-
Notifications
You must be signed in to change notification settings - Fork 125
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IKE support not working #6
Comments
Hrm, thanks for letting me know! I don't have access to my old VPN appliance and updated it to work with the new one. The new appliance is still working with IKEv1. Your setup may need this line explicitly defined to match the handshake expected by the server:
https://github.com/ubergarm/l2tp-ipsec-vpn-client/blob/master/ipsec.conf#L16 In the meantime if you're in a pinch feel free to checkout the older version from this repo and build it from there. TODO:
Thanks! EDIT: docker pull ubergarm/l2tp-ipsec-vpn-client:strongswan |
I set the default IKEv1 handshake to something common for compatibility but weaker than other IKEv1 supported ciphers/hashes/algorithms. You can use the Hope one of these options works for your setup! |
Hello, Other options is map de ipsec.conf like that
And enjoy! |
Cool, thanks @ubergarm @asterissco will check try these out and get back. Closing the issue for now. Will reopen if I have any issues. |
Ok, so I tried this out, and here's what's happening. I cloned the repo and modified the ipsec.conf file as follows:
I basically took @asterissco's advice and commented out the ike line to avoid explicit definitions of protocols. I then built the container and ran it. What's weird is that it seems to establish a connection but it's terminating. I suspect there's something going on with the L2TPD config. Here's my output from Docker logs:
The VPN service appliance I'm using is this: https://github.com/mobilejazz/docker-ipsec-vpn-server Here's what we see on the Server end:
I just setup a fresh instance of the VPN server, and my other clients are connecting without any trouble. It's only these Ubuntu server clients that aren't establishing a PPP tunnel. Any help is much appreciated.
Only an issue with Libreswan now. |
So the shift to libreswan is breaking connections that were previously working with IKE1 support.
We've deployed a few clients using an IPSEC server that exposes only ports 500 and 4500, and they're working fine using the older build.
With the new update, these connections don't work. When I roll back to using the strongswan config, it works out of the box.
I think the libreswan
ipsec.conf
config is missing something to allow it to connect with existing VPN setups.The text was updated successfully, but these errors were encountered: