Open dimzon opened 8 years ago
I'll see what I can do. Right now, I've stopped development and will be moving to a new device soon.
10-06 20:31:15.665 4902 4945 I Vpn : Switched from [Legacy VPN] to [Legacy VPN]
10-06 20:31:15.666 4902 4945 D Vpn : setting state=IDLE, reason=prepare
10-06 20:31:15.681 4902 13871 I Vpn : Switched from [Legacy VPN] to [Legacy VPN]
10-06 20:31:15.692 4902 13871 D Vpn : setting state=IDLE, reason=prepare
10-06 20:31:15.692 4902 13871 D Vpn : setting state=CONNECTING, reason=startLegacyVpn
10-06 20:31:15.696 4902 21422 V LegacyVpnRunner: Waiting
10-06 20:31:15.705 4902 21422 V LegacyVpnRunner: Executing
10-06 20:31:15.706 3018 4602 D AudioFlinger: mixer(0xb4629008) throttle end: throttle time(1)
10-06 20:31:15.709 4902 21422 D Vpn : setting state=CONNECTING, reason=execute
10-06 20:31:15.905 21423 21423 D racoon : Waiting for control socket
10-06 20:31:15.935 21423 21423 D racoon : Received 6 arguments
10-06 20:31:15.935 21423 21423 I racoon : ipsec-tools 0.7.3 (http://ipsec-tools.sf.net)
10-06 20:31:16.006 21429 21429 I kworker/u4:4: type=1400 audit(0.0:392): avc: denied { execute } for name="recovery" dev="rootfs" ino=312 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
10-06 20:31:16.006 21429 21429 I kworker/u4:4: type=1400 audit(0.0:393): avc: denied { execute_no_trans } for path="/sbin/recovery" dev="rootfs" ino=312 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
10-06 20:31:16.167 21423 21423 I racoon : 192.168.1.206[500] used as isakmp port (fd=6)
10-06 20:31:16.167 21423 21423 I racoon : 192.168.1.206[500] used for NAT-T
10-06 20:31:16.167 21423 21423 I racoon : 192.168.1.206[4500] used as isakmp port (fd=7)
10-06 20:31:16.167 21423 21423 I racoon : 192.168.1.206[4500] used for NAT-T
10-06 20:31:16.196 21663 21663 I init : type=1400 audit(0.0:394): avc: denied { execute } for name="mtpd" dev="mmcblk0p9" ino=8364 scontext=u:r:init:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
10-06 20:31:16.196 21663 21663 I init : type=1400 audit(0.0:395): avc: denied { execute_no_trans } for path="/system/bin/mtpd" dev="mmcblk0p9" ino=8364 scontext=u:r:init:s0 tcontext=u:object_r:unlabeled:s0 tclass=file permissive=1
10-06 20:31:16.226 21663 21663 D mtpd : Waiting for control socket
10-06 20:31:16.403 21666 21666 I cortexbrain-tun: type=1400 audit(0.0:396): avc: denied { execute_no_trans } for path="/sbin/recovery" dev="rootfs" ino=312 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
10-06 20:31:16.416 21663 21663 I mtpd : type=1400 audit(0.0:397): avc: denied { write } for name="dnsproxyd" dev="tmpfs" ino=1484 scontext=u:r:init:s0 tcontext=u:object_r:dnsproxyd_socket:s0 tclass=sock_file permissive=1
10-06 20:31:16.416 21663 21663 I mtpd : type=1400 audit(0.0:398): avc: denied { connectto } for path="/dev/socket/dnsproxyd" scontext=u:r:init:s0 tcontext=u:r:netd:s0 tclass=unix_stream_socket permissive=1
10-06 20:31:16.419 21663 21663 D mtpd : Received 20 arguments
10-06 20:31:16.419 21663 21663 I mtpd : Using protocol l2tp
10-06 20:31:16.419 21663 21663 I mtpd : Connecting to search17.ruspo.ru port 1701 via wlan0
10-06 20:31:16.419 21663 21663 I mtpd : type=1400 audit(0.0:399): avc: denied { setopt } for scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=udp_socket permissive=1
10-06 20:31:16.419 21663 21663 I mtpd : type=1400 audit(0.0:400): avc: denied { write } for name="fwmarkd" dev="tmpfs" ino=1480 scontext=u:r:init:s0 tcontext=u:object_r:fwmarkd_socket:s0 tclass=sock_file permissive=1
10-06 20:31:16.419 5371 5371 I netd : type=1400 audit(0.0:401): avc: denied { read write } for path="socket:[42271]" dev="sockfs" ino=42271 scontext=u:r:netd:s0 tcontext=u:r:init:s0 tclass=udp_socket permissive=1
10-06 20:31:16.419 5371 5371 I netd : type=1400 audit(0.0:402): avc: denied { getopt } for scontext=u:r:netd:s0 tcontext=u:r:init:s0 tclass=udp_socket permissive=1
10-06 20:31:16.419 5371 5371 I netd : type=1400 audit(0.0:403): avc: denied { setopt } for scontext=u:r:netd:s0 tcontext=u:r:init:s0 tclass=udp_socket permissive=1
10-06 20:31:16.419 21663 21663 I mtpd : type=1400 audit(0.0:404): avc: denied { connect } for scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=udp_socket permissive=1
10-06 20:31:16.425 21423 21423 I racoon : IPsec-SA request for 178.63.63.82 queued due to no phase1 found.
10-06 20:31:16.425 21423 21423 I racoon : initiate new phase 1 negotiation: 192.168.1.206[500]<=>178.63.63.82[500]
10-06 20:31:16.425 21423 21423 I racoon : begin Identity Protection mode.
10-06 20:31:16.423 21663 21663 I mtpd : type=1400 audit(0.0:405): avc: denied { write } for laddr=192.168.1.206 lport=36934 faddr=178.63.63.82 fport=1701 scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=udp_socket permissive=1
10-06 20:31:16.425 21663 21663 I mtpd : Connection established (socket = 7)
10-06 20:31:16.425 21663 21663 D mtpd : Sending SCCRQ (local_tunnel = 34649)
10-06 20:31:16.468 21423 21423 I racoon : received Vendor ID: RFC 3947
10-06 20:31:16.468 21423 21423 I racoon : received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
10-06 20:31:16.468 21423 21423 I racoon : received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
10-06 20:31:16.468 21423 21423 I racoon :
10-06 20:31:16.468 21423 21423 I racoon : received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
10-06 20:31:16.468 21423 21423 I racoon : received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
10-06 20:31:16.468 21423 21423 I racoon : received Vendor ID: DPD
10-06 20:31:16.468 21423 21423 I racoon : Selected NAT-T version: RFC 3947
10-06 20:31:16.502 21423 21423 I racoon : Hashing 178.63.63.82[500] with algo #2
10-06 20:31:16.502 21423 21423 I racoon : Hashing 192.168.1.206[500] with algo #2
10-06 20:31:16.502 21423 21423 I racoon : Adding remote and local NAT-D payloads.
10-06 20:31:16.548 21423 21423 I racoon : Hashing 192.168.1.206[500] with algo #2
10-06 20:31:16.548 21423 21423 I racoon : NAT-D payload #0 doesn't match
10-06 20:31:16.548 21423 21423 I racoon : Hashing 178.63.63.82[500] with algo #2
10-06 20:31:16.548 21423 21423 I racoon : NAT-D payload #1 verified
10-06 20:31:16.549 21423 21423 I racoon : NAT detected: ME
10-06 20:31:16.550 21423 21423 I racoon : KA list add: 192.168.1.206[4500]->178.63.63.82[4500]
10-06 20:31:16.631 21423 21423 I racoon : ISAKMP-SA established 192.168.1.206[4500]-178.63.63.82[4500] spi:840b08f2a2816946:827cbe91aa83c22b
10-06 20:31:17.327 4902 5038 I ActivityManager: Config changes=480 {1.0 250mcc1mnc ru_RU ldltr sw320dp w533dp h296dp 240dpi nrml long land finger -keyb/v/h -nav/h s.9 themeResource=null}
10-06 20:31:17.329 4902 10545 I InputReader: Reconfiguring input devices. changes=0x00000004
10-06 20:31:17.329 4902 10545 I InputReader: Device reconfigured: id=8, name='sec_touchscreen', size 480x800, orientation 1, mode 1, display id 0
10-06 20:31:17.349 4902 11084 D ConnectivityService: releasing NetworkRequest NetworkRequest [ id=11, legacyType=-1, [] ]
10-06 20:31:17.531 4902 11084 D ConnectivityService: updateNetworkScore for NetworkAgentInfo [WIFI () - 102] to 60
10-06 20:31:17.633 21423 21423 I racoon : initiate new phase 2 negotiation: 192.168.1.206[4500]<=>178.63.63.82[4500]
10-06 20:31:17.634 21423 21423 I racoon : NAT detected -> UDP encapsulation (ENC_MODE 2->4).
10-06 20:31:17.636 4902 11464 D ConnectivityService: listenForNetwork for Listen from uid/pid:1000/12782 for NetworkRequest [ id=12, legacyType=-1, [] ]
10-06 20:31:17.678 21423 21423 W racoon : attribute has been modified.
10-06 20:31:17.678 21423 21423 I racoon : Adjusting my encmode UDP-Transport->Transport
10-06 20:31:17.678 21423 21423 I racoon : Adjusting peer's encmode UDP-Transport(4)->Transport(2)
10-06 20:31:17.678 21423 21423 W racoon : authtype mismatched: my:hmac-sha256 peer:hmac-sha
10-06 20:31:17.679 21423 21423 I racoon : IPsec-SA established: ESP/Transport 178.63.63.82[0]->192.168.1.206[0] spi=58204892(0x37822dc)
10-06 20:31:17.679 21423 21423 I racoon : IPsec-SA established: ESP/Transport 192.168.1.206[4500]->178.63.63.82[4500] spi=2902250743(0xacfcd4f7)
10-06 20:31:17.762 4902 5075 I WindowManager: Screen frozen for +560ms due to Window{86e42d u0 com.android.settings/com.android.settings.SubSettings}
10-06 20:31:18.428 21663 21663 D mtpd : Timeout -> Sending SCCRQ
10-06 20:31:18.478 21663 21663 D mtpd : Received SCCRP (remote_tunnel = 256) -> Sending SCCCN
10-06 20:31:18.473 21663 21663 I mtpd : type=1400 audit(0.0:406): avc: denied { read } for laddr=192.168.1.206 lport=36934 faddr=178.63.63.82 fport=1701 scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=udp_socket permissive=1
10-06 20:31:18.524 21663 21663 D mtpd : Received ACK -> Sending ICRQ (local_session = 5122)
10-06 20:31:18.524 21663 21663 I mtpd : Tunnel established
10-06 20:31:18.567 21663 21663 D mtpd : Received ICRP (remote_session = 256) -> Sending ICCN
10-06 20:31:18.611 21663 21663 D mtpd : Received ACK
10-06 20:31:18.611 21663 21663 I mtpd : Session established
10-06 20:31:18.612 21663 21663 I mtpd : Creating PPPoX socket
10-06 20:31:18.612 21663 21663 F mtpd : Socket() Address family not supported by protocol
10-06 20:31:18.640 4902 21422 I LegacyVpnRunner: Aborting
10-06 20:31:18.640 4902 21422 I LegacyVpnRunner: java.lang.IllegalStateException: mtpd is dead
10-06 20:31:18.640 4902 21422 I LegacyVpnRunner: at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:1296)
10-06 20:31:18.640 4902 21422 I LegacyVpnRunner: at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:1175)
10-06 20:31:18.640 4902 21422 D Vpn : setting state=FAILED, reason=mtpd is dead
10-06 20:31:18.641 21423 21423 I racoon : Connection is closed
i tried to replace mtpd binary from original ROM - no success (exatly same error)
please can you check your active kernel config for such values:
CONFIG_PPP_MPPE=y
CONFIG_PPPOL2TP=y
CONFIG_PPPOLAC=y
CONFIG_PPPOPNS=y
Those flags are not present in the kernel defconfig.
Doesn't you join your config with android_base and android_reccomed ?
Can you make test build with those flags on?
btw you can use free PPTP account at https://freevpn.me/accounts/ to test PPTP connection
Currently my build machine is not set up for building kernels. I have deleted the kernel source locally from my machine as I have discontinued with development.
If you wish to add those flags and build the kernel yourself, here is the defconfig location: arch/arm/configs/dorimanx_defconfig
Follow the build instructions in the readme.
Sorry, I don't have time to work on the S2 anymore because I have switched over to the S5.
I believe you will face same problem (no PPTP/L2TP) onto your new device too since it is kernel-side problem ... So, maybe, you will fix it and backport to S2...
@gsstudios I think this should help: https://github.com/Realex-fire/Dorimanx-SG2-I9100-Kernel/commit/d3e3cd5a019a39567eb5867ada2c1982f3fc90bc
In general, vpn works well. Enabling this option will not be superfluous. This will give more freedom to applications when working with IPSEC
trying onto this ROM http://forum.xda-developers.com/galaxy-s2/development-derivatives/rom-cyanogenmod-11-t2686887
Both (UBER/Linaro) 12.0 b011 builds make build-in VPN client not working OpenVPN and other third-party clients works fine