attempting to start charon...
    2/7/19 9:38 AM    charon    00[DMN] Starting IKE charon daemon (strongSwan 5.6.3, Linux 4.18.0-14-generic, x86_64)
    2/7/19 9:38 AM    charon    00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
    2/7/19 9:38 AM    charon    00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
    2/7/19 9:38 AM    charon    00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
    2/7/19 9:38 AM    charon    00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
    2/7/19 9:38 AM    charon    00[CFG] loading crls from '/etc/ipsec.d/crls'
    2/7/19 9:38 AM    charon    00[CFG] loading secrets from '/etc/ipsec.secrets'
    2/7/19 9:38 AM    charon    00[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-xxx.secrets'
    2/7/19 9:38 AM    charon    00[CFG]   loaded IKE secret for xxx
    2/7/19 9:38 AM    charon    00[LIB] loaded plugins: charon aesni aes rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic counters
    2/7/19 9:38 AM    charon    00[LIB] dropped capabilities, running as uid 0, gid 0
    2/7/19 9:38 AM    charon    00[JOB] spawning 16 worker threads
    2/7/19 9:38 AM    ipsec_starter    charon (2060) started after 20 ms
    2/7/19 9:38 AM    charon    04[CFG] received stroke: add connection 'xxx'
    2/7/19 9:38 AM    charon    04[CFG] added configuration 'xxx'
    2/7/19 9:38 AM    charon    07[CFG] rereading secrets
    2/7/19 9:38 AM    charon    07[CFG] loading secrets from '/etc/ipsec.secrets'
    2/7/19 9:38 AM    charon    07[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-xxx.secrets'
    2/7/19 9:38 AM    charon    07[CFG]   loaded IKE secret for xxx
    2/7/19 9:38 AM    charon    09[CFG] received stroke: initiate 'xxx'
    2/7/19 9:38 AM    charon    11[IKE] initiating Main Mode IKE_SA xxx[1] to xxx
    2/7/19 9:38 AM    charon    11[IKE] initiating Main Mode IKE_SA xxx[1] to xxx
    2/7/19 9:38 AM    charon    11[ENC] generating ID_PROT request 0 [ SA V V V V V ]
    2/7/19 9:38 AM    charon    11[NET] sending packet: from xxx[500] to xxx[500] (204 bytes)
    2/7/19 9:38 AM    charon    12[NET] received packet: from xxx[500] to xxx[500] (136 bytes)
    2/7/19 9:38 AM    charon    12[ENC] parsed ID_PROT response 0 [ SA V V V ]
    2/7/19 9:38 AM    charon    12[IKE] received XAuth vendor ID
    2/7/19 9:38 AM    charon    12[IKE] received DPD vendor ID
    2/7/19 9:38 AM    charon    12[IKE] received NAT-T (RFC 3947) vendor ID
    2/7/19 9:38 AM    charon    12[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
    2/7/19 9:38 AM    charon    12[NET] sending packet: from xxx[500] to xxx[500] (204 bytes)
    2/7/19 9:38 AM    charon    13[NET] received packet: from xxx[500] to xxx[500] (204 bytes)
    2/7/19 9:38 AM    charon    13[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
    2/7/19 9:38 AM    charon    13[IKE] local host is behind NAT, sending keep alives
    2/7/19 9:38 AM    charon    13[ENC] generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
    2/7/19 9:38 AM    charon    13[NET] sending packet: from xxx[4500] to xxx[4500] (108 bytes)
    2/7/19 9:38 AM    charon    14[NET] received packet: from xxx[4500] to xxx[4500] (92 bytes)
    2/7/19 9:38 AM    charon    14[ENC] parsed ID_PROT response 0 [ ID HASH ]
    2/7/19 9:38 AM    charon    14[IKE] IKE_SA xxx[1] established between xxx[xxx]...xxx[xxx]
    2/7/19 9:38 AM    charon    14[IKE] IKE_SA xxx[1] established between xxx[xxx]...xxx[xxx]
    2/7/19 9:38 AM    charon    14[IKE] scheduling reauthentication in 10113s
    2/7/19 9:38 AM    charon    14[IKE] maximum IKE_SA lifetime 10653s
    2/7/19 9:38 AM    charon    14[ENC] generating QUICK_MODE request 2971016649 [ HASH SA No ID ID NAT-OA NAT-OA ]
    2/7/19 9:38 AM    charon    14[NET] sending packet: from xxx[4500] to xxx[4500] (204 bytes)
    2/7/19 9:38 AM    charon    15[NET] received packet: from xxx[4500] to xxx[4500] (92 bytes)
    2/7/19 9:38 AM    charon    15[ENC] parsed INFORMATIONAL_V1 request 2169929263 [ HASH N(NO_PROP) ]
    2/7/19 9:38 AM    NetworkManager    initiating Main Mode IKE_SA xxx[1] to xxx
    2/7/19 9:38 AM    NetworkManager    generating ID_PROT request 0 [ SA V V V V V ]
    2/7/19 9:38 AM    NetworkManager    sending packet: from xxx[500] to xxx[500] (204 bytes)
    2/7/19 9:38 AM    NetworkManager    received packet: from xxx[500] to xxx[500] (136 bytes)
    2/7/19 9:38 AM    NetworkManager    parsed ID_PROT response 0 [ SA V V V ]
    2/7/19 9:38 AM    NetworkManager    received XAuth vendor ID
    2/7/19 9:38 AM    NetworkManager    received DPD vendor ID
    2/7/19 9:38 AM    NetworkManager    received NAT-T (RFC 3947) vendor ID
    2/7/19 9:38 AM    NetworkManager    generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
    2/7/19 9:38 AM    NetworkManager    sending packet: from xxx[500] to xxx[500] (204 bytes)
    2/7/19 9:38 AM    NetworkManager    received packet: from xxx[500] to xxx[500] (204 bytes)
    2/7/19 9:38 AM    NetworkManager    parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
    2/7/19 9:38 AM    NetworkManager    local host is behind NAT, sending keep alives
    2/7/19 9:38 AM    NetworkManager    generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
    2/7/19 9:38 AM    NetworkManager    sending packet: from xxx[4500] to xxx[4500] (108 bytes)
    2/7/19 9:38 AM    NetworkManager    received packet: from xxx[4500] to xxx[4500] (92 bytes)
    2/7/19 9:38 AM    NetworkManager    parsed ID_PROT response 0 [ ID HASH ]
    2/7/19 9:38 AM    NetworkManager    IKE_SA xxx[1] established between xxx[xxx]...xxx[xxx]
    2/7/19 9:38 AM    NetworkManager    scheduling reauthentication in 10113s
    2/7/19 9:38 AM    NetworkManager    maximum IKE_SA lifetime 10653s
    2/7/19 9:38 AM    NetworkManager    generating QUICK_MODE request 2971016649 [ HASH SA No ID ID NAT-OA NAT-OA ]
    2/7/19 9:38 AM    NetworkManager    sending packet: from xxx[4500] to xxx[4500] (204 bytes)
    2/7/19 9:38 AM    NetworkManager    received packet: from xxx[4500] to xxx[4500] (92 bytes)
    2/7/19 9:38 AM    NetworkManager    parsed INFORMATIONAL_V1 request 2169929263 [ HASH N(NO_PROP) ]
    2/7/19 9:38 AM    NetworkManager    received NO_PROPOSAL_CHOSEN error notify
    2/7/19 9:38 AM    NetworkManager    establishing connection 'xxx' failed
    2/7/19 9:38 AM    charon    15[IKE] received NO_PROPOSAL_CHOSEN error notify
    2/7/19 9:38 AM    NetworkManager.service    xl2tpd started with pid 2096
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Not looking for kernel SAref support.
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Using l2tp kernel support.
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: xl2tpd version xl2tpd-1.3.12 started on ion PID:2096
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Forked by Scott Balmos and David Stipp, (C) 2001
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Inherited by Jeff McAdams, (C) 2002
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Forked again by Xelerance (www.xelerance.com) (C) 2006-2016
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Listening on IP address 0.0.0.0, port 51916
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Connecting to host xxx, port 1701
    2/7/19 9:38 AM    NetworkManager    <info>  [1549557484.0997] vpn-connection[0x556b9cdc20a0,xxx,"L2TP",0]: VPN plugin: state changed: starting (3)
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: death_handler: Fatal signal 15 received
    2/7/19 9:38 AM    NetworkManager    xl2tpd[2096]: Connection 0 closed to xxx, port 1701 (Server closing)
    2/7/19 9:38 AM    NetworkManager    <warn>  [1549557498.1101] vpn-connection[0x556b9cdc20a0,xxx,"L2TP",0]: VPN plugin: failed: connect-failed (1)
    2/7/19 9:38 AM    NetworkManager    <warn>  [1549557498.1103] vpn-connection[0x556b9cdc20a0,xxx,"L2TP",0]: VPN plugin: failed: connect-failed (1)
    2/7/19 9:38 AM    NetworkManager    <info>  [1549557498.1104] vpn-connection[0x556b9cdc20a0,xxx,"L2TP",0]: VPN plugin: state changed: stopping (5)
    2/7/19 9:38 AM    NetworkManager    Stopping strongSwan IPsec...
    2/7/19 9:38 AM    charon    00[DMN] signal of type SIGINT received. Shutting down
    2/7/19 9:38 AM    charon    00[IKE] deleting IKE_SA xxx[1] between xxx[xxx]...xxx[xxx]
    2/7/19 9:38 AM    charon    00[IKE] deleting IKE_SA xxx[1] between xxx[xxx]...xxx[xxx]
    2/7/19 9:38 AM    charon    00[IKE] sending DELETE for IKE_SA xxx[1]
    2/7/19 9:38 AM    charon    00[ENC] generating INFORMATIONAL_V1 request 178397015 [ HASH D ]
    2/7/19 9:38 AM    charon    00[NET] sending packet: from xxx[4500] to xxx[4500] (108 bytes)
    2/7/19 9:38 AM    ipsec_starter    child 2060 (charon) has quit (exit code 0)
    2/7/19 9:38 AM    ipsec_starter    
    2/7/19 9:38 AM    ipsec_starter    charon stopped after 200 ms
    2/7/19 9:38 AM    ipsec_starter    ipsec starter stopped
    2/7/19 9:38 AM    NetworkManager.service    ipsec shut down
    2/7/19 9:38 AM    NetworkManager    <info>  [1549557498.2240] vpn-connection[0x556b9cdc20a0,xxx,"L2TP",0]: VPN plugin: state changed: stopped (6)
    2/7/19 9:38 AM    NetworkManager    <info>  [1549557498.2279] vpn-connection[0x556b9cdc20a0,xxx,"L2TP",0]: VPN service disappeared

    #2
    Look near the bottom of the page here:
    https://askubuntu.com/questions/9811...-kubuntu-17-10
    you probably are missing a package for L2TP support

    Comment


      #3
      Originally posted by claydoh View Post
      Look near the bottom of the page here:
      https://askubuntu.com/questions/9811...-kubuntu-17-10
      you probably are missing a package for L2TP support
      Aha, thank you. That solved it partially. I also had authentication failures. I solved it with:
      EAP: peer reports authentication failure

      If you see EAP: peer reports authentication failure in the journalctl output (or elsewhere), then in the VPN connection's PPP Settings dialog box, untick EAP in the authentication methods list. In some situations, the Use Point-to-Point encryption (MPPE) checkbox may also need to be ticked.

      I got that advice here at: https://github.com/nm-l2tp/network-m...ithm-proposals
      That link has all kinds of VPN advice for Kubuntu users.

      I can now connect and do my thing. Solved. Thanks again.

      Comment

      Working...
      X