[Swan] L2TP/IPsec with certificates: INVALID_KEY_INFORMATION
Sergio Belkin
sebelk at gmail.com
Sun May 1 14:24:13 UTC 2016
2016-04-30 22:36 GMT-03:00 Paul Wouters <paul at nohats.ca>:
> On Sat, 30 Apr 2016, Sergio Belkin wrote:
>
> I miss the last lines:
>>
>> 000 IPsec SAs: total(1), authenticated(1), anonymous(0)
>> 000
>> 000 #2: "windows":4500 STATE_QUICK_I2 (sent QI2, IPsec SA established);
>> EVENT_SA_REPLACE_IF_USED in 28012s; newest IPSEC; eroute owner; isakmp#1;
>> idle; import:admin initiate
>> 000 #2: "windows" esp.2363e820 at 192.0.2.236 esp.fa8bd25a at 192.168.80.250
>> ref=0 refhim=4294901761 Traffic: ESPin=0B ESPout=0B! ESPmax=4194303B
>> 000 #1: "windows":4500 STATE_MAIN_I4 (ISAKMP SA established);
>> EVENT_SA_REPLACE_IF_USED in 2570s; newest ISAKMP; nodpd; idle; import:admin
>> initiate
>> 000
>> 000 Bare Shunt list:
>> 000
>>
>
> So now xl2tpd needs to be started by you in client mode to do the L2TP
> part.
>
> Paul
>
Hi Paul,
Really?
When I run,
echo "c windows" > /var/run/xl2tpd/l2tp-control
May 1 11:15:39 hope xl2tpd: xl2tpd[27077]: No such tunnel 'windows'
:'-(
But... Should I ignore the INVALID_PAYLOAD_TYPE of ipsec?
Thanks in advance!
--
--
Sergio Belkin
LPIC-2 Certified - http://www.lpi.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.libreswan.org/pipermail/swan/attachments/20160501/402a5bef/attachment.html>
More information about the Swan
mailing list