xelerance / xl2tpd

Official Xelerance fork of L2TPd
GNU General Public License v2.0
520 stars 203 forks source link

Received out of order control packet on tunnel 1 (got 1, expected 2) #136

Closed bettercalljason closed 6 years ago

bettercalljason commented 7 years ago

Hello I am currently trying to establish an IPsec/L2TP Tunnel to a Watchguard Firewall. We use the same configuration for other VPN's to CISCO ASA Firewalls and it always works.

I could manage to establish the IPsec tunnel. However, when trying to connect with L2TP i get the following output.

I can create the VPN with Windows 8.1/10 and connect without any issues.

Below, I replaced the username, password and peer-IP (the Watchguard Firewall) and local-IP (me, using xl2tpd) with placeholders.

Version:

root@dev:/etc# xl2tpd -v
xl2tpd version:  xl2tpd-1.3.10

User side result:

root@dev:/etc# xl2tpd connect IPSECL2TPVPN
root@dev:/etc# journalctl -f
pppd[11833]: Using interface ppp0
pppd[11833]: Connect: ppp0 <--> /dev/pts/1
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
xl2tpd[3367]: check_control: Received out of order control packet on tunnel 1 (got 1, expected 2)
xl2tpd[3367]: handle_packet: bad control packet!
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
xl2tpd[3367]: check_control: Received out of order control packet on tunnel 1 (got 1, expected 2)
xl2tpd[3367]: handle_packet: bad control packet!
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
xl2tpd[3367]: check_control: Received out of order control packet on tunnel 1 (got 1, expected 2)
xl2tpd[3367]: handle_packet: bad control packet!
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
xl2tpd[3367]: check_control: Received out of order control packet on tunnel 1 (got 1, expected 2)
xl2tpd[3367]: handle_packet: bad control packet!
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
xl2tpd[3367]: check_control: Received out of order control packet on tunnel 1 (got 1, expected 2)
xl2tpd[3367]: handle_packet: bad control packet!
pppd[11833]: sent [LCP ConfReq id=0x1 <mru 1300> <asyncmap 0x0> <magic 0x9e748fd2> <pcomp> <accomp>]
pppd[11833]: LCP: timeout sending Config-Requests
xl2tpd[3367]: Maximum retries exceeded for tunnel 12541.  Closing.
xl2tpd[3367]: Terminating pppd: sending TERM signal to pid 11833
xl2tpd[3367]: Connection 1 closed to <PEERIP>, port 1701 (Timeout)
pppd[11833]: Terminating on signal 15
pppd[11833]: Modem hangup
pppd[11833]: Connection terminated.
pppd[11833]: Exit.

Configuration:

root@dev:/etc# nano /etc/xl2tpd/xl2tpd.conf
[global]
debug tunnel = yes
debug avp = yes
debug network = yes
debug state = yes
debug packet = yes

[lns default]
refuse chap = yes
refuse pap = yes
ppp debug = yes
length bit = yes

[lac IPSECL2TPVPN]
lns = <PEERIP>
pppoptfile = /etc/ppp/options.xl2tpd.IPSECL2TPVPN

and

root@dev:/etc# nano /etc/ppp/options.xl2tpd.IPSECL2TPVPN
ipparam IPSECL2TPVPN
ipcp-accept-local
ipcp-accept-remote
refuse-eap
require-mschap-v2
noccp
noauth
mtu 1400
mru 1400
idle 1800
nodefaultroute
refuse-chap
usepeerdns
debug
connect-delay 5000
name "<USERNAME>"
password "<PASSWORD>"

On the side of the Watchguard Firewall I get the following messages:

2017-10-05 16:41:27 iked (<PEERIP><-><LOCALIP>)'L2TP-IPSec' L2TP IPSec tunnel is established. local:<PEERIP>/32 remote:<LOCALIP>/32 in-SA:0x9439cce4 out-SA:0xcaa3950f role:responder id="0207-0001"     Event
2017-10-05 16:41:32 accel-pppd :: recv [L2TP tid=0 sid=0 Ns=0 Nr=0 <Message-Type Start-Ctrl-Conn-Request> <Protocol-Version 256> <Framing-Capabilities 3> <Bearer-Capabilities 0> <Firmware-Revision 1680> <Host-Name l2tpDEVLOCAL> <Vendor-Name xelerance.com> <Assigned-Tunnel-ID 30330> <Recv-Window-Size 4>]         Debug
2017-10-05 16:41:32 accel-pppd :: send [L2TP tid=30330 sid=0 Ns=0 Nr=1 <Message-Type Start-Ctrl-Conn-Reply> <Protocol-Version 256> <Host-Name ZVHONET254> <Framing-Capabilities 3> <Assigned-Tunnel-ID 1> <Vendor-Name accel-ppp>]       Debug
2017-10-05 16:41:32 accel-pppd :: recv [L2TP tid=1 sid=0 Ns=1 Nr=1 <Message-Type Start-Ctrl-Conn-Connected>]     Debug
2017-10-05 16:41:32 accel-pppd :: recv [L2TP tid=1 sid=0 Ns=2 Nr=1 <Message-Type Incoming-Call-Request> <Assigned-Session-ID 9682> <Call-Serial-Number 2> <Bearer-Type 0>]       Debug
2017-10-05 16:41:32 accel-pppd :: send [L2TP tid=30330 sid=9682 Ns=1 Nr=3 <Message-Type Incoming-Call-Reply> <Assigned-Session-ID 1>]    Debug
2017-10-05 16:41:32 accel-pppd l2tp: incorrect avp received (type=38, M=0, must be 1)    Debug
2017-10-05 16:41:33 accel-pppd l2tp: incorrect avp received (type=38, M=0, must be 1)    Debug
2017-10-05 16:41:35 accel-pppd l2tp: incorrect avp received (type=38, M=0, must be 1)    Debug
2017-10-05 16:41:37 accel-pppd :: l2tp: retransmit (0)   Debug
2017-10-05 16:41:37 accel-pppd :: send [L2TP tid=30330 sid=9682 Ns=1 Nr=3 <Message-Type Incoming-Call-Reply> <Assigned-Session-ID 1>]    Debug
2017-10-05 16:41:39 accel-pppd l2tp: incorrect avp received (type=38, M=0, must be 1)    Debug
2017-10-05 16:41:42 accel-pppd :: l2tp: retransmit (1)   Debug
2017-10-05 16:41:42 accel-pppd :: send [L2TP tid=30330 sid=9682 Ns=1 Nr=3 <Message-Type Incoming-Call-Reply> <Assigned-Session-ID 1>]    Debug
2017-10-05 16:41:47 accel-pppd :: l2tp: retransmit (2)   Debug
2017-10-05 16:41:47 accel-pppd :: send [L2TP tid=30330 sid=9682 Ns=1 Nr=3 <Message-Type Incoming-Call-Reply> <Assigned-Session-ID 1>]    Debug
2017-10-05 16:41:47 accel-pppd l2tp: incorrect avp received (type=38, M=0, must be 1)    Debug
2017-10-05 16:41:52 accel-pppd :: l2tp: retransmit (3)   Debug
2017-10-05 16:41:52 accel-pppd :: send [L2TP tid=30330 sid=9682 Ns=1 Nr=3 <Message-Type Incoming-Call-Reply> <Assigned-Session-ID 1>]    Debug
2017-10-05 16:41:57 accel-pppd :: l2tp: retransmit (4)   Debug
2017-10-05 16:41:57 accel-pppd :: send [L2TP tid=30330 sid=9682 Ns=1 Nr=3 <Message-Type Incoming-Call-Reply> <Assigned-Session-ID 1>]    Debug
2017-10-05 16:42:02 accel-pppd :: l2tp: retransmit (5)   Debug
2017-10-05 16:42:02 l2tp [:00219,l2tp_session_terminate]: (l2tp) l2tp-wgapi: session does not exists for client <LOCALIP>:1386       Debug
2017-10-05 16:43:16 l2tp [:00182,l2tp_system_event]: (l2tp) l2tp-wrap: ignore system event 65539         Debug

Can you please help me? Thank you very much in advance.

ghost commented 6 years ago

Hey Jason,

I had the same issue connecting to a Watchguard firewall no matter what options I've tried, there's something wrong with this combination.

The final solution was switching to https://github.com/themiron/rp-l2tp With rp-l2tp the connection succeeded at the first attempt.

dvergeylen commented 6 years ago

Hi @shadyhh,

I am experiencing the same issue, with the same Firewall and client configuration. Did you manage to solve the problem?

bettercalljason commented 6 years ago

Hi @szatam, how does your rp-l2tp configuration file look like? Can xl2tpd and rp-l2tp be used at the same time? So for the non-watchguard VPN's I'd use xl2tpd and for the watchguard VPN's I'd use rp-l2tp.

daniel1111 commented 6 years ago

I've hit the same issue, and eventually got it to connect by commenting out this line: https://github.com/xelerance/xl2tpd/blob/030f8fe64a8055ce761f3de21897bb34767f33e3/control.c#L847

BTW, I don't have access to the VPN server logs (although I believe it is a watchguard firewall) so I'd never have got it working without your logs @shadyhh, thanks :)

erniehh commented 6 years ago

@daniel1111 Great Job, the Patch works for me, big thanks!

bettercalljason commented 6 years ago

@daniel1111 It worked for me too, thanks! :)

supremesyntax commented 6 years ago

@shadyhh Found this by searching for the error message "out of bound.. etc..." Answers seem promising - i will test it tomorrow! Please reopen this issue maybe someone can solve it by putting a condition around the mentioned line

EDIT: Update! I have downloaded the latest release zip and commented out line 847 as suggested by @daniel1111 then compiled it and made a debian package. Now it is working! We are also using a Watchguard Firewall. So maybe someone who knows what this is about can write a condition around the line. My knowledge here is very limited. I am getting following indicators in debug mode (avp related) so maybe one of these is usable:

... xl2tpd[24464]: protocol_version_avp: peer is using version 1, revision 0. xl2tpd[24464]: hostname_avp: peer reports hostname 'Firebox-M500' xl2tpd[24464]: framing_caps_avp: supported peer frames: async sync xl2tpd[24464]: assigned_tunnel_avp: using peer's tunnel 5 xl2tpd[24464]: vendor_avp: peer reports vendor 'accel-ppp' ... xl2tpd[24464]: message_type_avp: message type 11 (Incoming-Call-Reply) xl2tpd[24464]: assigned_call_avp: using peer's call 1

leonardoce commented 6 years ago

Hi. Same for me. I had the same issue on Fedora 27 and downloaded the latest master, commented the line that @daniel1111 indicated and built a Fedora package. Now everything works correctly. Thanks!

peturh commented 6 years ago

This worked for me as well.

Any plans on merging this fix in?

shussain commented 6 years ago

Yes. It will be in the 1.3.13 dev branch.

The delay is finding the time to add a configuration for Watchguard Firewall (add a keyword for commenting out "add_rxspeed_avp (buf, t->rxspeed);" ). I am currently a bit swamped right now but if anyone has the time to add that configuration, it would be greatly appreciated. Or else it can wait till I get some spare time.

grantterra commented 6 years ago

very useful, thank you guys.

shussain commented 6 years ago

Pushed commit 210eb9904f85eccdb3f16f6e276d7fd78d4dbd10 to 1.3.13 branch

rjschave commented 6 years ago

I installed branch 1.3.13 using steps similar to https://github.com/xelerance/xl2tpd/issues/147#issuecomment-386793985, but am still unable to connect to my Watchguard firewall.

If I comment out the line referenced by @daniel1111 in https://github.com/xelerance/xl2tpd/issues/136#issuecomment-365761037, I am able to connect.

Do I need to do something with CONFIG_WATCHDOG_FIREWALL to exclude the offending line of code?

shussain commented 6 years ago

@rjschave You can add -D CONFIG_WATCHDOG_FIREWALL to the DFLAGS in Makefile and compile

supremesyntax commented 5 years ago

I would like to add that if someone wants to create a debian package you have to add -DCONFIG_WATCHDOG_FIREWALL to the CFLAGS and CPPFLAGS in debian/rules

bettercalljason commented 5 years ago

Since we have many peers to connect to and only one is a watchguard firewall, I needed to be able to set this option per lac. I therefore removed the preproc and changed it to a lac configuration setting. https://github.com/shadyhh/xl2tpd/commit/0b3d4988

bezirg commented 5 years ago

Thank you for this fix, it works (patch applied ontop of 1.3.14). Any plans to have a "universal" fix for this bug in upstream?

peturh commented 4 years ago

Just installed Ubuntu 19.10 and ran into this error again.

This is my steps to fix it on Ubuntu.

First, clone master from here. (I used 1.3.15).

Install checkinstall. apt install checkinstall

Modify flags in Makefile add CONFIG_WATCHDOG_FIREWALL to DFLAGS? (or remove the line in control.c

# make $ checkinstall

Then install network-manager-l2tp

$ apt install network-manager-l2tp network-manager-l2tp-gnome

Then reboot.

Using checkinstall will stop apt from downloading xl2tpd from your sources.

Now it works. I coudln't use 3des-sha1-modp1024, something about Linux kernel prohibits it? What worked for me was: aes-sha256-modp1024 but make sure your system adminstorator has allowed those crypto groups.

ShashikanthChill commented 4 years ago

I'm on Fedora 32 and the available package is xl2tpd-1.3.14. I'm facing the same issue: "check_control: Received out of order control packet on tunnel 20069 (got 2, expected 3)" when connecting to VPN using t2tp/ipsec protocol.

Following the above guide, I ran: rpm -e xl2tpd --nodeps to remove 1.3.14 version. Then cloned 1.3.15 branch. Commented out line 847 in control.c file, added -DCONFIG_WATCHDOG_FIREWALL to DFLAGS?. Then ran make && sudo make install. Copied xl2tpd & xl2tpd-control from /usr/local/sbin to /usr/sbin/. Tried connecting to vpn from gnome network management applet. Still, the same issue.

logs from journalctl -n 0 -fu NetworkManager.service :

Jul 04 16:41:54 localhost.localdomain NetworkManager[840]: <info> [1593861114.3904] audit: op="connection-activate" uuid="4dd9b863-c9f3-4c0a-9f41-240078fa51d1" name="RMP" pid=4720 uid=1000 result="success" Jul 04 16:41:54 localhost.localdomain NetworkManager[840]: <info> [1593861114.3997] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",0]: Started the VPN service, PID 4763 Jul 04 16:41:54 localhost.localdomain NetworkManager[840]: <info> [1593861114.4138] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",0]: Saw the service appear; activating connection Jul 04 16:41:54 localhost.localdomain NetworkManager[840]: <info> [1593861114.4779] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",0]: VPN connection: (ConnectInteractive) reply received Jul 04 16:41:54 localhost.localdomain nm-l2tp-service[4763]: Check port 1701 Jul 04 16:41:54 localhost.localdomain NetworkManager[4780]: Stopping strongSwan IPsec failed: starter is not running Jul 04 16:41:56 localhost.localdomain NetworkManager[4777]: Starting strongSwan 5.8.4 IPsec [starter]... Jul 04 16:41:56 localhost.localdomain NetworkManager[4777]: Loading config setup Jul 04 16:41:56 localhost.localdomain NetworkManager[4777]: Loading conn '4dd9b863-c9f3-4c0a-9f41-240078fa51d1' Jul 04 16:41:56 localhost.localdomain ipsec_starter[4777]: Starting strongSwan 5.8.4 IPsec [starter]... Jul 04 16:41:56 localhost.localdomain ipsec_starter[4777]: Loading config setup Jul 04 16:41:56 localhost.localdomain ipsec_starter[4777]: Loading conn '4dd9b863-c9f3-4c0a-9f41-240078fa51d1' Jul 04 16:41:56 localhost.localdomain ipsec_starter[4788]: Attempting to start charon... Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[DMN] Starting IKE charon daemon (strongSwan 5.8.4, Linux 5.7.6-201.fc32.x86_64, x86_64) Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] PKCS11 module '<name>' lacks library path Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[LIB] openssl FIPS mode(2) - enabled Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loading ca certificates from '/etc/strongswan/ipsec.d/cacerts' Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loading aa certificates from '/etc/strongswan/ipsec.d/aacerts' Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loading ocsp signer certificates from '/etc/strongswan/ipsec.d/ocspcerts' Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loading attribute certificates from '/etc/strongswan/ipsec.d/acerts' Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loading crls from '/etc/strongswan/ipsec.d/crls' Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loading secrets from '/etc/strongswan/ipsec.secrets' Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loading secrets from '/etc/strongswan/ipsec.d/ipsec.nm-l2tp.secrets' Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loaded IKE secret for %any Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] opening triplet file /etc/strongswan/ipsec.d/triplets.dat failed: No such file or directory Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] loaded 0 RADIUS server configurations Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] HA config misses local/remote address Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[CFG] no script for ext-auth script defined, disabled Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[LIB] loaded plugins: charon pkcs11 tpm aesni aes des rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp curve25519 chapoly xcbc cmac hmac ctr ccm gcm drbg newhope curl attr kernel-netlink resolve socket-default farp stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp eap-aka-3gpp2 eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp led duplicheck unity counters Jul 04 16:41:56 localhost.localdomain charon[4789]: 00[JOB] spawning 16 worker threads Jul 04 16:41:56 localhost.localdomain ipsec_starter[4788]: charon (4789) started after 40 ms Jul 04 16:41:56 localhost.localdomain charon[4789]: 06[CFG] received stroke: add connection '4dd9b863-c9f3-4c0a-9f41-240078fa51d1' Jul 04 16:41:56 localhost.localdomain charon[4789]: 06[CFG] added configuration '4dd9b863-c9f3-4c0a-9f41-240078fa51d1' Jul 04 16:41:57 localhost.localdomain charon[4789]: 07[CFG] rereading secrets Jul 04 16:41:57 localhost.localdomain charon[4789]: 07[CFG] loading secrets from '/etc/strongswan/ipsec.secrets' Jul 04 16:41:57 localhost.localdomain charon[4789]: 07[CFG] loading secrets from '/etc/strongswan/ipsec.d/ipsec.nm-l2tp.secrets' Jul 04 16:41:57 localhost.localdomain charon[4789]: 07[CFG] loaded IKE secret for %any Jul 04 16:41:57 localhost.localdomain charon[4789]: 09[CFG] received stroke: initiate '4dd9b863-c9f3-4c0a-9f41-240078fa51d1' Jul 04 16:41:57 localhost.localdomain charon[4789]: 11[IKE] initiating Main Mode IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] to 211.24.100.227 Jul 04 16:41:57 localhost.localdomain charon[4789]: 11[IKE] initiating Main Mode IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] to 211.24.100.227 Jul 04 16:41:57 localhost.localdomain charon[4789]: 11[ENC] generating ID_PROT request 0 [ SA V V V V V ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 11[NET] sending packet: from 192.168.0.107[500] to 211.24.100.227[500] (532 bytes) Jul 04 16:41:57 localhost.localdomain charon[4789]: 12[NET] received packet: from 211.24.100.227[500] to 192.168.0.107[500] (132 bytes) Jul 04 16:41:57 localhost.localdomain charon[4789]: 12[ENC] parsed ID_PROT response 0 [ SA V V V ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 12[IKE] received XAuth vendor ID Jul 04 16:41:57 localhost.localdomain charon[4789]: 12[IKE] received DPD vendor ID Jul 04 16:41:57 localhost.localdomain charon[4789]: 12[IKE] received NAT-T (RFC 3947) vendor ID Jul 04 16:41:57 localhost.localdomain charon[4789]: 12[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024 Jul 04 16:41:57 localhost.localdomain charon[4789]: 12[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 12[NET] sending packet: from 192.168.0.107[500] to 211.24.100.227[500] (244 bytes) Jul 04 16:41:57 localhost.localdomain charon[4789]: 13[NET] received packet: from 211.24.100.227[500] to 192.168.0.107[500] (244 bytes) Jul 04 16:41:57 localhost.localdomain charon[4789]: 13[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 13[IKE] local host is behind NAT, sending keep alives Jul 04 16:41:57 localhost.localdomain charon[4789]: 13[ENC] generating ID_PROT request 0 [ ID HASH ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 13[NET] sending packet: from 192.168.0.107[4500] to 211.24.100.227[4500] (68 bytes) Jul 04 16:41:57 localhost.localdomain charon[4789]: 14[NET] received packet: from 211.24.100.227[4500] to 192.168.0.107[4500] (68 bytes) Jul 04 16:41:57 localhost.localdomain charon[4789]: 14[ENC] parsed ID_PROT response 0 [ ID HASH ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 14[IKE] IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] established between 192.168.0.107[192.168.0.107]...211.24.100.227[211.24.100.227] Jul 04 16:41:57 localhost.localdomain charon[4789]: 14[IKE] IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] established between 192.168.0.107[192.168.0.107]...211.24.100.227[211.24.100.227] Jul 04 16:41:57 localhost.localdomain charon[4789]: 14[IKE] scheduling reauthentication in 9906s Jul 04 16:41:57 localhost.localdomain charon[4789]: 14[IKE] maximum IKE_SA lifetime 10446s Jul 04 16:41:57 localhost.localdomain charon[4789]: 14[ENC] generating QUICK_MODE request 3937668591 [ HASH SA No ID ID NAT-OA NAT-OA ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 14[NET] sending packet: from 192.168.0.107[4500] to 211.24.100.227[4500] (244 bytes) Jul 04 16:41:57 localhost.localdomain charon[4789]: 15[NET] received packet: from 211.24.100.227[4500] to 192.168.0.107[4500] (188 bytes) Jul 04 16:41:57 localhost.localdomain charon[4789]: 15[ENC] parsed QUICK_MODE response 3937668591 [ HASH SA No ID ID NAT-OA NAT-OA ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 15[CFG] selected proposal: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ Jul 04 16:41:57 localhost.localdomain charon[4789]: 15[IKE] CHILD_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1{1} established with SPIs c59afd14_i c111538d_o and TS 192.168.0.107/32[udp/l2tp] === 211.24.100.227/32[udp/l2tp] Jul 04 16:41:57 localhost.localdomain charon[4789]: 15[IKE] CHILD_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1{1} established with SPIs c59afd14_i c111538d_o and TS 192.168.0.107/32[udp/l2tp] === 211.24.100.227/32[udp/l2tp] Jul 04 16:41:57 localhost.localdomain charon[4789]: 15[ENC] generating QUICK_MODE request 3937668591 [ HASH ] Jul 04 16:41:57 localhost.localdomain charon[4789]: 15[NET] sending packet: from 192.168.0.107[4500] to 211.24.100.227[4500] (60 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: initiating Main Mode IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] to 211.24.100.227 Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: generating ID_PROT request 0 [ SA V V V V V ] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: sending packet: from 192.168.0.107[500] to 211.24.100.227[500] (532 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: received packet: from 211.24.100.227[500] to 192.168.0.107[500] (132 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: parsed ID_PROT response 0 [ SA V V V ] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: received XAuth vendor ID Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: received DPD vendor ID Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: received NAT-T (RFC 3947) vendor ID Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024 Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: sending packet: from 192.168.0.107[500] to 211.24.100.227[500] (244 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: received packet: from 211.24.100.227[500] to 192.168.0.107[500] (244 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: local host is behind NAT, sending keep alives Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: generating ID_PROT request 0 [ ID HASH ] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: sending packet: from 192.168.0.107[4500] to 211.24.100.227[4500] (68 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: received packet: from 211.24.100.227[4500] to 192.168.0.107[4500] (68 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: parsed ID_PROT response 0 [ ID HASH ] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] established between 192.168.0.107[192.168.0.107]...211.24.100.227[211.24.100.227] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: scheduling reauthentication in 9906s Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: maximum IKE_SA lifetime 10446s Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: generating QUICK_MODE request 3937668591 [ HASH SA No ID ID NAT-OA NAT-OA ] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: sending packet: from 192.168.0.107[4500] to 211.24.100.227[4500] (244 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: received packet: from 211.24.100.227[4500] to 192.168.0.107[4500] (188 bytes) Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: parsed QUICK_MODE response 3937668591 [ HASH SA No ID ID NAT-OA NAT-OA ] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: selected proposal: ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: CHILD_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1{1} established with SPIs c59afd14_i c111538d_o and TS 192.168.0.107/32[udp/l2tp] === 211.24.100.227/32[udp/l2tp] Jul 04 16:41:57 localhost.localdomain NetworkManager[4816]: connection '4dd9b863-c9f3-4c0a-9f41-240078fa51d1' established successfully Jul 04 16:41:58 localhost.localdomain nm-l2tp-service[4763]: xl2tpd started with pid 4822 Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Not looking for kernel SAref support. Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Using l2tp kernel support. Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: xl2tpd version xl2tpd-1.3.15 started on localhost.localdomain PID:4822 Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc. Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Forked by Scott Balmos and David Stipp, (C) 2001 Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Inherited by Jeff McAdams, (C) 2002 Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Forked again by Xelerance (www.xelerance.com) (C) 2006-2016 Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Listening on IP address 0.0.0.0, port 1701 Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Connecting to host 211.24.100.227, port 1701 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.1369] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",0]: VPN plugin: state changed: starting (3) Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Connection established to 211.24.100.227, 1701. Local: 43561, Remote: 32934 (ref=0/0). Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Calling on tunnel 43561 Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: check_control: Received out of order control packet on tunnel 32934 (got 2, expected 1) Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: handle_control: bad control packet! Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Call established with 211.24.100.227, Local: 55046, Remote: 57978, Serial: 1 (ref=0/0) Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: start_pppd: I'm running: Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "/usr/sbin/pppd" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "plugin" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "pppol2tp.so" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "pppol2tp" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "7" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "passive" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "nodetach" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: ":" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "file" Jul 04 16:41:58 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: "/var/run/nm-l2tp-4dd9b863-c9f3-4c0a-9f41-240078fa51d1/ppp-options" Jul 04 16:41:58 localhost.localdomain pppd[4823]: Plugin pppol2tp.so loaded. Jul 04 16:41:58 localhost.localdomain pppd[4823]: Plugin /usr/lib64/pppd/2.4.7/nm-l2tp-pppd-plugin.so loaded. Jul 04 16:41:58 localhost.localdomain pppd[4823]: pppd 2.4.7 started by root, uid 0 Jul 04 16:41:58 localhost.localdomain pppd[4823]: Using interface ppp0 Jul 04 16:41:58 localhost.localdomain pppd[4823]: Connect: ppp0 <--> Jul 04 16:41:58 localhost.localdomain pppd[4823]: Overriding mtu 1500 to 1400 Jul 04 16:41:58 localhost.localdomain pppd[4823]: Overriding mru 1500 to mtu value 1400 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.3004] manager: (ppp0): new Ppp device (/org/freedesktop/NetworkManager/Devices/9) Jul 04 16:41:58 localhost.localdomain pppd[4823]: Overriding mtu 1500 to 1400 Jul 04 16:41:58 localhost.localdomain pppd[4823]: CHAP authentication succeeded Jul 04 16:41:58 localhost.localdomain charon[4789]: 07[KNL] 192.168.50.143 appeared on ppp0 Jul 04 16:41:58 localhost.localdomain charon[4789]: 11[KNL] 192.168.50.143 disappeared from ppp0 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6097] device (ppp0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Jul 04 16:41:58 localhost.localdomain charon[4789]: 13[KNL] 192.168.50.143 appeared on ppp0 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6222] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",0]: VPN connection: (IP4 Config Get) reply received from old-style plugin Jul 04 16:41:58 localhost.localdomain charon[4789]: 09[KNL] interface ppp0 activated Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6249] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: VPN Gateway: 211.24.100.227 Jul 04 16:41:58 localhost.localdomain pppd[4823]: local IP address 192.168.50.143 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6251] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: Tunnel Device: "ppp0" Jul 04 16:41:58 localhost.localdomain pppd[4823]: remote IP address 211.24.100.227 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6251] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: IPv4 configuration: Jul 04 16:41:58 localhost.localdomain pppd[4823]: primary DNS address 8.8.8.8 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6252] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: Internal Address: 192.168.50.143 Jul 04 16:41:58 localhost.localdomain pppd[4823]: secondary DNS address 8.8.8.8 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6252] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: Internal Prefix: 32 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6252] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: Internal Point-to-Point Address: 211.24.100.227 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6253] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: Static Route: 0.0.0.0/0 Next Hop: 0.0.0.0 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6253] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: Static Route: 211.24.100.227/32 Next Hop: 0.0.0.0 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6254] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: Internal DNS: 8.8.8.8 Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6254] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: DNS Domain: '(none)' Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6255] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: Data: No IPv6 configuration Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6258] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: VPN plugin: state changed: started (4) Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6267] device (ppp0): state change: unavailable -> disconnected (reason 'none', sys-iface-state: 'external') Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6675] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: VPN connection: (IP Config Get) complete Jul 04 16:41:58 localhost.localdomain NetworkManager[840]: <info> [1593861118.6873] policy: set 'RMP' (ppp0) as default for IPv4 routing and DNS Jul 04 16:42:21 localhost.localdomain charon[4789]: 07[IKE] sending keep alive to 211.24.100.227[4500] Jul 04 16:42:28 localhost.localdomain charon[4789]: 10[NET] received packet: from 211.24.100.227[4500] to 192.168.0.107[4500] (92 bytes) Jul 04 16:42:28 localhost.localdomain charon[4789]: 10[ENC] parsed INFORMATIONAL_V1 request 2917048156 [ HASH N(DPD) ] Jul 04 16:42:28 localhost.localdomain charon[4789]: 10[ENC] generating INFORMATIONAL_V1 request 397052987 [ HASH N(DPD_ACK) ] Jul 04 16:42:28 localhost.localdomain charon[4789]: 10[NET] sending packet: from 192.168.0.107[4500] to 211.24.100.227[4500] (92 bytes) Jul 04 16:42:48 localhost.localdomain charon[4789]: 13[IKE] sending keep alive to 211.24.100.227[4500] Jul 04 16:42:58 localhost.localdomain charon[4789]: 14[NET] received packet: from 211.24.100.227[4500] to 192.168.0.107[4500] (92 bytes) Jul 04 16:42:58 localhost.localdomain charon[4789]: 14[ENC] parsed INFORMATIONAL_V1 request 1005870752 [ HASH N(DPD) ] Jul 04 16:42:58 localhost.localdomain charon[4789]: 14[ENC] generating INFORMATIONAL_V1 request 3905420437 [ HASH N(DPD_ACK) ] Jul 04 16:42:58 localhost.localdomain charon[4789]: 14[NET] sending packet: from 192.168.0.107[4500] to 211.24.100.227[4500] (92 bytes) Jul 04 16:42:59 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: check_control: Received out of order control packet on tunnel 32934 (got 2, expected 3) Jul 04 16:42:59 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: handle_control: bad control packet! Jul 04 16:43:00 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: check_control: Received out of order control packet on tunnel 32934 (got 2, expected 3) Jul 04 16:43:00 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: handle_control: bad control packet! Jul 04 16:43:01 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: check_control: Received out of order control packet on tunnel 32934 (got 2, expected 3) Jul 04 16:43:01 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: handle_control: bad control packet! Jul 04 16:43:02 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: check_control: Received out of order control packet on tunnel 32934 (got 2, expected 3) Jul 04 16:43:02 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: handle_control: bad control packet! Jul 04 16:43:03 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: control_finish: Connection closed to 211.24.100.227, port 1701 (Timeout), Local: 43561, Remote: 32934 Jul 04 16:43:03 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: Terminating pppd: sending TERM signal to pid 4823 Jul 04 16:43:03 localhost.localdomain pppd[4823]: LCP terminated by peer (User request) Jul 04 16:43:03 localhost.localdomain pppd[4823]: Connect time 1.1 minutes. Jul 04 16:43:03 localhost.localdomain pppd[4823]: Sent 1379218059 bytes, received 0 bytes. Jul 04 16:43:03 localhost.localdomain charon[4789]: 09[KNL] interface ppp0 deactivated Jul 04 16:43:03 localhost.localdomain charon[4789]: 15[KNL] 192.168.50.143 disappeared from ppp0 Jul 04 16:43:03 localhost.localdomain NetworkManager[840]: <info> [1593861183.3911] device (ppp0): state change: disconnected -> unmanaged (reason 'connection-assumed', sys-iface-state: 'external') Jul 04 16:43:03 localhost.localdomain pppd[4823]: Overriding mtu 1500 to 1400 Jul 04 16:43:03 localhost.localdomain pppd[4823]: Overriding mru 1500 to mtu value 1400 Jul 04 16:43:03 localhost.localdomain pppd[4823]: Terminating on signal 15 Jul 04 16:43:03 localhost.localdomain charon[4789]: 07[NET] received packet: from 211.24.100.227[4500] to 192.168.0.107[4500] (76 bytes) Jul 04 16:43:03 localhost.localdomain charon[4789]: 07[ENC] parsed INFORMATIONAL_V1 request 3750943667 [ HASH D ] Jul 04 16:43:03 localhost.localdomain charon[4789]: 07[IKE] received DELETE for ESP CHILD_SA with SPI c111538d Jul 04 16:43:03 localhost.localdomain charon[4789]: 07[IKE] closing CHILD_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1{1} with SPIs c59afd14_i (921 bytes) c111538d_o (1263080330 bytes) and TS 192.168.0.107/32[udp/l2tp] === 211.24.100.227/32[udp/l2tp] Jul 04 16:43:03 localhost.localdomain charon[4789]: 07[IKE] closing CHILD_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1{1} with SPIs c59afd14_i (921 bytes) c111538d_o (1263080330 bytes) and TS 192.168.0.107/32[udp/l2tp] === 211.24.100.227/32[udp/l2tp] Jul 04 16:43:03 localhost.localdomain charon[4789]: 08[NET] received packet: from 211.24.100.227[4500] to 192.168.0.107[4500] (84 bytes) Jul 04 16:43:03 localhost.localdomain charon[4789]: 08[ENC] parsed INFORMATIONAL_V1 request 3500810922 [ HASH D ] Jul 04 16:43:03 localhost.localdomain charon[4789]: 08[IKE] received DELETE for IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] Jul 04 16:43:03 localhost.localdomain charon[4789]: 08[IKE] deleting IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] between 192.168.0.107[192.168.0.107]...211.24.100.227[211.24.100.227] Jul 04 16:43:03 localhost.localdomain charon[4789]: 08[IKE] deleting IKE_SA 4dd9b863-c9f3-4c0a-9f41-240078fa51d1[1] between 192.168.0.107[192.168.0.107]...211.24.100.227[211.24.100.227] Jul 04 16:43:06 localhost.localdomain pppd[4823]: Connection terminated. Jul 04 16:43:06 localhost.localdomain charon[4789]: 10[KNL] interface ppp0 deleted Jul 04 16:43:06 localhost.localdomain NetworkManager[4822]: xl2tpd[4822]: death_handler: Fatal signal 15 received Jul 04 16:43:06 localhost.localdomain NetworkManager[840]: <info> [1593861186.4088] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: VPN plugin: state changed: stopping (5) Jul 04 16:43:06 localhost.localdomain pppd[4823]: Modem hangup Jul 04 16:43:06 localhost.localdomain pppd[4823]: Exit. Jul 04 16:43:06 localhost.localdomain NetworkManager[4906]: Stopping strongSwan IPsec... Jul 04 16:43:06 localhost.localdomain charon[4789]: 00[DMN] signal of type SIGINT received. Shutting down Jul 04 16:43:06 localhost.localdomain ipsec_starter[4788]: child 4789 (charon) has quit (exit code 0) Jul 04 16:43:06 localhost.localdomain ipsec_starter[4788]: Jul 04 16:43:06 localhost.localdomain ipsec_starter[4788]: charon stopped after 200 ms Jul 04 16:43:06 localhost.localdomain ipsec_starter[4788]: ipsec starter stopped Jul 04 16:43:06 localhost.localdomain nm-l2tp-service[4763]: ipsec shut down Jul 04 16:43:06 localhost.localdomain NetworkManager[840]: <info> [1593861186.5436] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",8:(ppp0)]: VPN plugin: state changed: stopped (6) Jul 04 16:43:06 localhost.localdomain NetworkManager[840]: <info> [1593861186.5564] policy: set 'TP-Link_8D1B' (wlp3s0) as default for IPv4 routing and DNS Jul 04 16:43:06 localhost.localdomain NetworkManager[840]: <info> [1593861186.6242] vpn-connection[0x55a4abb68590,4dd9b863-c9f3-4c0a-9f41-240078fa51d1,"RMP",0]: VPN service disappeared

This is a company vpn, so I do not have access to server logs. Any help to fix this is highly appreciated.