trailofbits / algo

Set up a personal VPN in the cloud
https://blog.trailofbits.com/2016/12/12/meet-algo-the-vpn-that-works/
GNU Affero General Public License v3.0
28.66k stars 2.32k forks source link

Windows client can not connect to successfully installed Algo VPN (after disabling defragmentation) #1372

Closed upenr closed 5 years ago

upenr commented 5 years ago

Describe the bug

The network connection between your computer and the VPN server could not be established because the remote server is not responding. This could be because one of the network devices (e.g. firewalls, NAT, routers, etc) between your computer and the remote server is not configured to allow VPN connections. Please contact your Administrator or your service provider to determine which device may be causing the problem.

A clear and concise description of what the bug is.

To Reproduce

Steps to reproduce the behavior:

  1. Follow the steps in the documentation for Ubuntu based installation on Google Compute Engine
  2. Download the cacert and user.p12 files and follow the manual Windows client setup
  3. Click Connect from Windows 10 (64 bit) Settings-> Network&Internet -> VPN.

Expected behavior

The client connects to the server and the VPN connection is established

Additional context

I have verified my Netgear router configuration and there is nothing there that drops any VPN related packets. I have already disabled fragmentation on the VPN server as someone else had noted in an issue.

Full log

root@ubuntu-vpn:~/algo-master# ./algo

PLAY [Ask user for the input] **

TASK [Gathering Facts] ***** ok: [localhost] [pause] What provider would you like to use?

  1. DigitalOcean
  2. Amazon Lightsail
  3. Amazon EC2
  4. Vultr
  5. Microsoft Azure
  6. Google Compute Engine
  7. Scaleway
  8. OpenStack (DreamCompute optimised)
  9. Install to existing Ubuntu 18.04 server (Advanced)

Enter the number of your desired provider : 9

TASK [pause] *** ok: [localhost]

TASK [Set facts based on the input] **** ok: [localhost] [pause] Do you want macOS/iOS IPsec clients to enable "Connect On Demand" when connected to cellular networks? [y/N] : N

TASK [pause] *** ok: [localhost] [pause] Do you want macOS/iOS IPsec clients to enable "Connect On Demand" when connected to Wi-Fi? [y/N] : N

TASK [pause] *** ok: [localhost] [pause] Do you want the VPN to support Windows 10 or Linux Desktop clients? (enables compatible ciphers and key exchange, less secure) [y/N] : y

TASK [pause] *** ok: [localhost] [pause] Do you want to retain the CA key? (required to add users in the future, but less secure) [y/N] : y

TASK [pause] *** ok: [localhost] [pause] Do you want to install an ad blocking DNS resolver on this VPN server? [y/N] : y

TASK [pause] *** ok: [localhost] [pause] Do you want each user to have their own account for SSH tunneling? [y/N] : n

TASK [pause] *** ok: [localhost]

TASK [Set facts based on the input] **** ok: [localhost]

PLAY [Provision the server] ****

TASK [Gathering Facts] ***** ok: [localhost]

--> Please include the following block of text when reporting issues:

Algo running on: Ubuntu 18.10 (Virtualized: kvm) ZIP file created: 2019-03-19 16:49:18.000000000 +0000 Python 2.7.15+ Runtime variables: algo_provider "local" algo_ondemand_cellular "False" algo_ondemand_wifi "False" algo_ondemand_wifi_exclude "X251bGw=" algo_local_dns "True" algo_ssh_tunneling "False" algo_windows "True" wireguard_enabled "True" dns_encryption "True"

TASK [Display the invocation environment] ** changed: [localhost -> localhost]

TASK [Install the requirements] **** ok: [localhost -> localhost] [local : pause] Enter the IP address of your server: (or use localhost for local installation): [localhost] :

TASK [local : pause] *** ok: [localhost]

TASK [local : Set the facts] *** ok: [localhost]

TASK [local : Set the facts] *** ok: [localhost] [local : pause] Enter the public IP address or domain name of your server: (IMPORTANT! This is used to verify the certificate) [localhost] :

TASK [local : pause] *************************************************************************************************************************************************** ok: [localhost] TASK [local : Set the facts] ******************************************************************************************************************************************* ok: [localhost] TASK [Set subjectAltName as afact] ************************************************************************************************************************************* ok: [localhost] TASK [Add the server to an inventory group] **************************************************************************************************************************** changed: [localhost] TASK [debug] *********************************************************************************************************************************************************** ok: [localhost] => { "IP_subject_alt_name": "" } Pausing for 20 seconds (ctrl+C then 'C' = continue early, ctrl+C then 'A' = abort) Press 'C' to continue the play or 'A' to abort TASK [A short pause, in order to be sure the instance is ready] ******************************************************************************************************** ok: [localhost] PLAY [Configure the server and install required software] ************************************************************************************************************** TASK [common : Check the system] *************************************************************************************************************************************** changed: [localhost] TASK [common : include_tasks] ****************************************************************************************************************************************** included: /root/algo-master/roles/common/tasks/ubuntu.yml for localhost TASK [common : Gather facts] ******************************************************************************************************************************************* ok: [localhost] TASK [common : Install unattended-upgrades] **************************************************************************************************************************** ok: [localhost] TASK [common : Configure unattended-upgrades] ************************************************************************************************************************** ok: [localhost] TASK [common : Periodic upgrades configured] *************************************************************************************************************************** ok: [localhost] TASK [common : Unattended reboots configured] ************************************************************************************************************************** ok: [localhost] ok: [localhost] => (item={u'regexp': u'^session.*optional.*pam_motd.so.*', u'line': u'# MOTD DISABLED', u'file': u'/etc/pam.d/login'}) ok: [localhost] => (item={u'regexp': u'^session.*optional.*pam_motd.so.*', u'line': u'# MOTD DISABLED', u'file': u'/etc/pam.d/sshd'}) TASK [common : Disable MOTD on login and SSHD] ************************************************************************************************************************* TASK [common : Loopback for services configured] *********************************************************************************************************************** ok: [localhost] ok: [localhost] => (item=systemd-networkd) ok: [localhost] => (item=systemd-resolved) TASK [common : systemd services enabled and started] ******************************************************************************************************************* TASK [common : Check apparmor support] ********************************************************************************************************************************* changed: [localhost] TASK [common : set_fact] *********************************************************************************************************************************************** ok: [localhost] TASK [common : Generate password for the CA key] *********************************************************************************************************************** changed: [localhost -> localhost] TASK [common : Generate p12 export password] *************************************************************************************************************************** changed: [localhost -> localhost] TASK [common : Define facts] ******************************************************************************************************************************************* ok: [localhost] TASK [common : set_fact] *********************************************************************************************************************************************** ok: [localhost] TASK [common : Set IPv6 support as a fact] ***************************************************************************************************************************** ok: [localhost] TASK [common : Check size of MTU] ************************************************************************************************************************************** ok: [localhost] TASK [common : set_fact] *********************************************************************************************************************************************** ok: [localhost] ok: [localhost] => (item=[u'git', u'screen', u'apparmor-utils', u'uuid-runtime', u'coreutils', u'iptables-persistent', u'cgroup-tools', u'openssl']) TASK [common : Install tools] ****************************************************************************************************************************************** TASK [common : Install headers] **************************************************************************************************************************************** ok: [localhost] TASK [common : include_tasks] ****************************************************************************************************************************************** included: /root/algo-master/roles/common/tasks/iptables.yml for localhost ok: [localhost] => (item={u'dest': u'/etc/iptables/rules.v4', u'src': u'rules.v4.j2'}) TASK [common : Iptables configured] ************************************************************************************************************************************ ok: [localhost] => (item={u'item': u'net.ipv4.ip_forward', u'value': 1}) ok: [localhost] => (item={u'item': u'net.ipv4.conf.all.forwarding', u'value': 1}) TASK [dns_encryption : Include tasks for Ubuntu] *********************************************************************************************************************** included: /root/algo-master/roles/dns_encryption/tasks/ubuntu.yml for localhost TASK [dns_encryption : Add the repository] ***************************************************************************************************************************** ok: [localhost] TASK [dns_encryption : Install dnscrypt-proxy] ************************************************************************************************************************* ok: [localhost] TASK [dns_encryption : Configure unattended-upgrades] ****************************************************************************************************************** ok: [localhost] TASK [dns_encryption : Ubuntu | Unbound profile for apparmor configured] *********************************************************************************************** ok: [localhost] TASK [dns_encryption : Ubuntu | Enforce the dnscrypt-proxy AppArmor policy] ******************************************************************************************** ok: [localhost] TASK [dns_encryption : Ubuntu | Ensure that the dnscrypt-proxy service directory exist] ******************************************************************************** ok: [localhost] TASK [dns_encryption : Ubuntu | Add custom requirements to successfully start the unit] ******************************************************************************** ok: [localhost] TASK [dns_encryption : dnscrypt-proxy ip-blacklist configured] ********************************************************************************************************* ok: [localhost] TASK [dns_encryption : dnscrypt-proxy configured] ********************************************************************************************************************** ok: [localhost] TASK [dns_encryption : dnscrypt-proxy enabled and started] ************************************************************************************************************* ok: [localhost] TASK [dns_adblocking : Dnsmasq installed] ****************************************************************************************************************************** ok: [localhost] TASK [dns_adblocking : The dnsmasq directory created] ****************************************************************************************************************** ok: [localhost] TASK [dns_adblocking : include_tasks] ********************************************************************************************************************************** included: /root/algo-master/roles/dns_adblocking/tasks/ubuntu.yml for localhost TASK [dns_adblocking : Ubuntu | Dnsmasq profile for apparmor configured] *********************************************************************************************** ok: [localhost] TASK [dns_adblocking : Ubuntu | Enforce the dnsmasq AppArmor policy] *************************************************************************************************** changed: [localhost] TASK [dns_adblocking : Ubuntu | Ensure that the dnsmasq service directory exist] *************************************************************************************** ok: [localhost] TASK [dns_adblocking : Ubuntu | Setup the cgroup limitations for the ipsec daemon] ************************************************************************************* ok: [localhost] TASK [dns_adblocking : Dnsmasq configured] ***************************************************************************************************************************** ok: [localhost] TASK [dns_adblocking : Adblock script created] ************************************************************************************************************************* ok: [localhost] TASK [dns_adblocking : Adblock script added to cron] ******************************************************************************************************************* changed: [localhost] TASK [dns_adblocking : Update adblock hosts] *************************************************************************************************************************** changed: [localhost] TASK [dns_adblocking : Dnsmasq enabled and started] ******************************************************************************************************************** ok: [localhost] ok: [localhost -> localhost] => (item=private) ok: [localhost -> localhost] => (item=public) TASK [wireguard : Ensure the required directories exist] *************************************************************************************************************** TASK [wireguard : Include tasks for Ubuntu] **************************************************************************************************************************** included: /root/algo-master/roles/wireguard/tasks/ubuntu.yml for localhost TASK [wireguard : WireGuard repository configured] ********************************************************************************************************************* ok: [localhost] TASK [wireguard : WireGuard installed] ********************************************************************************************************************************* ok: [localhost] TASK [wireguard : WireGuard reload-module-on-update] ******************************************************************************************************************* changed: [localhost] TASK [wireguard : Configure unattended-upgrades] *********************************************************************************************************************** ok: [localhost] TASK [wireguard : set_fact] ******************************************************************************************************************************************** ok: [localhost] ok: [localhost] => (item=phone) ok: [localhost] => (item=laptop) ok: [localhost] => (item=desktop) ok: [localhost] => (item=test) ok: [localhost] => (item=user) ok: [localhost] => (item=) TASK [wireguard : Generate private keys] ******************************************************************************************************************************* ok: [localhost] => (item=phone) ok: [localhost] => (item=laptop) ok: [localhost] => (item=desktop) ok: [localhost] => (item=test) ok: [localhost] => (item=user) ok: [localhost] => (item=) TASK [wireguard : Generate public keys] ******************************************************************************************************************************** ok: [localhost] => (item=None) ok: [localhost] => (item=None) ok: [localhost] => (item=None) ok: [localhost] => (item=None) ok: [localhost] => (item=None) ok: [localhost] => (item=None) TASK [wireguard : Save public keys] ************************************************************************************************************************************ ok: [localhost -> localhost] => (item=phone) ok: [localhost -> localhost] => (item=laptop) ok: [localhost -> localhost] => (item=desktop) ok: [localhost -> localhost] => (item=test) ok: [localhost -> localhost] => (item=user) TASK [wireguard : WireGuard user list updated] ************************************************************************************************************************* TASK [wireguard : set_fact] ******************************************************************************************************************************************** ok: [localhost -> localhost] ok: [localhost -> localhost] => (item=(0, u'phone')) ok: [localhost -> localhost] => (item=(1, u'laptop')) ok: [localhost -> localhost] => (item=(2, u'desktop')) ok: [localhost -> localhost] => (item=(3, u'test')) ok: [localhost -> localhost] => (item=(4, u'user')) TASK [wireguard : WireGuard users config generated] ******************************************************************************************************************** ok: [localhost -> localhost] => (item=(0, u'phone')) ok: [localhost -> localhost] => (item=(1, u'laptop')) ok: [localhost -> localhost] => (item=(2, u'desktop')) ok: [localhost -> localhost] => (item=(3, u'test')) ok: [localhost -> localhost] => (item=(4, u'user')) TASK [wireguard : Generate QR codes] *********************************************************************************************************************************** TASK [wireguard : WireGuard configured] ******************************************************************************************************************************** ok: [localhost] TASK [wireguard : WireGuard enabled and started] *********************************************************************************************************************** ok: [localhost] TASK [strongswan : include_tasks] ************************************************************************************************************************************** included: /root/algo-master/roles/strongswan/tasks/ubuntu.yml for localhost TASK [strongswan : set_fact] ******************************************************************************************************************************************* ok: [localhost] TASK [strongswan : Ubuntu | Install strongSwan] ************************************************************************************************************************ ok: [localhost] changed: [localhost] => (item=/usr/lib/ipsec/charon) changed: [localhost] => (item=/usr/lib/ipsec/lookip) changed: [localhost] => (item=/usr/lib/ipsec/stroke) TASK [strongswan : Ubuntu | Enforcing ipsec with apparmor] ************************************************************************************************************* ok: [localhost] => (item=apparmor) ok: [localhost] => (item=strongswan) ok: [localhost] => (item=netfilter-persistent) TASK [strongswan : Ubuntu | Enable services] *************************************************************************************************************************** TASK [strongswan : Ubuntu | Ensure that the strongswan service directory exist] **************************************************************************************** ok: [localhost] TASK [strongswan : Ubuntu | Setup the cgroup limitations for the ipsec daemon] ***************************************************************************************** ok: [localhost] TASK [strongswan : Ensure that the strongswan user exist] ************************************************************************************************************** ok: [localhost] TASK [strongswan : Install strongSwan] ********************************************************************************************************************************* ok: [localhost] ok: [localhost] => (item={u'dest': u'strongswan.conf', u'src': u'strongswan.conf.j2', u'group': u'root', u'mode': u'0644', u'owner': u'root'}) changed: [localhost] => (item={u'dest': u'ipsec.conf', u'src': u'ipsec.conf.j2', u'group': u'root', u'mode': u'0644', u'owner': u'root'}) ok: [localhost] => (item={u'dest': u'ipsec.secrets', u'src': u'ipsec.secrets.j2', u'group': u'root', u'mode': u'0600', u'owner': u'strongswan'}) TASK [strongswan : Setup the config files from our templates] ********************************************************************************************************** TASK [strongswan : Get loaded plugins] ********************************************************************************************************************************* changed: [localhost] ok: [localhost] => (item=attr) ok: [localhost] => (item=xauth-generic) ok: [localhost] => (item=resolve) ok: [localhost] => (item=sha1) ok: [localhost] => (item=dnskey) ok: [localhost] => (item=updown) ok: [localhost] => (item=pkcs1) ok: [localhost] => (item=aesni) ok: [localhost] => (item=gmp) ok: [localhost] => (item=md4) ok: [localhost] => (item=bypass-lan) ok: [localhost] => (item=connmark) ok: [localhost] => (item=counters) ok: [localhost] => (item=mgf1) ok: [localhost] => (item=md5) ok: [localhost] => (item=constraints) ok: [localhost] => (item=xcbc) ok: [localhost] => (item=fips-prf) ok: [localhost] => (item=agent) ok: [localhost] => (item=sshkey) ok: [localhost] => (item=eap-mschapv2) ok: [localhost] => (item=rc2) ok: [localhost] => (item=pkcs7) ok: [localhost] => (item=openssl) ok: [localhost] => (item=nonce) ok: [localhost] => (item=sha2) ok: [localhost] => (item=socket-default) ok: [localhost] => (item=aes) ok: [localhost] => (item=pkcs8) ok: [localhost] => (item=stroke) ok: [localhost] => (item=pem) ok: [localhost] => (item=x509) ok: [localhost] => (item=pgp) ok: [localhost] => (item=pubkey) ok: [localhost] => (item=pkcs12) ok: [localhost] => (item=gcm) ok: [localhost] => (item=kernel-netlink) ok: [localhost] => (item=random) ok: [localhost] => (item=hmac) ok: [localhost] => (item=revocation) TASK [strongswan : Set subjectAltName as a fact] *********************************************************************************************************************** ok: [localhost -> localhost] changed: [localhost -> localhost] => (item=ecparams) changed: [localhost -> localhost] => (item=certs) ok: [localhost -> localhost] => (item=crl) ok: [localhost -> localhost] => (item=newcerts) changed: [localhost -> localhost] => (item=private) changed: [localhost -> localhost] => (item=public) changed: [localhost -> localhost] => (item=reqs) TASK [strongswan : Ensure the pki directories exist] ******************************************************************************************************************* changed: [localhost -> localhost] => (item=apple) changed: [localhost -> localhost] => (item=windows) changed: [localhost -> localhost] => (item=manual) TASK [strongswan : Ensure the config directories exist] **************************************************************************************************************** changed: [localhost -> localhost] => (item=.rnd) changed: [localhost -> localhost] => (item=private/.rnd) changed: [localhost -> localhost] => (item=index.txt) changed: [localhost -> localhost] => (item=index.txt.attr) changed: [localhost -> localhost] => (item=serial) TASK [strongswan : Ensure the files exist] ***************************************************************************************************************************** TASK [strongswan : Generate the openssl server configs] **************************************************************************************************************** ok: [localhost -> localhost] TASK [strongswan : Build the CA pair] ********************************************************************************************************************************** ok: [localhost -> localhost] TASK [strongswan : Copy the CA certificate] **************************************************************************************************************************** ok: [localhost -> localhost] TASK [strongswan : Generate the serial number] ************************************************************************************************************************* ok: [localhost -> localhost] TASK [strongswan : Build the server pair] ****************************************************************************************************************************** ok: [localhost -> localhost] ok: [localhost -> localhost] => (item=phone) ok: [localhost -> localhost] => (item=laptop) ok: [localhost -> localhost] => (item=desktop) ok: [localhost -> localhost] => (item=test) ok: [localhost -> localhost] => (item=user) TASK [strongswan : Build the client's pair] **************************************************************************************************************************** ok: [localhost -> localhost] => (item=phone) ok: [localhost -> localhost] => (item=laptop) ok: [localhost -> localhost] => (item=desktop) ok: [localhost -> localhost] => (item=test) ok: [localhost -> localhost] => (item=user) TASK [strongswan : Build openssh public keys] ************************************************************************************************************************** changed: [localhost -> localhost] => (item=phone) changed: [localhost -> localhost] => (item=laptop) changed: [localhost -> localhost] => (item=desktop) changed: [localhost -> localhost] => (item=test) changed: [localhost -> localhost] => (item=user) TASK [strongswan : Build the client's p12] ***************************************************************************************************************************** changed: [localhost -> localhost] => (item=phone) changed: [localhost -> localhost] => (item=laptop) changed: [localhost -> localhost] => (item=desktop) changed: [localhost -> localhost] => (item=test) changed: [localhost -> localhost] => (item=user) TASK [strongswan : Copy the p12 certificates] ************************************************************************************************************************** TASK [strongswan : Get active users] *********************************************************************************************************************************** changed: [localhost -> localhost] ok: [localhost] => (item={u'dest': u'cacerts/ca.crt', u'src': u'cacert.pem', u'group': u'root', u'mode': u'0600', u'owner': u'strongswan'}) ok: [localhost] => (item={u'dest': u'certs/.crt', u'src': u'certs/.crt', u'group': u'root', u'mode': u'0600', u'owner': u'strongswan'}) ok: [localhost] => (item={u'dest': u'private/.key', u'src': u'private/.key', u'group': u'root', u'mode': u'0600', u'owner': u'strongswan'}) TASK [strongswan : Copy the keys to the strongswan directory] ********************************************************************************************************** changed: [localhost -> localhost] => (item=phone) changed: [localhost -> localhost] => (item=laptop) changed: [localhost -> localhost] => (item=desktop) changed: [localhost -> localhost] => (item=test) changed: [localhost -> localhost] => (item=user) TASK [strongswan : Register p12 PayloadContent] ************************************************************************************************************************ TASK [strongswan : Set facts for mobileconfigs] ************************************************************************************************************************ ok: [localhost -> localhost] changed: [localhost] => (item=None) changed: [localhost] => (item=None) changed: [localhost] => (item=None) changed: [localhost] => (item=None) changed: [localhost] => (item=None) TASK [strongswan : Build the mobileconfigs] **************************************************************************************************************************** changed: [localhost -> localhost] => (item=phone) changed: [localhost -> localhost] => (item=laptop) changed: [localhost -> localhost] => (item=desktop) changed: [localhost -> localhost] => (item=test) changed: [localhost -> localhost] => (item=user) TASK [strongswan : Build the client ipsec config file] ***************************************************************************************************************** changed: [localhost -> localhost] => (item=phone) changed: [localhost -> localhost] => (item=laptop) changed: [localhost -> localhost] => (item=desktop) changed: [localhost -> localhost] => (item=test) changed: [localhost -> localhost] => (item=user) TASK [strongswan : Build the client ipsec secret file] ***************************************************************************************************************** changed: [localhost -> localhost] => (item=[u'phone', {'_ansible_parsed': True, 'stderr_lines': [], u'cmd': u'cat private/phone.p12 | base64', u'end': u'2019-03-23 23:11:21.003209', '_ansible_no_log': False, '_ansible_delegated_vars': {'ansible_delegated_host': u'localhost', 'ansible_host': u'localhost'}, '_ansible_item_result': True, u'changed': True, u'stdout': u'MIIEkQIBAzCCBFcGCSqGSIb3DQEHAaCCBEgEggREMIIEQDCCAucGCSqGSIb3DQEHBqCCAtgwggLU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\nA3OggdxhyFucrtYEgT4l0ssQsQQI7tH3pocAqK4CAggA', 'item': u'phone', u'delta': u'0:00:00.007178', u'stderr': u'', u'rc': 0, u'invocation': {u'module_args': {u'warn': True, u'executable': None, u'_uses_shell': True, u'_raw_params': u'cat private/phone.p12 | base64', u'removes': None, u'creates': None, u'chdir': u'configs//ipsec//.pki/', u'stdin': None}}, 'stdout_lines': [u'MIIEkQIBAzCCBFcGCSqGSIb3DQEHAaCCBEgEggREMIIEQDCCAucGCSqGSIb3DQEHBqCCAtgwggLU', u'AgEAMIICzQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIX2h9g1pDe08CAggAgIICoMyVeA9r', u'9d9GGybVb03BiRLftYqT5ZQ9eD5taiKE+LbR4zzWsx/pOr6etv9F45sl00bK8eixjz8iCAsMbM/o', u'9j3aSmBLsQkn6dU264n42Re96JEP36Goy3YgCHoZaHrOoi1VyPC7bIYcnDJduOZljN2CTB27Huqo', u'V9+od+zoyhehBdPSFAKqUqldZf4QDvmFftOcEmhqwmexOaSaAMOL2QzZkjz2eZPj9lK+BPmnX217', u'Y3+YYE6Rz3cTwhR5c9Ct+n7GrANyvPbR4nDVUE9HTIqQpRIayHlHcwyHIsE62Tp5dVLetyOrAX4r', u'aLRk7ZGAH1p1Tfqs+Rg3KRuGv7EshNs82eHrz4dukzitWoV7XNCPbwkW0GWHU2UNQsnQ8OH3LtFn', u'z6zn5Kf20X8YAlBQFH3bzJ2zaQkxFzk0iTK2t7UryFTEm1wmxJ26R/2lfnC8FmShCF987312Kfgn', u'Ii80STtWUYBy34+iCMucvyNIDWSlCSewXGELCFjGgJagKjLxQdxfKSwIR+INTGyQ9hUZaa2wEQ4R', u'XHq7lVPXScgHF3cjPsybtHi1lkh0JxcN5U7e0w9bbRMT6QxPoUwEYqgdbCcFcb8EY8XoUFrjyA7n', u'tLd8qenUQO3sOaSKx88BpkerQ9nQj0NkZ6SvqWZ3fJpMZ4z8Q4/Zv3LTtgRhp7Pj2AN6cYSKSJtx', u'AOylvN437vj1qllBvhUQ0dSssSi2J7xteXB0JGvq8ZblW++PxmzLFYQHCNJ2zy0c4xI1bU4GTUr/', u'MpSD9UmKzCZKOlqYZsT41x8y8aIzhwcstTdsxmiu/1nAMuC17MXJ2t4GtTeD90xKlgjLITq/2LCL', u'orZ3X+hVlTldV7V33qvPysS28wNJLAaaaBjJcaxBTZMT34m0N1HfVjCCAVEGCSqGSIb3DQEHAaCC', u'AUIEggE+MIIBOjCCATYGCyqGSIb3DQEMCgECoIHkMIHhMBwGCiqGSIb3DQEMAQMwDgQIZ1bDJIfh', u'mZwCAggABIHA4U15qMrF8DsYKT+v9VnoZIS/oOYoi0i4zC05ZcSswLNzJY6fW9tliotArc5zFXtY', u'BX2FAexj+qCwdchropnvLPpvVfHgNLGAESmS+8sXRbuc8Y2/c+rK1ltbOYW8/5WRFM56GN65urBj', u'+SIMZOVO1WrDz/qhp64Q7n/53yNyQw8cYofGphAmgv0i/znK4ufG7I8WaS1nd6qmiWA54RExzyUm', u'LPQoZiO/HxM1Tzb0tojzKEM9PcrUrhDEZEl/g7+vMUAwGQYJKoZIhvcNAQkUMQweCgBwAGgAbwBu', u'AGUwIwYJKoZIhvcNAQkVMRYEFO11h5G+VtPTckFX3JThlJqEL8h1MDEwITAJBgUrDgMCGgUABBRB', u'A3OggdxhyFucrtYEgT4l0ssQsQQI7tH3pocAqK4CAggA'], u'start': u'2019-03-23 23:11:20.996031', '_ansible_ignore_errors': None, 'failed': False}]) changed: [localhost -> localhost] => (item=[u'laptop', {'_ansible_parsed': True, 'stderr_lines': [], u'cmd': u'cat private/laptop.p12 | base64', u'end': u'2019-03-23 23:11:21.260003', '_ansible_no_log': False, '_ansible_delegated_vars': {'ansible_delegated_host': u'localhost', 'ansible_host': u'localhost'}, '_ansible_item_result': True, u'changed': True, u'stdout': u'MIIEkwIBAzCCBFkGCSqGSIb3DQEHAaCCBEoEggRGMIIEQjCCAucGCSqGSIb3DQEHBqCCAtgwggLU\nAgEAMIICzQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQINtG4sbhAg4sCAggAgIICoCKkwYU1\nt1j2JH4Q9w7vI/j2Ddo3e+eK3SKZNngeU5zDHMbV07aFKgiEAkd20V1VjJ22NORr2TPGgcgYOSWP\nLH0bcQf7gxhUiKEgAgjanHuS5twUuOXTTSfFEN9TsrDqLnjc6WyxZdIntwzTIOnkHUZ64YKRaM5i\n7tAbxHBPdKDjRYSsfTP3DqNvgqrGvU2Bmqhu2Ege6fiTmCisjfoV2lJiFE6CSoGi/9KL7AVXD4vK\nxBaFlUtL38qLRVBuS5H5iY76y+y9k9k5lKVwIGpLSaQ1VIMW7cSUVJTOvDRcUMot/QWQ4ULN5fdO\njwSvIT0brJc26qEPigKLqGE0kOpxOI71+XV3WMvo/Hf6wjWMfp1optWGBWfc43Rf2dXgVErohuI/\ncJ7Zn4wUH8/3vaOgiqQyxp0vdM8203RyeIytKqYmWZG84DdP+9I9bbGw1o39Krgljw2I5W5uK/Oq\n28WLMBZ1L85fUk1auLz13aoXDGEoNooqCd/8ypkIp3DNh1xOuaAGRBZLirWLV5T6B59wXfN4TLq0\nBonc7EAdK/BOzqEiIyiIgPc4AhjoOtpGWJq8M5DMByg5zWifs3f8ZCuZIhjunfK6FnEwKvLra9al\nlxmYJqoG/kNPSlaIAoqLrxqGDChjYAteBox3XfN3iSjeUJvogvwqHZTkK2spU5AumVv7E8AzF69O\nOT9LAdWBTQJf/yan6JLz1iK4hlev3eOveHTcKV3p6SbVvaX+CQDwZ8yxKVTzpnsb8F/9X9SEtnu2\nGY30WxFlwq3sCXwfY27RNT0bDowqLKz6/Wn+en2k7Hw32KccrdQehEkaNfuE+igv/dzSJc+HzybJ\njZUQ4zusqRxVo5uEm7Pwt5kZC0+3K2WYwKM6yuxenSuV71qTfmi/RjCCAVMGCSqGSIb3DQEHAaCC\nAUQEggFAMIIBPDCCATgGCyqGSIb3DQEMCgECoIHkMIHhMBwGCiqGSIb3DQEMAQMwDgQIKS/1IUNO\nYsICAggABIHA9KY5dcvdQxbAuUzMim3x1V6PnX0MIZm7xxHWfiRdCFompkcwidGkHPxb6Qfqdp8v\nuer4TqskvkM059i7+QjFGq4vwEV4MRJmRqyW35K2zzL8sIRNzoqzv8UdZzYOmAEdrSj46TUDKCER\nA94yVvCvcxzUs57oK2Nl0Sg1BK1epLDkHLI7UoXcrz5sk+CYssSzu2DKqFyeWBT/FvNM2IV/wTWv\nux++mq9lSI7oQ2uo0e2gXpWW9KhPcDjR/6bDieEiMUIwGwYJKoZIhvcNAQkUMQ4eDABsAGEAcAB0\nAG8AcDAjBgkqhkiG9w0BCRUxFgQU6QWELVd2JtE/XIw1W78CpcA/KzswMTAhMAkGBSsOAwIaBQAE\nFAEJNslL+0tWgkph4YppvTk77ihuBAhfGfxRboNdIAICCAA=', 'item': u'laptop', u'delta': u'0:00:00.003762', u'stderr': u'', u'rc': 0, u'invocation': {u'module_args': {u'warn': True, u'executable': None, u'_uses_shell': True, u'_raw_params': u'cat private/laptop.p12 | base64', u'removes': None, u'creates': None, u'chdir': u'configs//ipsec//.pki/', u'stdin': None}}, 'stdout_lines': [u'MIIEkwIBAzCCBFkGCSqGSIb3DQEHAaCCBEoEggRGMIIEQjCCAucGCSqGSIb3DQEHBqCCAtgwggLU', u'AgEAMIICzQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQINtG4sbhAg4sCAggAgIICoCKkwYU1', u't1j2JH4Q9w7vI/j2Ddo3e+eK3SKZNngeU5zDHMbV07aFKgiEAkd20V1VjJ22NORr2TPGgcgYOSWP', u'LH0bcQf7gxhUiKEgAgjanHuS5twUuOXTTSfFEN9TsrDqLnjc6WyxZdIntwzTIOnkHUZ64YKRaM5i', u'7tAbxHBPdKDjRYSsfTP3DqNvgqrGvU2Bmqhu2Ege6fiTmCisjfoV2lJiFE6CSoGi/9KL7AVXD4vK', u'xBaFlUtL38qLRVBuS5H5iY76y+y9k9k5lKVwIGpLSaQ1VIMW7cSUVJTOvDRcUMot/QWQ4ULN5fdO', u'jwSvIT0brJc26qEPigKLqGE0kOpxOI71+XV3WMvo/Hf6wjWMfp1optWGBWfc43Rf2dXgVErohuI/', u'cJ7Zn4wUH8/3vaOgiqQyxp0vdM8203RyeIytKqYmWZG84DdP+9I9bbGw1o39Krgljw2I5W5uK/Oq', u'28WLMBZ1L85fUk1auLz13aoXDGEoNooqCd/8ypkIp3DNh1xOuaAGRBZLirWLV5T6B59wXfN4TLq0', u'Bonc7EAdK/BOzqEiIyiIgPc4AhjoOtpGWJq8M5DMByg5zWifs3f8ZCuZIhjunfK6FnEwKvLra9al', u'lxmYJqoG/kNPSlaIAoqLrxqGDChjYAteBox3XfN3iSjeUJvogvwqHZTkK2spU5AumVv7E8AzF69O', u'OT9LAdWBTQJf/yan6JLz1iK4hlev3eOveHTcKV3p6SbVvaX+CQDwZ8yxKVTzpnsb8F/9X9SEtnu2', u'GY30WxFlwq3sCXwfY27RNT0bDowqLKz6/Wn+en2k7Hw32KccrdQehEkaNfuE+igv/dzSJc+HzybJ', u'jZUQ4zusqRxVo5uEm7Pwt5kZC0+3K2WYwKM6yuxenSuV71qTfmi/RjCCAVMGCSqGSIb3DQEHAaCC', u'AUQEggFAMIIBPDCCATgGCyqGSIb3DQEMCgECoIHkMIHhMBwGCiqGSIb3DQEMAQMwDgQIKS/1IUNO', u'YsICAggABIHA9KY5dcvdQxbAuUzMim3x1V6PnX0MIZm7xxHWfiRdCFompkcwidGkHPxb6Qfqdp8v', u'uer4TqskvkM059i7+QjFGq4vwEV4MRJmRqyW35K2zzL8sIRNzoqzv8UdZzYOmAEdrSj46TUDKCER', u'A94yVvCvcxzUs57oK2Nl0Sg1BK1epLDkHLI7UoXcrz5sk+CYssSzu2DKqFyeWBT/FvNM2IV/wTWv', u'ux++mq9lSI7oQ2uo0e2gXpWW9KhPcDjR/6bDieEiMUIwGwYJKoZIhvcNAQkUMQ4eDABsAGEAcAB0', u'AG8AcDAjBgkqhkiG9w0BCRUxFgQU6QWELVd2JtE/XIw1W78CpcA/KzswMTAhMAkGBSsOAwIaBQAE', u'FAEJNslL+0tWgkph4YppvTk77ihuBAhfGfxRboNdIAICCAA='], u'start': u'2019-03-23 23:11:21.256241', '_ansible_ignore_errors': None, 'failed': False}]) changed: [localhost -> localhost] => (item=[u'desktop', {'_ansible_parsed': True, 'stderr_lines': [], u'cmd': u'cat private/desktop.p12 | base64', u'end': u'2019-03-23 23:11:21.510108', '_ansible_no_log': False, '_ansible_delegated_vars': {'ansible_delegated_host': u'localhost', 'ansible_host': u'localhost'}, '_ansible_item_result': True, u'changed': True, u'stdout': u'MIIElQIBAzCCBFsGCSqGSIb3DQEHAaCCBEwEggRIMIIERDCCAucGCSqGSIb3DQEHBqCCAtgwggLU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\nAAQUTDvzkWmtgSp8d42SHWTAvkqSgBYECErQ361SesdkAgIIAA==', 'item': u'desktop', u'delta': u'0:00:00.003605', u'stderr': u'', u'rc': 0, u'invocation': {u'module_args': {u'warn': True, u'executable': None, u'_uses_shell': True, u'_raw_params': u'cat private/desktop.p12 | base64', u'removes': None, u'creates': None, u'chdir': u'configs//ipsec//.pki/', u'stdin': None}}, 'stdout_lines': [u'MIIElQIBAzCCBFsGCSqGSIb3DQEHAaCCBEwEggRIMIIERDCCAucGCSqGSIb3DQEHBqCCAtgwggLU', u'AgEAMIICzQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIgG+/2GVi1kMCAggAgIICoChXpp8z', u'igwls350DzaUGLUhDHaDgJG7kXn5QfkMNpIZeK3BJfqsNansBk2qxQjw6r51bG0rJpGnHMxrRWUa', u'hSZ87dRZGVoZKbTjUrRGlFfapykgdJntXiJhU2BCS9uu0sDxzRyunD3O2iD2ryWcWO+ca1ZDFNli', u'8dYxcQtREgZiWkaaGocUduqlw5svj09FEwtlq6LucntEvovdJrrYqspbzQ0jm5BKjv6334zd+RNI', u'c1V3v8NsWEw6OKpI6BSpn9j4fLkLTOrzKPIu046ivpwB4UnY+iajhPpcVN4oYInN0Nh8GNl/pXCW', u'Q9njFwcMJNQjXG/qGX0B7Fhgard4GviMZIhi1tRRGLRY0fnwmZ2VerOo6H4lUqWzvQblf/sLvuh+', u'3F/tkymH1S+8gliU54CihNdTwgHWf5iuPOdvcHUHsJ6QZPVItFqHdr4X4yHd3yW2g1si5ObP4FvW', u'+zbSGDIYEKE7UtkjzPvATdSgxxpJnuotbRESWH2yb+W068es08Ucqjz6TjetMJmG1XDtOixW5bQ3', u'CtAxn3JC/BCLu0wWU+N7fOLGzZumZJvr+AX6eqGhXp3PwG3Dlw9QNLZk/gAv3xBuQgyPNVCvQZUV', u'FDZ7v9BnlLMYoNattYIkxva9PNu22qNO4wj+alp6SPY1GeIIqXLIoYaSbxNKQZW0keYBIljR8d+6', u'i59md7ref+t9XhNAPHOXElF1io9xcKoNh7WaUGOPur1/3wdr2TK369b3lDBRfq8nVrMpVfl6WgNh', u'87XgUmNpjfMmgBnqNwovu9EpnBbo7r16gqlpnKDvkddvmuQzG+3qFpMKLppKnHdbGyv5Z5rfqIUO', u'hr2Pp5XxsJoiitKgisiY10oedJ2TrvPxUEfl5gIbeA8kOERwS2FzKzCCAVUGCSqGSIb3DQEHAaCC', u'AUYEggFCMIIBPjCCAToGCyqGSIb3DQEMCgECoIHkMIHhMBwGCiqGSIb3DQEMAQMwDgQIuwzUptNj', u'sDUCAggABIHAgh6oX4t+AshDz0783/SecErxjYCFLijhNg151bNJsbv1EJM1SUA47ojrpUWs6ET4', u'OUxzjf3i5jVlOA4TUSyFmyyP/6xXJ6BBHlie+PwJMJ5cbTKAwLrRSr2soURzKqmyfFlgy3jEwg6j', u'0VttxZJU2SibHPEVe2IYgFDLgRhdSc4GPRG5aWlV51N8wjvG7SzQnlIYxiG5h/zn++MH6EUuy9O3', u'L6pRZ5KbRmiQzrUErgWxWRFIzLUE782iJTk1FN8YMUQwHQYJKoZIhvcNAQkUMRAeDgBkAGUAcwBr', u'AHQAbwBwMCMGCSqGSIb3DQEJFTEWBBROWXKAc3a40aRuTQRdBrugSfY8bjAxMCEwCQYFKw4DAhoF', u'AAQUTDvzkWmtgSp8d42SHWTAvkqSgBYECErQ361SesdkAgIIAA=='], u'start': u'2019-03-23 23:11:21.506503', '_ansible_ignore_errors': None, 'failed': False}]) changed: [localhost -> localhost] => (item=[u'test', {'_ansible_parsed': True, 'stderr_lines': [], u'cmd': u'cat private/test.p12 | base64', u'end': u'2019-03-23 23:11:21.765759', '_ansible_no_log': False, '_ansible_delegated_vars': {'ansible_delegated_host': u'localhost', 'ansible_host': u'localhost'}, '_ansible_item_result': True, u'changed': True, u'stdout': u'MIIEhwIBAzCCBE0GCSqGSIb3DQEHAaCCBD4EggQ6MIIENjCCAt8GCSqGSIb3DQEHBqCCAtAwggLM\nAgEAMIICxQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIRxkdA+lUFiQCAggAgIICmLOaE/62\n+gxrdyTlUak/CAC+bg9diRKp5LpCBe63R/lAIn6dOr4XYI7qoaFFM0+Ztx8T1/G6vOfHLAKMwk2T\nmhW/W/BtBKjTvIY5PL2670zP6XWJY14ofuKSop1NiFcZe8pR/ZxJe7R++ptFPivcb+teZROGP6f1\nb6QJ/iFT4LeypxQgO5GvCOQFUi2ncxVGblmvneQBSEugYMu2M4jE0/UCIpUqoeGv1NXO6P2zgYHN\n1kRRKJeKa8Wlcsol76AjAKb9rE5nZyGhxyPJ6TsH3MUK2oJc9/3og1i8BGMZ26wUGt9vEQgXtHBy\nYQumJgxBJutUUIwfcO+k8XR/jMK+WUu/NKxQ51uv3pjjSgVHM364hXEIMvLTJ055a7aAliKM5lze\n/cTpzZ1xcOjiRwC2PciOdvmAZgkhSrkcQgnMddER/VkuPobxTwrykBShn3tbl5MTSv8tOSc6twmQ\nP1ufoiMcfwXsCmYezogfvr3lkX4wMN7VMqv2pEu5yBqhKBXp8k6HvcUp6h/UKqrNzfc7tYNyChR6\nq8QwvsU5L0Dq9ismnEwOTKkK2HpQHrzHlKbdl1iV+4rZ/TESj0G6NsG2gmPcy60UDkphO+hrLOIF\n4/KDfdPrAnVqHBF7y/UmKDOivJn4HL0uxi9HYAKc2nRcl0fKn6CrYwX/ETT03rYtRR4vVgtHi5x6\nCFE4ISvtS52yYyHbdDIaQobDcf7P7lyMjINHiEa/pb7hRfTorUjJOYXmoMkF+/RpMf3GS+VnSaZd\nV3DV5+HpBE9en8CmYJc3fDrAwbZ+1IDl98EwkYOfDICmabt+dfX4u54zFaOom+Kf/dmbhvEIZlmo\nT/2zH2cBRRhq+DWWlvcPwlg//m13qcWIWbqjOymXDecwggFPBgkqhkiG9w0BBwGgggFABIIBPDCC\nATgwggE0BgsqhkiG9w0BDAoBAqCB5DCB4TAcBgoqhkiG9w0BDAEDMA4ECFK4d1gBig5gAgIIAASB\nwEP25UqLdfTuNX3DOPUY/zNbY7eakeUF6E/+9fDWN6RZq7XiV5U4vWRGWqFqyoHr9oBy34Xj/7uZ\n5AjFAj1Yvndx7kQ/0LWQ63Lhe+Jkhe2oxHluJJiC17qnL3p01e2WKztU8JaMrWsWiyrK4colZgcN\nfakhHMYvznObDX+jTIBb2rfPoa5MthOL8p8OwOgA1Be+cvwB8QUGqa9AjyMEeOVXn7bQEvo7nwVN\nSHb3uxu06hNedSavZ/lOgEe6WTlfYDE+MBcGCSqGSIb3DQEJFDEKHggAeQA1ADgAMDAjBgkqhkiG\n9w0BCRUxFgQU5/notMCeDHButvs9Jy3M3HbcEl8wMTAhMAkGBSsOAwIaBQAEFMpY6JizqfG45ghf\nbUsWiQBhR9QRBAjMYVNVb4fHjgICCAA=', 'item': u'test', u'delta': u'0:00:00.003604', u'stderr': u'', u'rc': 0, u'invocation': {u'module_args': {u'warn': True, u'executable': None, u'_uses_shell': True, u'_raw_params': u'cat private/test.p12 | base64', u'removes': None, u'creates': None, u'chdir': u'configs//ipsec//.pki/', u'stdin': None}}, 'stdout_lines': [u'MIIEhwIBAzCCBE0GCSqGSIb3DQEHAaCCBD4EggQ6MIIENjCCAt8GCSqGSIb3DQEHBqCCAtAwggLM', u'AgEAMIICxQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIRxkdA+lUFiQCAggAgIICmLOaE/62', u'+gxrdyTlUak/CAC+bg9diRKp5LpCBe63R/lAIn6dOr4XYI7qoaFFM0+Ztx8T1/G6vOfHLAKMwk2T', u'mhW/W/BtBKjTvIY5PL2670zP6XWJY14ofuKSop1NiFcZe8pR/ZxJe7R++ptFPivcb+teZROGP6f1', u'b6QJ/iFT4LeypxQgO5GvCOQFUi2ncxVGblmvneQBSEugYMu2M4jE0/UCIpUqoeGv1NXO6P2zgYHN', u'1kRRKJeKa8Wlcsol76AjAKb9rE5nZyGhxyPJ6TsH3MUK2oJc9/3og1i8BGMZ26wUGt9vEQgXtHBy', u'YQumJgxBJutUUIwfcO+k8XR/jMK+WUu/NKxQ51uv3pjjSgVHM364hXEIMvLTJ055a7aAliKM5lze', u'/cTpzZ1xcOjiRwC2PciOdvmAZgkhSrkcQgnMddER/VkuPobxTwrykBShn3tbl5MTSv8tOSc6twmQ', u'P1ufoiMcfwXsCmYezogfvr3lkX4wMN7VMqv2pEu5yBqhKBXp8k6HvcUp6h/UKqrNzfc7tYNyChR6', u'q8QwvsU5L0Dq9ismnEwOTKkK2HpQHrzHlKbdl1iV+4rZ/TESj0G6NsG2gmPcy60UDkphO+hrLOIF', u'4/KDfdPrAnVqHBF7y/UmKDOivJn4HL0uxi9HYAKc2nRcl0fKn6CrYwX/ETT03rYtRR4vVgtHi5x6', u'CFE4ISvtS52yYyHbdDIaQobDcf7P7lyMjINHiEa/pb7hRfTorUjJOYXmoMkF+/RpMf3GS+VnSaZd', u'V3DV5+HpBE9en8CmYJc3fDrAwbZ+1IDl98EwkYOfDICmabt+dfX4u54zFaOom+Kf/dmbhvEIZlmo', u'T/2zH2cBRRhq+DWWlvcPwlg//m13qcWIWbqjOymXDecwggFPBgkqhkiG9w0BBwGgggFABIIBPDCC', u'ATgwggE0BgsqhkiG9w0BDAoBAqCB5DCB4TAcBgoqhkiG9w0BDAEDMA4ECFK4d1gBig5gAgIIAASB', u'wEP25UqLdfTuNX3DOPUY/zNbY7eakeUF6E/+9fDWN6RZq7XiV5U4vWRGWqFqyoHr9oBy34Xj/7uZ', u'5AjFAj1Yvndx7kQ/0LWQ63Lhe+Jkhe2oxHluJJiC17qnL3p01e2WKztU8JaMrWsWiyrK4colZgcN', u'fakhHMYvznObDX+jTIBb2rfPoa5MthOL8p8OwOgA1Be+cvwB8QUGqa9AjyMEeOVXn7bQEvo7nwVN', u'SHb3uxu06hNedSavZ/lOgEe6WTlfYDE+MBcGCSqGSIb3DQEJFDEKHggAeQA1ADgAMDAjBgkqhkiG', u'9w0BCRUxFgQU5/notMCeDHButvs9Jy3M3HbcEl8wMTAhMAkGBSsOAwIaBQAEFMpY6JizqfG45ghf', u'bUsWiQBhR9QRBAjMYVNVb4fHjgICCAA='], u'start': u'2019-03-23 23:11:21.762155', '_ansible_ignore_errors': None, 'failed': False}]) changed: [localhost -> localhost] => (item=[u'user', {'_ansible_parsed': True, 'stderr_lines': [], u'cmd': u'cat private/user.p12 | base64', u'end': u'2019-03-23 23:11:22.009962', '_ansible_no_log': False, '_ansible_delegated_vars': {'ansible_delegated_host': u'localhost', 'ansible_host': u'localhost'}, '_ansible_item_result': True, u'changed': True, u'stdout': u'MIIEiQIBAzCCBE8GCSqGSIb3DQEHAaCCBEAEggQ8MIIEODCCAt8GCSqGSIb3DQEHBqCCAtAwggLM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\nV5m5V5kOPUMinGgECFcJZM/b79BAAgIIAA==', 'item': u'user', u'delta': u'0:00:00.003562', u'stderr': u'', u'rc': 0, u'invocation': {u'module_args': {u'warn': True, u'executable': None, u'_uses_shell': True, u'_raw_params': u'cat private/user.p12 | base64', u'removes': None, u'creates': None, u'chdir': u'configs//ipsec//.pki/', u'stdin': None}}, 'stdout_lines': [u'MIIEiQIBAzCCBE8GCSqGSIb3DQEHAaCCBEAEggQ8MIIEODCCAt8GCSqGSIb3DQEHBqCCAtAwggLM', u'AgEAMIICxQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQI7UeGCzNHV/4CAggAgIICmAw4aDo2', u'4tNpy9kNy+ZXf9fAYi4qij5Cr0aLoySXu1l7Z/9KP2lZJX+9FiCAlANAxwsFjQDBNrIescX1U5V0', u'9An4LL+Xb/gGkRl9mt715dnHdVj/O5jfXuMek3fnTjNsIyEvf4tJAvZ9xH1ZwO43R4vV4qQ1FoP5', u'/JGH+Ud6ivJGVoYBKge6OhadcBXh4rm6/xxNohm/au5jpYy/hGf6rxX1iRdlGxcd4Nimiw2u0axH', u'ow74ZlKs6WM2IP6SFO4Ywsu7lgj6EaXHn38qaIXiuQ4TjluPVopZ1HMQXWNLCu3uuCp55ZIJ1S95', u'5i3cWcY11W+c5UspExvKq6wFgefvJEQsthRbBuVe/7AiX+ntQ8OiFd+hSCtPkdut5G6SQrHI+OBO', u'OKuMgnwi4OmY31/9GW2ElppQno7d+OMK1ZCDIMsynbSJiHZDTEB1hAz+OMCswauY8sC9T2TWbNFH', u'WARv+jL/xYjEkLMJ4O9eXKR7fj/fWJn/ONat6bZ26Ki5/OW5uqpB6YrLeBBYTNSr4gXbyvvgamnp', u'ReoOND1Dhq7ft6K+ezEapVex1+ZKwiVtxLQ9MXro1ptB794Z0oK39y7XA9JM3VDAr/+QOqK7aP6g', u'DZFkMoalz1rWUAtI7+3zxFRHDcpQoEVEhSaduGG6aZCpq7DXN2SWxSeLa5W1Bb6KhiqZQxzF91uG', u'NU1WJZeppZbJh+1A4SJmFPaz6glwPJqsReH8x2MN6EFJSVeaIlJwdQZMYIXOVPNKjxnsoNYe6jeL', u'uudo48mFmrVTLCTnFRAPXslc0bTe83aRjtQWhhZ+W1EprzXWuZ82vhgUuf5s3NnRBQZ/FQWyoesM', u'KmENUnFafSf8kCu70UEqbpH/8sQcPec0F99wotgphWowggFRBgkqhkiG9w0BBwGgggFCBIIBPjCC', u'ATowggE2BgsqhkiG9w0BDAoBAqCB5DCB4TAcBgoqhkiG9w0BDAEDMA4ECHFmjE7i6gRTAgIIAASB', u'wF4z5IQgjv7k6cJ5eby2QLuxwj/ERUw2UvMXKL5DfdvKEVisKO4HJdqgceYWsvar8ztjqm5LcNDg', u'yXaQa8azZZTNvEUIQGGMnl4dZMQVX/PHuacQYpgY88P+Yeh/CWeD1sOF+0a3d8F6k15CF+VlzYIQ', u'kXsuky+HSB9GNS9K0eoSm4/gXn7EKuGirI0zEPxKk36L2jN4/sgLEDF/rj3d/WOlVNn42TcFL9hO', u'Qt1iy6fxrDpsyTm0us0HswhKscH9gTFAMBkGCSqGSIb3DQEJFDEMHgoAdQBwAGUAbgByMCMGCSqG', u'SIb3DQEJFTEWBBTix+KrjLwZe5o860Vi+bk+0KSd7DAxMCEwCQYFKw4DAhoFAAQUGA5HGoJbQpUA', u'V5m5V5kOPUMinGgECFcJZM/b79BAAgIIAA=='], u'start': u'2019-03-23 23:11:22.006400', '_ansible_ignore_errors': None, 'failed': False}]) TASK [strongswan : Build the windows client powershell script] ********************************************************************************************************* TASK [strongswan : Restrict permissions for the local private directories] ********************************************************************************************* ok: [localhost -> localhost] TASK [strongswan : strongSwan started] ********************************************************************************************************************************* changed: [localhost] RUNNING HANDLER [dns_adblocking : restart apparmor] ******************************************************************************************************************** changed: [localhost] RUNNING HANDLER [strongswan : restart strongswan] ********************************************************************************************************************** changed: [localhost] TASK [Dump the configuration] ****************************************************************************************************************************************** ok: [localhost -> localhost] TASK [Create a symlink if deploying to localhost] ********************************************************************************************************************** ok: [localhost] TASK [debug] *********************************************************************************************************************************************************** ok: [localhost] => { "msg": [ [ "\"# Congratulations! #\"", "\"# Your Algo server is running. #\"", "\"# Config files and certificates are in the ./configs/ directory. #\"", "\"# Go to https://whoer.net/ after connecting #\"", "\"# and ensure that all your traffic passes through the VPN. #\"", "\"# Local DNS resolver 172.16.0.1 #\"", "" ], " \"# The p12 and SSH keys password for new users is xxxxxxxx #\"\n", " \"# The CA key password is xxxx #\"\n", " " ] } PLAY RECAP ************************************************************************************************************************************************************* localhost : ok=126 changed=27 unreachable=0 failed=0
davidemyers commented 5 years ago
9. Install to existing Ubuntu 18.04 server (Advanced)

Enter the number of your desired provider
:
9
Algo running on: Ubuntu 18.10 (Virtualized: kvm)

Try installing on the supported version of Ubuntu.

davidemyers commented 5 years ago
6. Google Compute Engine

Use the option to deploy to GCE and Algo will select the correct Ubuntu version as well as configure the GCE firewall for you, a step you perhaps missed.

You can find GCE setup instructions here.

TC1977 commented 5 years ago

Not to be rude, but you didn't follow the documentation step-by-step. There's all sorts of assumptions and networking intricacies that will change, even in minor step versions.

Try installing on an 18.04 VM, or letting Algo create an instance on GCE for you, as @davidemyers suggests. Just try it. If you still have a problem with Ubuntu 18.04, then let's debug further.