[Swan] L2TP/IPsec with certificates: INVALID_KEY_INFORMATION

Sergio Belkin sebelk at gmail.com
Sun May 1 14:24:13 UTC 2016


2016-04-30 22:36 GMT-03:00 Paul Wouters <paul at nohats.ca>:

> On Sat, 30 Apr 2016, Sergio Belkin wrote:
>
> I miss the last lines:
>>
>> 000 IPsec SAs: total(1), authenticated(1), anonymous(0)
>> 000
>> 000 #2: "windows":4500 STATE_QUICK_I2 (sent QI2, IPsec SA established);
>> EVENT_SA_REPLACE_IF_USED in 28012s; newest IPSEC; eroute owner; isakmp#1;
>> idle; import:admin initiate
>> 000 #2: "windows" esp.2363e820 at 192.0.2.236 esp.fa8bd25a at 192.168.80.250
>> ref=0 refhim=4294901761 Traffic: ESPin=0B ESPout=0B! ESPmax=4194303B
>> 000 #1: "windows":4500 STATE_MAIN_I4 (ISAKMP SA established);
>> EVENT_SA_REPLACE_IF_USED in 2570s; newest ISAKMP; nodpd; idle; import:admin
>> initiate
>> 000
>> 000 Bare Shunt list:
>> 000
>>
>
> So now xl2tpd needs to be started by you in client mode to do the L2TP
> part.
>
> Paul
>


Hi Paul,

Really?

When I run,

echo "c windows" > /var/run/xl2tpd/l2tp-control

May  1 11:15:39 hope xl2tpd: xl2tpd[27077]: No such tunnel 'windows'

:'-(

But... Should I ignore the INVALID_PAYLOAD_TYPE of ipsec?

Thanks in advance!


-- 
--
Sergio Belkin
LPIC-2 Certified - http://www.lpi.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.libreswan.org/pipermail/swan/attachments/20160501/402a5bef/attachment.html>


More information about the Swan mailing list