Estou tentando conectar-me do meu laptop Arch Linux pessoal à VPN do servidor Windows do meu escritório.
Eu segui as instruções do wiki do Arch , mas não consigo conectar o túnel IPSec.
A mensagem que recebo é:
$sudo ipsec auto --up L2TP-PSK
002 "L2TP-PSK" #16: initiating Main Mode
105 "L2TP-PSK" #16: STATE_MAIN_I1: initiate
003 "L2TP-PSK" #16: Informational Exchange message must be encrypted
010 "L2TP-PSK" #16: STATE_MAIN_I1: retransmission; will wait 20s for response
010 "L2TP-PSK" #16: STATE_MAIN_I1: retransmission; will wait 40s for response
003 "L2TP-PSK" #16: Informational Exchange message must be encrypted
031 "L2TP-PSK" #16: max number of retransmissions (2) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
000 "L2TP-PSK" #16: starting keying attempt 2 of at most 3, but releasing whack
Meu arquivo de configuração contém o seguinte:
config setup
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
nat_traversal=yes
# default is auto, which will try netkey first
protostack=netkey
# you can left "off" (default value) instead
oe=no
# Replace eth0 with your network interface
plutoopts="--interface=eth0"
conn L2TP-PSK
authby=secret
pfs=no
auto=add
keyingtries=3
dpddelay=30
dpdtimeout=120
dpdaction=clear
rekey=yes
ikelifetime=8h
keylife=1h
type=transport
# Replace %any below with your local IP address (private, behind NAT IP is okay as well)
left=192.168.0.***
leftprotoport=17/1701
# Replace IP address with your VPN server's IP
right=***.***.***.*** # My office server IP
rightprotoport=17/1701
E a saída de ipsec verify
é:
Checking if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Openswan U/K4.18.12-arch1-1-ARCH (netkey)
See 'ipsec --copyright' for copyright information.
Checking for IPsec support in kernel [OK]
NETKEY: Testing XFRM related proc values
ICMP default/send_redirects [NOT DISABLED]
Disable /proc/sys/net/ipv4/conf/*/send_redirects or NETKEY will cause act on or cause sending of bogus ICMP redirects!
ICMP default/accept_redirects [NOT DISABLED]
Disable /proc/sys/net/ipv4/conf/*/accept_redirects or NETKEY will cause act on or cause sending of bogus ICMP redirects!
XFRM larval drop [OK]
Hardware random device check [N/A]
Two or more interfaces found, checking IP forwarding [FAILED]
Checking rp_filter [ENABLED]
/proc/sys/net/ipv4/conf/all/rp_filter [ENABLED]
Checking that pluto is running [OK]
Pluto listening for IKE on udp 500 [OK]
Pluto listening for IKE on tcp 500 [NOT IMPLEMENTED]
Pluto listening for IKE/NAT-T on udp 4500 [OK]
Pluto listening for IKE/NAT-T on tcp 4500 [NOT IMPLEMENTED]
Pluto listening for IKE on tcp 10000 (cisco) [NOT IMPLEMENTED]
Checking NAT and MASQUERADEing [TEST INCOMPLETE]
Checking 'ip' command [OK]
Checking 'iptables' command [OK]
ipsec verify: encountered errors
Eu presumo que ipsec
não está felizmente instalado, mas eu não estou familiarizado com isso.
Esta pergunta parece indicar que o teste de encaminhamento de IP falhou pode ser ignorado.
Alguém sabe como eu poderia fazer isso funcionar?
Tags vpn ipsec linux arch-linux