FS#66034 - [networkmanager] not working after update

Attached to Project: Arch Linux
Opened by Guillaume Savin (Skysave) - Monday, 30 March 2020, 17:59 GMT
Last edited by freswa (frederik) - Sunday, 05 April 2020, 13:32 GMT
Task Type Bug Report
Category Packages: Extra
Status Closed
Assigned To Jan de Groot (JGC)
Jan Alexander Steffens (heftig)
Architecture x86_64
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:

After upgrading my system today, I can't connect to the VPN server using l2tp/ipsec that ikev1 (I know that it is unrecommended technology now). But it worked last week.

Here is the log of journalctl when I try to connect to the VPN server :

mars 30 19:56:04 ArchLinux ipsec_starter[19678]: charon (19679) started after 40 ms
mars 30 19:56:04 ArchLinux charon[19679]: 09[CFG] received stroke: add connection 'd72080c4-a800-445c-a86b-d94d8178cdce'
mars 30 19:56:04 ArchLinux charon[19679]: 09[CFG] added configuration 'd72080c4-a800-445c-a86b-d94d8178cdce'
mars 30 19:56:05 ArchLinux charon[19679]: 11[CFG] rereading secrets
mars 30 19:56:05 ArchLinux charon[19679]: 11[CFG] loading secrets from '/etc/ipsec.secrets'
mars 30 19:56:05 ArchLinux charon[19679]: 11[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
mars 30 19:56:05 ArchLinux charon[19679]: 11[CFG] loaded IKE secret for %any
mars 30 19:56:05 ArchLinux charon[19679]: 12[CFG] received stroke: initiate 'd72080c4-a800-445c-a86b-d94d8178cdce'
mars 30 19:56:05 ArchLinux charon[19679]: 14[IKE] initiating Main Mode IKE_SA d72080c4-a800-445c-a86b-d94d8178cdce[1] to 134.59.124.143
mars 30 19:56:05 ArchLinux charon[19679]: 14[IKE] initiating Main Mode IKE_SA d72080c4-a800-445c-a86b-d94d8178cdce[1] to 134.59.124.143
mars 30 19:56:05 ArchLinux charon[19679]: 14[ENC] generating ID_PROT request 0 [ SA V V V V V ]
mars 30 19:56:05 ArchLinux charon[19679]: 14[NET] sending packet: from 192.168.1.249[500] to 134.59.124.143[500] (180 bytes)
mars 30 19:56:09 ArchLinux charon[19679]: 15[IKE] sending retransmit 1 of request message ID 0, seq 1
mars 30 19:56:09 ArchLinux charon[19679]: 15[NET] sending packet: from 192.168.1.249[500] to 134.59.124.143[500] (180 bytes)
mars 30 19:56:15 ArchLinux NetworkManager[19714]: Stopping strongSwan IPsec...
mars 30 19:56:15 ArchLinux charon[19679]: 00[DMN] signal of type SIGINT received. Shutting down
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=fe80:0000:0000:0000:0000:0000:0000:0000 src_prefixlen=64 dst=fe80:0000:0000:0000:0000:0000:0000:0000 dst_prefixlen=64
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=fe80:0000:0000:0000:0000:0000:0000:0000 src_prefixlen=64 dst=fe80:0000:0000:0000:0000:0000:0000:0000 dst_prefixlen=64
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=fe80:0000:0000:0000:0000:0000:0000:0000 src_prefixlen=64 dst=fe80:0000:0000:0000:0000:0000:0000:0000 dst_prefixlen=64
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=0000:0000:0000:0000:0000:0000:0000:0001 dst=0000:0000:0000:0000:0000:0000:0000:0001
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=0000:0000:0000:0000:0000:0000:0000:0001 dst=0000:0000:0000:0000:0000:0000:0000:0001
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=0000:0000:0000:0000:0000:0000:0000:0001 dst=0000:0000:0000:0000:0000:0000:0000:0001
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.175.0 src_prefixlen=24 dst=192.168.175.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.175.0 src_prefixlen=24 dst=192.168.175.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.175.0 src_prefixlen=24 dst=192.168.175.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.42.0 src_prefixlen=24 dst=192.168.42.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.42.0 src_prefixlen=24 dst=192.168.42.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.42.0 src_prefixlen=24 dst=192.168.42.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.1.0 src_prefixlen=24 dst=192.168.1.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.1.0 src_prefixlen=24 dst=192.168.1.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.1.0 src_prefixlen=24 dst=192.168.1.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=172.16.103.0 src_prefixlen=24 dst=172.16.103.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=172.16.103.0 src_prefixlen=24 dst=172.16.103.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux audit: MAC_IPSEC_EVENT op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=172.16.103.0 src_prefixlen=24 dst=172.16.103.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux NetworkManager[19706]: initiating Main Mode IKE_SA d72080c4-a800-445c-a86b-d94d8178cdce[1] to 134.59.124.143
mars 30 19:56:15 ArchLinux NetworkManager[19706]: generating ID_PROT request 0 [ SA V V V V V ]
mars 30 19:56:15 ArchLinux NetworkManager[19706]: sending packet: from 192.168.1.249[500] to 134.59.124.143[500] (180 bytes)
mars 30 19:56:15 ArchLinux NetworkManager[19706]: sending retransmit 1 of request message ID 0, seq 1
mars 30 19:56:15 ArchLinux NetworkManager[19706]: sending packet: from 192.168.1.249[500] to 134.59.124.143[500] (180 bytes)
mars 30 19:56:15 ArchLinux NetworkManager[19706]: destroying IKE_SA in state CONNECTING without notification
mars 30 19:56:15 ArchLinux NetworkManager[19706]: establishing connection 'd72080c4-a800-445c-a86b-d94d8178cdce' failed
mars 30 19:56:15 ArchLinux charon[19679]: 00[IKE] destroying IKE_SA in state CONNECTING without notification
mars 30 19:56:15 ArchLinux kernel: kauditd_printk_skb: 15 callbacks suppressed
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:384): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=fe80:0000:0000:0000:0000:0000:0000:0000 src_prefixlen=64 dst=fe80:0000:0000:0000:0000:0000:0000:0000 dst_prefixlen=64
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:385): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=fe80:0000:0000:0000:0000:0000:0000:0000 src_prefixlen=64 dst=fe80:0000:0000:0000:0000:0000:0000:0000 dst_prefixlen=64
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:386): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=fe80:0000:0000:0000:0000:0000:0000:0000 src_prefixlen=64 dst=fe80:0000:0000:0000:0000:0000:0000:0000 dst_prefixlen=64
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:387): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=0000:0000:0000:0000:0000:0000:0000:0001 dst=0000:0000:0000:0000:0000:0000:0000:0001
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:388): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=0000:0000:0000:0000:0000:0000:0000:0001 dst=0000:0000:0000:0000:0000:0000:0000:0001
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:389): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=0000:0000:0000:0000:0000:0000:0000:0001 dst=0000:0000:0000:0000:0000:0000:0000:0001
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:390): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.175.0 src_prefixlen=24 dst=192.168.175.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:391): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.175.0 src_prefixlen=24 dst=192.168.175.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:392): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.175.0 src_prefixlen=24 dst=192.168.175.0 dst_prefixlen=24
mars 30 19:56:15 ArchLinux kernel: audit: type=1415 audit(1585590975.994:393): op=SPD-delete auid=4294967295 ses=4294967295 res=1 src=192.168.42.0 src_prefixlen=24 dst=192.168.42.0 dst_prefixlen=24
mars 30 19:56:16 ArchLinux charon[19679]: 00[IKE] uninstalling bypass policy for 192.168.42.0/24
mars 30 19:56:16 ArchLinux charon[19679]: 00[IKE] uninstalling bypass policy for fe80::/64
mars 30 19:56:16 ArchLinux charon[19679]: 00[IKE] uninstalling bypass policy for 192.168.1.0/24
mars 30 19:56:16 ArchLinux charon[19679]: 00[IKE] uninstalling bypass policy for ::1/128
mars 30 19:56:16 ArchLinux charon[19679]: 00[IKE] uninstalling bypass policy for 192.168.175.0/24
mars 30 19:56:16 ArchLinux charon[19679]: 00[IKE] uninstalling bypass policy for 172.16.103.0/24
mars 30 19:56:16 ArchLinux ipsec_starter[19678]: child 19679 (charon) has quit (exit code 0)
mars 30 19:56:16 ArchLinux ipsec_starter[19678]:
mars 30 19:56:16 ArchLinux ipsec_starter[19678]: charon stopped after 200 ms
mars 30 19:56:16 ArchLinux ipsec_starter[19678]: ipsec starter stopped
mars 30 19:56:16 ArchLinux nm-l2tp-service[19657]: g_dbus_method_invocation_take_error: assertion 'error != NULL' failed
mars 30 19:56:16 ArchLinux NetworkManager[617]: <info> [1585590976.2047] vpn-connection[0x5566626ec330,d72080c4-a800-445c-a86b-d94d8178cdce,"Connexion VPN 1",0]: VPN plugin: state changed: stopped (6)
mars 30 19:56:16 ArchLinux NetworkManager[617]: <info> [1585590976.2096] vpn-connection[0x5566626ec330,d72080c4-a800-445c-a86b-d94d8178cdce,"Connexion VPN 1",0]: VPN service disappeared
mars 30 19:56:16 ArchLinux NetworkManager[617]: <warn> [1585590976.2104] vpn-connection[0x5566626ec330,d72080c4-a800-445c-a86b-d94d8178cdce,"Connexion VPN 1",0]: VPN connection: failed to connect: 'Message recipient disconnected from message bus without replying'
This task depends upon

Closed by  freswa (frederik)
Sunday, 05 April 2020, 13:32 GMT
Reason for closing:  None
Additional comments about closing:  Problem with vpn server not NetworkManager
Comment by Guillaume Savin (Skysave) - Tuesday, 31 March 2020, 07:22 GMT
Here is a more focus log on NetworkManager:

mars 31 09:17:36 ArchLinux nm-l2tp-service[38644]: Check port 1701
mars 31 09:17:36 ArchLinux NetworkManager[38657]: Stopping strongSwan IPsec failed: starter is not running
mars 31 09:17:38 ArchLinux NetworkManager[38654]: Starting strongSwan 5.8.2 IPsec [starter]...
mars 31 09:17:38 ArchLinux ipsec_starter[38654]: Starting strongSwan 5.8.2 IPsec [starter]...
mars 31 09:17:38 ArchLinux NetworkManager[38654]: Loading config setup
mars 31 09:17:38 ArchLinux NetworkManager[38654]: Loading conn 'd72080c4-a800-445c-a86b-d94d8178cdce'
mars 31 09:17:38 ArchLinux ipsec_starter[38654]: Loading config setup
mars 31 09:17:38 ArchLinux ipsec_starter[38654]: Loading conn 'd72080c4-a800-445c-a86b-d94d8178cdce'
mars 31 09:17:38 ArchLinux ipsec_starter[38665]: Attempting to start charon...
mars 31 09:17:38 ArchLinux charon[38666]: 00[DMN] Starting IKE charon daemon (strongSwan 5.8.2, Linux 5.5.13-arch1-1, x86_64)
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] PKCS11 module '<name>' lacks library path
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] attr-sql plugin: database URI not set
mars 31 09:17:38 ArchLinux charon[38666]: 00[NET] using forecast interface enp4s0
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loading crls from '/etc/ipsec.d/crls'
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loading secrets from '/etc/ipsec.secrets'
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loaded IKE secret for %any
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] sql plugin: database URI not set
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] opening triplet file /etc/ipsec.d/triplets.dat failed: No such file or directory
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] loaded 0 RADIUS server configurations
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] HA config misses local/remote address
mars 31 09:17:38 ArchLinux charon[38666]: 00[CFG] no script for ext-auth script defined, disabled
mars 31 09:17:38 ArchLinux charon[38666]: 00[LIB] loaded plugins: charon ldap pkcs11 aesni aes des rc2 sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp curve25519 agent chapoly xcbc cmac hmac ntru drbg newhope bliss curl mysql sqlite attr kernel-netlink resolve socket-default bypass-lan connmark forecast farp stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp radattr unity counters
mars 31 09:17:38 ArchLinux charon[38666]: 00[LIB] dropped capabilities, running as uid 0, gid 0
mars 31 09:17:38 ArchLinux charon[38666]: 00[JOB] spawning 16 worker threads
mars 31 09:17:38 ArchLinux charon[38666]: 04[IKE] installed bypass policy for 172.16.103.0/24
mars 31 09:17:38 ArchLinux charon[38666]: 04[IKE] installed bypass policy for 192.168.1.0/24
mars 31 09:17:38 ArchLinux charon[38666]: 04[IKE] installed bypass policy for 192.168.175.0/24
mars 31 09:17:38 ArchLinux charon[38666]: 04[KNL] received netlink error: Invalid argument (22)
mars 31 09:17:38 ArchLinux charon[38666]: 04[KNL] unable to install source route for %any6
mars 31 09:17:38 ArchLinux charon[38666]: 04[IKE] installed bypass policy for ::1/128
mars 31 09:17:38 ArchLinux charon[38666]: 04[IKE] installed bypass policy for fe80::/64
mars 31 09:17:38 ArchLinux ipsec_starter[38665]: charon (38666) started after 20 ms
mars 31 09:17:38 ArchLinux charon[38666]: 09[CFG] received stroke: add connection 'd72080c4-a800-445c-a86b-d94d8178cdce'
mars 31 09:17:38 ArchLinux charon[38666]: 09[CFG] added configuration 'd72080c4-a800-445c-a86b-d94d8178cdce'
mars 31 09:17:39 ArchLinux charon[38666]: 11[CFG] rereading secrets
mars 31 09:17:39 ArchLinux charon[38666]: 11[CFG] loading secrets from '/etc/ipsec.secrets'
mars 31 09:17:39 ArchLinux charon[38666]: 11[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
mars 31 09:17:39 ArchLinux charon[38666]: 11[CFG] loaded IKE secret for %any
mars 31 09:17:39 ArchLinux charon[38666]: 05[CFG] received stroke: initiate 'd72080c4-a800-445c-a86b-d94d8178cdce'
mars 31 09:17:39 ArchLinux charon[38666]: 14[IKE] initiating Main Mode IKE_SA d72080c4-a800-445c-a86b-d94d8178cdce[1] to 134.59.124.143
mars 31 09:17:39 ArchLinux charon[38666]: 14[IKE] initiating Main Mode IKE_SA d72080c4-a800-445c-a86b-d94d8178cdce[1] to 134.59.124.143
mars 31 09:17:39 ArchLinux charon[38666]: 14[ENC] generating ID_PROT request 0 [ SA V V V V V ]
mars 31 09:17:39 ArchLinux charon[38666]: 14[NET] sending packet: from 192.168.1.248[500] to 134.59.124.143[500] (180 bytes)
mars 31 09:17:43 ArchLinux charon[38666]: 12[IKE] sending retransmit 1 of request message ID 0, seq 1
mars 31 09:17:43 ArchLinux charon[38666]: 12[NET] sending packet: from 192.168.1.248[500] to 134.59.124.143[500] (180 bytes)
mars 31 09:17:49 ArchLinux NetworkManager[38718]: Stopping strongSwan IPsec...
mars 31 09:17:49 ArchLinux charon[38666]: 00[DMN] signal of type SIGINT received. Shutting down
mars 31 09:17:49 ArchLinux charon[38666]: 00[IKE] destroying IKE_SA in state CONNECTING without notification
mars 31 09:17:49 ArchLinux NetworkManager[38693]: initiating Main Mode IKE_SA d72080c4-a800-445c-a86b-d94d8178cdce[1] to 134.59.124.143
mars 31 09:17:49 ArchLinux NetworkManager[38693]: generating ID_PROT request 0 [ SA V V V V V ]
mars 31 09:17:49 ArchLinux NetworkManager[38693]: sending packet: from 192.168.1.248[500] to 134.59.124.143[500] (180 bytes)
mars 31 09:17:49 ArchLinux NetworkManager[38693]: sending retransmit 1 of request message ID 0, seq 1
mars 31 09:17:49 ArchLinux NetworkManager[38693]: sending packet: from 192.168.1.248[500] to 134.59.124.143[500] (180 bytes)
mars 31 09:17:49 ArchLinux NetworkManager[38693]: destroying IKE_SA in state CONNECTING without notification
mars 31 09:17:49 ArchLinux NetworkManager[38693]: establishing connection 'd72080c4-a800-445c-a86b-d94d8178cdce' failed
mars 31 09:17:49 ArchLinux charon[38666]: 00[IKE] uninstalling bypass policy for 172.16.103.0/24
mars 31 09:17:49 ArchLinux charon[38666]: 00[IKE] uninstalling bypass policy for ::1/128
mars 31 09:17:49 ArchLinux charon[38666]: 00[IKE] uninstalling bypass policy for 192.168.1.0/24
mars 31 09:17:49 ArchLinux charon[38666]: 00[IKE] uninstalling bypass policy for fe80::/64
mars 31 09:17:49 ArchLinux charon[38666]: 00[IKE] uninstalling bypass policy for 192.168.175.0/24
mars 31 09:17:49 ArchLinux ipsec_starter[38665]: child 38666 (charon) has quit (exit code 0)
mars 31 09:17:49 ArchLinux ipsec_starter[38665]:
mars 31 09:17:49 ArchLinux ipsec_starter[38665]: charon stopped after 200 ms
mars 31 09:17:49 ArchLinux ipsec_starter[38665]: ipsec starter stopped
mars 31 09:17:50 ArchLinux nm-l2tp-service[38644]: g_dbus_method_invocation_take_error: assertion 'error != NULL' failed
mars 31 09:17:50 ArchLinux NetworkManager[629]: <info> [1585639070.0107] vpn-connection[0x55885c9fe140,d72080c4-a800-445c-a86b-d94d8178cdce,"Connexion VPN 1",0]: VPN plugin: state changed: stopped (6)
mars 31 09:17:50 ArchLinux NetworkManager[629]: <info> [1585639070.0170] vpn-connection[0x55885c9fe140,d72080c4-a800-445c-a86b-d94d8178cdce,"Connexion VPN 1",0]: VPN service disappeared
mars 31 09:17:50 ArchLinux NetworkManager[629]: <warn> [1585639070.0178] vpn-connection[0x55885c9fe140,d72080c4-a800-445c-a86b-d94d8178cdce,"Connexion VPN 1",0]: VPN connection: failed to connect: 'Message recipient disconnected from message bus without replying'

Comment by Guillaume Savin (Skysave) - Tuesday, 31 March 2020, 07:24 GMT
And my VPN use aes256-sha1-ecp384 in phase1 and aes256-sha1 in phase2
Comment by Douglas Kosovic (dkosovic) - Saturday, 04 April 2020, 06:53 GMT
Looks like it isn't getting too far with Phase 1 (main mode). Using the `ike-scan` command with the phase 1 algorithms you mentioned, it's not even able to do an IKE handshake:

# Encryption algorithm: aes256=7/256
# Hash algorithm: sha1=2
# Diffie-Hellman group : ecp384=20
# Authentication method: Preshared Key=1


$ sudo ike-scan --trans="7/256,2,20,1" -M 134.59.124.143
Starting ike-scan 1.9.4 with 1 hosts (http://www.nta-monitor.com/tools/ike-scan/)

Ending ike-scan 1.9.4: 1 hosts scanned in 2.402 seconds (0.42 hosts/sec). 0 returned handshake; 0 returned notify


So I suspect the issue is with the VPN server end, not yours.
Comment by Guillaume Savin (Skysave) - Sunday, 05 April 2020, 13:27 GMT
You are right, I verify in my side and like you said the vpn server have problem and don't work normaly. Thanks anyway for your help, I will close this matter.

Loading...