Thanks for the bug report and the details. It looks like the problem describe was not really a bug in the software but more a configuration issue?
** Package changed: network-manager (Ubuntu) => network-manager-l2tp (Ubuntu) ** Changed in: network-manager-l2tp (Ubuntu) Importance: Undecided => Low ** Changed in: network-manager-l2tp (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to network-manager in Ubuntu. https://bugs.launchpad.net/bugs/2078529 Title: L2TP/IPSec VPN stopped working after upgrade to Ubuntu 24.04 Status in network-manager-l2tp package in Ubuntu: Incomplete Bug description: After upgrading from Ubuntu 22.04 to Ubuntu 24.04, when I try to connect to the L2TP/IPSec VPN configured earlier in Ubuntu 22.04 and which worked, I get an error in the syslog: "pppd: peer does not want to authenticate us with eap". The remote L2TP/IPSec server (1.1.1.1) is on MikroTik, the configuration has not changed. I was able to connect to Ubuntu 22.04 and I can still connect from Windows. Packages used: - network-manager (1.46.0-1ubuntu2) - network-manager-l2tp (1.20.16-1~ubuntu24.04.1~ppa1.1) - network-manager-l2tp-gnome (1.20.16-1~ubuntu24.04.1~ppa1.1) - network-manager-strongswan (1.6.0-3build2) I already tried without success: - sudo apt purge network-manager-l2tp network-manager-l2tp-gnome & sudo apt install network-manager-l2tp network-manager-l2tp-gnome - sudo apt install xl2tpd & sudo apt purge xl2tpd /var/log/syslog: 2024-08-31T00:26:10.487531+02:00 Notebook systemd[1]: Reloading finished in 560 ms. 2024-08-31T00:26:10.577209+02:00 Notebook NetworkManager[1603]: <info> [1725056770.5767] audit: op="connection-update" uuid="371969d2-3408-423e-910c-082a3975366d" name="Office" pid=4075 uid=1000 result="success" 2024-08-31T00:26:11.056009+02:00 Notebook NetworkManager[1603]: <info> [1725056771.0557] vpn[0x5a331d72aae0,371969d2-3408-423e-910c-082a3975366d,"Office"]: starting l2tp 2024-08-31T00:26:11.056857+02:00 Notebook NetworkManager[1603]: <info> [1725056771.0567] audit: op="connection-activate" uuid="371969d2-3408-423e-910c-082a3975366d" name="Office" pid=4075 uid=1000 result="success" 2024-08-31T00:26:11.084359+02:00 Notebook nm-l2tp-service[5149]: Check port 1701 2024-08-31T00:26:11.098416+02:00 Notebook NetworkManager[5167]: Stopping strongSwan IPsec... 2024-08-31T00:26:11.099219+02:00 Notebook charon: 00[DMN] SIGINT received, shutting down 2024-08-31T00:26:11.100976+02:00 Notebook ipsec[1982]: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.13, Linux 6.8.0-41-generic, x86_64) 2024-08-31T00:26:11.101036+02:00 Notebook ipsec[1982]: 00[LIB] providers loaded by OpenSSL: legacy default 2024-08-31T00:26:11.101064+02:00 Notebook ipsec[1982]: 00[CFG] using '/sbin/resolvconf' to install DNS servers 2024-08-31T00:26:11.101089+02:00 Notebook ipsec[1982]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' 2024-08-31T00:26:11.101114+02:00 Notebook ipsec[1982]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' 2024-08-31T00:26:11.101145+02:00 Notebook ipsec[1982]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' 2024-08-31T00:26:11.101171+02:00 Notebook ipsec[1982]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' 2024-08-31T00:26:11.101195+02:00 Notebook ipsec[1982]: 00[CFG] loading crls from '/etc/ipsec.d/crls' 2024-08-31T00:26:11.101220+02:00 Notebook ipsec[1982]: 00[CFG] loading secrets from '/etc/ipsec.secrets' 2024-08-31T00:26:11.101246+02:00 Notebook ipsec[1982]: 00[LIB] loaded plugins: charon aesni aes rc2 sha2 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp agent xcbc hmac kdf gcm drbg attr kernel-netlink resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic counters 2024-08-31T00:26:11.101267+02:00 Notebook ipsec[1982]: 00[LIB] dropped capabilities, running as uid 0, gid 0 2024-08-31T00:26:11.101306+02:00 Notebook ipsec[1982]: 00[JOB] spawning 16 worker threads 2024-08-31T00:26:11.101334+02:00 Notebook ipsec[1982]: 09[KNL] 192.168.122.1 appeared on virbr0 2024-08-31T00:26:11.101361+02:00 Notebook ipsec[1982]: 13[KNL] interface virbr0 activated 2024-08-31T00:26:11.101390+02:00 Notebook ipsec[1982]: 06[KNL] 10.10.10.101 appeared on wlp3s0 2024-08-31T00:26:11.101414+02:00 Notebook ipsec[1982]: 00[DMN] SIGINT received, shutting down 2024-08-31T00:26:11.102121+02:00 Notebook ipsec[1935]: charon stopped after 200 ms 2024-08-31T00:26:11.102174+02:00 Notebook ipsec[1935]: ipsec starter stopped 2024-08-31T00:26:11.103688+02:00 Notebook systemd[1]: strongswan-starter.service: Deactivated successfully. 2024-08-31T00:26:13.222597+02:00 Notebook NetworkManager[5164]: Starting strongSwan 5.9.13 IPsec [starter]... 2024-08-31T00:26:13.222804+02:00 Notebook NetworkManager[5164]: Loading config setup 2024-08-31T00:26:13.222896+02:00 Notebook NetworkManager[5164]: Loading conn '371969d2-3408-423e-910c-082a3975366d' 2024-08-31T00:26:13.231098+02:00 Notebook charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.13, Linux 6.8.0-41-generic, x86_64) 2024-08-31T00:26:13.235066+02:00 Notebook charon: 00[LIB] providers loaded by OpenSSL: legacy default 2024-08-31T00:26:13.236761+02:00 Notebook charon: 00[CFG] using '/sbin/resolvconf' to install DNS servers 2024-08-31T00:26:13.258630+02:00 Notebook charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' 2024-08-31T00:26:13.258761+02:00 Notebook charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' 2024-08-31T00:26:13.258837+02:00 Notebook charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' 2024-08-31T00:26:13.258925+02:00 Notebook charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' 2024-08-31T00:26:13.259000+02:00 Notebook charon: 00[CFG] loading crls from '/etc/ipsec.d/crls' 2024-08-31T00:26:13.259074+02:00 Notebook charon: 00[CFG] loading secrets from '/etc/ipsec.secrets' 2024-08-31T00:26:13.259131+02:00 Notebook charon: 00[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets' 2024-08-31T00:26:13.259210+02:00 Notebook charon: 00[CFG] loaded IKE secret for %any 2024-08-31T00:26:13.259296+02:00 Notebook charon: 00[LIB] loaded plugins: charon aesni aes rc2 sha2 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp agent xcbc hmac kdf gcm drbg attr kernel-netlink resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic counters 2024-08-31T00:26:13.259380+02:00 Notebook charon: 00[LIB] dropped capabilities, running as uid 0, gid 0 2024-08-31T00:26:13.259454+02:00 Notebook charon: 00[JOB] spawning 16 worker threads 2024-08-31T00:26:13.267154+02:00 Notebook charon: 09[CFG] received stroke: add connection '371969d2-3408-423e-910c-082a3975366d' 2024-08-31T00:26:13.267227+02:00 Notebook charon: 09[CFG] added configuration '371969d2-3408-423e-910c-082a3975366d' 2024-08-31T00:26:14.241418+02:00 Notebook charon: 11[CFG] rereading secrets 2024-08-31T00:26:14.241511+02:00 Notebook charon: 11[CFG] loading secrets from '/etc/ipsec.secrets' 2024-08-31T00:26:14.241552+02:00 Notebook charon: 11[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets' 2024-08-31T00:26:14.241593+02:00 Notebook charon: 11[CFG] loaded IKE secret for %any 2024-08-31T00:26:14.251586+02:00 Notebook charon: 13[CFG] received stroke: initiate '371969d2-3408-423e-910c-082a3975366d' 2024-08-31T00:26:14.254125+02:00 Notebook charon: 15[IKE] initiating Main Mode IKE_SA 371969d2-3408-423e-910c-082a3975366d[1] to 1.1.1.1 2024-08-31T00:26:14.254295+02:00 Notebook charon: 15[ENC] generating ID_PROT request 0 [ SA V V V V V ] 2024-08-31T00:26:14.254379+02:00 Notebook charon: 15[NET] sending packet: from 10.10.10.101[500] to 1.1.1.1[500] (532 bytes) 2024-08-31T00:26:14.340691+02:00 Notebook charon: 16[NET] received packet: from 1.1.1.1[500] to 10.10.10.101[500] (156 bytes) 2024-08-31T00:26:14.340799+02:00 Notebook charon: 16[ENC] parsed ID_PROT response 0 [ SA V V V V ] 2024-08-31T00:26:14.340838+02:00 Notebook charon: 16[IKE] received NAT-T (RFC 3947) vendor ID 2024-08-31T00:26:14.340877+02:00 Notebook charon: 16[IKE] received XAuth vendor ID 2024-08-31T00:26:14.340914+02:00 Notebook charon: 16[IKE] received DPD vendor ID 2024-08-31T00:26:14.340950+02:00 Notebook charon: 16[IKE] received FRAGMENTATION vendor ID 2024-08-31T00:26:14.340995+02:00 Notebook charon: 16[CFG] selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048 2024-08-31T00:26:14.343718+02:00 Notebook charon: 16[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ] 2024-08-31T00:26:14.343935+02:00 Notebook charon: 16[NET] sending packet: from 10.10.10.101[500] to 1.1.1.1[500] (372 bytes) 2024-08-31T00:26:14.904597+02:00 Notebook charon: 04[NET] received packet: from 1.1.1.1[500] to 10.10.10.101[500] (364 bytes) 2024-08-31T00:26:14.904710+02:00 Notebook charon: 04[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ] 2024-08-31T00:26:14.918587+02:00 Notebook charon: 04[IKE] local host is behind NAT, sending keep alives 2024-08-31T00:26:14.918988+02:00 Notebook charon: 04[ENC] generating ID_PROT request 0 [ ID HASH ] 2024-08-31T00:26:14.919159+02:00 Notebook charon: 04[NET] sending packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (68 bytes) 2024-08-31T00:26:15.495864+02:00 Notebook charon: 06[NET] received packet: from 1.1.1.1[4500] to 10.10.10.101[4500] (68 bytes) 2024-08-31T00:26:15.496236+02:00 Notebook charon: 06[ENC] parsed ID_PROT response 0 [ ID HASH ] 2024-08-31T00:26:15.496298+02:00 Notebook charon: 06[IKE] IKE_SA 371969d2-3408-423e-910c-082a3975366d[1] established between 10.10.10.101[10.10.10.101]...1.1.1.1[1.1.1.1] 2024-08-31T00:26:15.496421+02:00 Notebook charon: 06[IKE] scheduling reauthentication in 9955s 2024-08-31T00:26:15.496465+02:00 Notebook charon: 06[IKE] maximum IKE_SA lifetime 10495s 2024-08-31T00:26:15.496541+02:00 Notebook charon: 06[ENC] generating QUICK_MODE request 3869703877 [ HASH SA No ID ID NAT-OA NAT-OA ] 2024-08-31T00:26:15.496587+02:00 Notebook charon: 06[NET] sending packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (244 bytes) 2024-08-31T00:26:15.580457+02:00 Notebook charon: 07[NET] received packet: from 1.1.1.1[4500] to 10.10.10.101[4500] (188 bytes) 2024-08-31T00:26:15.580581+02:00 Notebook charon: 07[ENC] parsed QUICK_MODE response 3869703877 [ HASH SA No ID ID NAT-OA NAT-OA ] 2024-08-31T00:26:15.580626+02:00 Notebook charon: 07[CFG] selected proposal: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ 2024-08-31T00:26:15.636900+02:00 Notebook charon: 07[IKE] CHILD_SA 371969d2-3408-423e-910c-082a3975366d{1} established with SPIs cb2fe3a3_i 0613d457_o and TS 10.10.10.101/32[udp/l2f] === 1.1.1.1/32[udp/l2f] 2024-08-31T00:26:15.637215+02:00 Notebook charon: 07[ENC] generating QUICK_MODE request 3869703877 [ HASH ] 2024-08-31T00:26:15.637625+02:00 Notebook NetworkManager[5220]: initiating Main Mode IKE_SA 371969d2-3408-423e-910c-082a3975366d[1] to 1.1.1.1 2024-08-31T00:26:15.637666+02:00 Notebook NetworkManager[5220]: generating ID_PROT request 0 [ SA V V V V V ] 2024-08-31T00:26:15.637686+02:00 Notebook NetworkManager[5220]: sending packet: from 10.10.10.101[500] to 1.1.1.1[500] (532 bytes) 2024-08-31T00:26:15.637709+02:00 Notebook NetworkManager[5220]: received packet: from 1.1.1.1[500] to 10.10.10.101[500] (156 bytes) 2024-08-31T00:26:15.637728+02:00 Notebook NetworkManager[5220]: parsed ID_PROT response 0 [ SA V V V V ] 2024-08-31T00:26:15.637746+02:00 Notebook NetworkManager[5220]: received NAT-T (RFC 3947) vendor ID 2024-08-31T00:26:15.637765+02:00 Notebook NetworkManager[5220]: received XAuth vendor ID 2024-08-31T00:26:15.637787+02:00 Notebook NetworkManager[5220]: received DPD vendor ID 2024-08-31T00:26:15.637809+02:00 Notebook NetworkManager[5220]: received FRAGMENTATION vendor ID 2024-08-31T00:26:15.637828+02:00 Notebook NetworkManager[5220]: selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048 2024-08-31T00:26:15.637847+02:00 Notebook NetworkManager[5220]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ] 2024-08-31T00:26:15.637866+02:00 Notebook NetworkManager[5220]: sending packet: from 10.10.10.101[500] to 1.1.1.1[500] (372 bytes) 2024-08-31T00:26:15.637890+02:00 Notebook NetworkManager[5220]: received packet: from 1.1.1.1[500] to 10.10.10.101[500] (364 bytes) 2024-08-31T00:26:15.637910+02:00 Notebook NetworkManager[5220]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ] 2024-08-31T00:26:15.637932+02:00 Notebook NetworkManager[5220]: local host is behind NAT, sending keep alives 2024-08-31T00:26:15.637954+02:00 Notebook NetworkManager[5220]: generating ID_PROT request 0 [ ID HASH ] 2024-08-31T00:26:15.637976+02:00 Notebook NetworkManager[5220]: sending packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (68 bytes) 2024-08-31T00:26:15.637995+02:00 Notebook NetworkManager[5220]: received packet: from 1.1.1.1[4500] to 10.10.10.101[4500] (68 bytes) 2024-08-31T00:26:15.638014+02:00 Notebook NetworkManager[5220]: parsed ID_PROT response 0 [ ID HASH ] 2024-08-31T00:26:15.638036+02:00 Notebook NetworkManager[5220]: IKE_SA 371969d2-3408-423e-910c-082a3975366d[1] established between 10.10.10.101[10.10.10.101]...1.1.1.1[1.1.1.1] 2024-08-31T00:26:15.638058+02:00 Notebook NetworkManager[5220]: scheduling reauthentication in 9955s 2024-08-31T00:26:15.638077+02:00 Notebook NetworkManager[5220]: maximum IKE_SA lifetime 10495s 2024-08-31T00:26:15.638099+02:00 Notebook NetworkManager[5220]: generating QUICK_MODE request 3869703877 [ HASH SA No ID ID NAT-OA NAT-OA ] 2024-08-31T00:26:15.638121+02:00 Notebook NetworkManager[5220]: sending packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (244 bytes) 2024-08-31T00:26:15.638140+02:00 Notebook NetworkManager[5220]: received packet: from 1.1.1.1[4500] to 10.10.10.101[4500] (188 bytes) 2024-08-31T00:26:15.638166+02:00 Notebook NetworkManager[5220]: parsed QUICK_MODE response 3869703877 [ HASH SA No ID ID NAT-OA NAT-OA ] 2024-08-31T00:26:15.638188+02:00 Notebook NetworkManager[5220]: selected proposal: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ 2024-08-31T00:26:15.638211+02:00 Notebook NetworkManager[5220]: CHILD_SA 371969d2-3408-423e-910c-082a3975366d{1} established with SPIs cb2fe3a3_i 0613d457_o and TS 10.10.10.101/32[udp/l2f] === 1.1.1.1/32[udp/l2f] 2024-08-31T00:26:15.638235+02:00 Notebook NetworkManager[5220]: connection '371969d2-3408-423e-910c-082a3975366d' established successfully 2024-08-31T00:26:15.638267+02:00 Notebook charon: 07[NET] sending packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (60 bytes) 2024-08-31T00:26:15.760056+02:00 Notebook nm-l2tp-service[5149]: strongSwan IPsec connection is up. 2024-08-31T00:26:15.761373+02:00 Notebook nm-l2tp-service[5149]: kl2tpd started with pid 5248 2024-08-31T00:26:15.790306+02:00 Notebook kernel: l2tp_core: L2TP core driver, V2.0 2024-08-31T00:26:15.792294+02:00 Notebook kernel: l2tp_netlink: L2TP netlink interface 2024-08-31T00:26:15.792919+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 session_name=s1 message="new dynamic session" session_id=9814 peer_session_id=0 pseudowire=7 2024-08-31T00:26:15.793002+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 message="new dynamic tunnel" version=2 encap=UDP local=0.0.0.0:1701 peer=1.1.1.1:1701 tunnel_id=16587 peer_tunnel_id=0 2024-08-31T00:26:15.793041+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 message="fsm event" event=open 2024-08-31T00:26:15.793074+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq 2024-08-31T00:26:15.793108+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq ns=0 nr=0 isRetransmit=false 2024-08-31T00:26:15.850771+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="socket recv" length=98 2024-08-31T00:26:15.850981+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=recv message_type=avpMsgTypeSccrp 2024-08-31T00:26:15.851111+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="send complete" message_type=avpMsgTypeSccrq error=null 2024-08-31T00:26:15.851212+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 message="fsm event" event=sccrp 2024-08-31T00:26:15.851339+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeScccn 2024-08-31T00:26:15.851445+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeScccn ns=1 nr=1 isRetransmit=false 2024-08-31T00:26:15.906519+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="socket recv" length=12 2024-08-31T00:26:15.906716+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="send complete" message_type=avpMsgTypeScccn error=null 2024-08-31T00:26:15.906833+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 message="control plane established" 2024-08-31T00:26:15.906933+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 message="data plane established" 2024-08-31T00:26:15.907022+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 message="fsm event" event=newsession 2024-08-31T00:26:15.907069+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 session_name=s1 message="fsm event" event=tunnelopen 2024-08-31T00:26:15.907172+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeIcrq 2024-08-31T00:26:15.907226+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeIcrq ns=2 nr=1 isRetransmit=false 2024-08-31T00:26:15.962621+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="socket recv" length=28 2024-08-31T00:26:15.962917+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=recv message_type=avpMsgTypeIcrp 2024-08-31T00:26:15.963015+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="send complete" message_type=avpMsgTypeIcrq error=null 2024-08-31T00:26:15.963110+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 message="fsm event" event=sessionmsg 2024-08-31T00:26:15.963197+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 session_name=s1 message="fsm event" event=icrp 2024-08-31T00:26:15.963396+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeIccn 2024-08-31T00:26:15.963507+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeIccn ns=3 nr=2 isRetransmit=false 2024-08-31T00:26:16.022761+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="socket recv" length=12 2024-08-31T00:26:16.022888+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="send complete" message_type=avpMsgTypeIccn error=null 2024-08-31T00:26:16.023003+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 session_name=s1 message="control plane established" 2024-08-31T00:26:16.030327+02:00 Notebook kernel: NET: Registered PF_PPPOX protocol family 2024-08-31T00:26:16.033306+02:00 Notebook kernel: l2tp_ppp: PPPoL2TP kernel driver, V2.0 2024-08-31T00:26:16.033993+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 session_name=s1 message="data plane established" 2024-08-31T00:26:16.034117+02:00 Notebook NetworkManager[5248]: level=info message="session up" tunnel_name=t1 session_name=s1 tunnel_id=16587 session_id=9814 peer_tunnel_id=376 peer_session_id=1 2024-08-31T00:26:16.043279+02:00 Notebook pppd[5258]: Plugin pppol2tp.so loaded. 2024-08-31T00:26:16.045340+02:00 Notebook pppd[5258]: Plugin /usr/lib/pppd/2.4.9/nm-l2tp-pppd-plugin.so loaded. 2024-08-31T00:26:16.048163+02:00 Notebook pppd[5258]: pppd 2.4.9 started by root, uid 0 2024-08-31T00:26:16.048513+02:00 Notebook pppd[5258]: Using interface ppp0 2024-08-31T00:26:16.048593+02:00 Notebook pppd[5258]: Connect: ppp0 <--> 2024-08-31T00:26:16.048662+02:00 Notebook pppd[5258]: Overriding mtu 1500 to 1400 2024-08-31T00:26:16.048788+02:00 Notebook pppd[5258]: Overriding mru 1500 to mtu value 1400 2024-08-31T00:26:16.049827+02:00 Notebook NetworkManager[1603]: <info> [1725056776.0494] manager: (ppp0): new Ppp device (/org/freedesktop/NetworkManager/Devices/9) 2024-08-31T00:26:16.174573+02:00 Notebook pppd[5258]: Overriding mtu 1460 to 1400 2024-08-31T00:26:16.174667+02:00 Notebook pppd[5258]: peer doesn't want to authenticate us with eap 2024-08-31T00:26:16.174725+02:00 Notebook pppd[5258]: Overriding mtu 1500 to 1400 2024-08-31T00:26:16.174758+02:00 Notebook pppd[5258]: Overriding mru 1500 to mtu value 1400 2024-08-31T00:26:16.226609+02:00 Notebook pppd[5258]: Connection terminated. 2024-08-31T00:26:16.227094+02:00 Notebook charon: 15[KNL] interface ppp0 deleted 2024-08-31T00:26:16.228048+02:00 Notebook NetworkManager[5248]: level=info message="received signal, shutting down" 2024-08-31T00:26:16.228165+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 message="fsm event" event=close 2024-08-31T00:26:16.228241+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeStopccn 2024-08-31T00:26:16.228354+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeStopccn ns=4 nr=2 isRetransmit=false 2024-08-31T00:26:16.228764+02:00 Notebook NetworkManager[1603]: <warn> [1725056776.2286] vpn[0x5a331d72aae0,371969d2-3408-423e-910c-082a3975366d,"Office"]: dbus: failure: connect-failed (1) 2024-08-31T00:26:16.230630+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="socket recv" length=36 2024-08-31T00:26:16.230730+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=recv message_type=avpMsgTypeCdn 2024-08-31T00:26:16.232901+02:00 Notebook NetworkManager[5266]: Stopping strongSwan IPsec... 2024-08-31T00:26:16.233702+02:00 Notebook pppd[5258]: Exit. 2024-08-31T00:26:16.234318+02:00 Notebook charon: 00[DMN] SIGINT received, shutting down 2024-08-31T00:26:16.234796+02:00 Notebook charon: 00[IKE] closing CHILD_SA 371969d2-3408-423e-910c-082a3975366d{1} with SPIs cb2fe3a3_i (390 bytes) 0613d457_o (383 bytes) and TS 10.10.10.101/32[udp/l2f] === 1.1.1.1/32[udp/l2f] 2024-08-31T00:26:16.234970+02:00 Notebook NetworkManager[5248]: level=error message="pppd exited with an error code" error="exit status 11" error_message="the peer system failed or refused to authenticate itself" 2024-08-31T00:26:16.235025+02:00 Notebook NetworkManager[5248]: level=info message="pseudowire terminated" 2024-08-31T00:26:16.235086+02:00 Notebook charon: 00[IKE] sending DELETE for ESP CHILD_SA with SPI cb2fe3a3 2024-08-31T00:26:16.235153+02:00 Notebook charon: 00[ENC] generating INFORMATIONAL_V1 request 806525166 [ HASH D ] 2024-08-31T00:26:16.235220+02:00 Notebook charon: 00[NET] sending packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (76 bytes) 2024-08-31T00:26:16.235285+02:00 Notebook charon: 00[IKE] deleting IKE_SA 371969d2-3408-423e-910c-082a3975366d[1] between 10.10.10.101[10.10.10.101]...1.1.1.1[1.1.1.1] 2024-08-31T00:26:16.235429+02:00 Notebook charon: 00[IKE] sending DELETE for IKE_SA 371969d2-3408-423e-910c-082a3975366d[1] 2024-08-31T00:26:16.235501+02:00 Notebook charon: 00[ENC] generating INFORMATIONAL_V1 request 3623491453 [ HASH D ] 2024-08-31T00:26:16.235549+02:00 Notebook charon: 00[NET] sending packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (84 bytes) 2024-08-31T00:26:16.331612+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeAck ns=5 nr=3 isRetransmit=false 2024-08-31T00:26:16.338006+02:00 Notebook nm-l2tp-service[5149]: ipsec shut down 2024-08-31T00:26:17.230175+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeStopccn 2024-08-31T00:26:17.230263+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeStopccn ns=4 nr=3 isRetransmit=true 2024-08-31T00:26:19.231831+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeStopccn 2024-08-31T00:26:19.231884+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message=send message_type=avpMsgTypeStopccn ns=4 nr=3 isRetransmit=true 2024-08-31T00:26:19.761887+02:00 Notebook systemd[2748]: Started app-gnome-org.gnome.Terminal-5273.scope - Application launched by gnome-shell. 2024-08-31T00:26:20.168219+02:00 Notebook dbus-daemon[2788]: [session uid=1000 pid=2788] Activating via systemd: service name='org.gnome.Terminal' unit='gnome-terminal-server.service' requested by ':1.133' (uid=1000 pid=5280 comm="/usr/bin/gnome-terminal.real" label="unconfined") 2024-08-31T00:26:20.169669+02:00 Notebook systemd[2748]: Created slice app-org.gnome.Terminal.slice - Slice /app/org.gnome.Terminal. 2024-08-31T00:26:20.186842+02:00 Notebook systemd[2748]: Starting gnome-terminal-server.service - GNOME Terminal Server... 2024-08-31T00:26:20.499151+02:00 Notebook dbus-daemon[2788]: [session uid=1000 pid=2788] Successfully activated service 'org.gnome.Terminal' 2024-08-31T00:26:20.499588+02:00 Notebook systemd[2748]: Started gnome-terminal-server.service - GNOME Terminal Server. 2024-08-31T00:26:20.611636+02:00 Notebook gnome-shell[3040]: meta_window_set_stack_position_no_sync: assertion 'window->stack_position >= 0' failed 2024-08-31T00:26:20.624632+02:00 Notebook systemd[2748]: Started vte-spawn-11099c72-370b-4b43-a8c5-ebfde316934e.scope - VTE child process 5300 launched by gnome-terminal-server process 5292. 2024-08-31T00:26:23.236075+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 function=transport message=retransmit message_type=avpMsgTypeStopccn 2024-08-31T00:26:23.236459+02:00 Notebook NetworkManager[5248]: level=debug tunnel_name=t1 function=transport message="send complete" message_type=avpMsgTypeStopccn error="transmit of avpMsgTypeStopccn failed after 3 retry attempts" 2024-08-31T00:26:23.236659+02:00 Notebook NetworkManager[5248]: level=error tunnel_name=t1 function=transport message="socket read failed" error="use of closed file" 2024-08-31T00:26:23.236760+02:00 Notebook NetworkManager[5248]: level=error tunnel_name=t1 function=transport message="transport down" error="transmit of avpMsgTypeStopccn failed after 3 retry attempts" 2024-08-31T00:26:23.236858+02:00 Notebook NetworkManager[5248]: level=error tunnel_name=t1 session_name=s1 message="dataplane down failed" error="netlink receive: no such device" 2024-08-31T00:26:23.236946+02:00 Notebook NetworkManager[5248]: level=info message="session down" result= tunnel_name=t1 session_name=s1 tunnel_id=16587 session_id=9814 peer_tunnel_id=376 peer_session_id=1 2024-08-31T00:26:23.236990+02:00 Notebook NetworkManager[5248]: level=info message="killing pseudowire" 2024-08-31T00:26:23.237099+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 session_name=s1 message=close 2024-08-31T00:26:23.237195+02:00 Notebook NetworkManager[5248]: level=info tunnel_name=t1 message=close 2024-08-31T00:26:23.237341+02:00 Notebook NetworkManager[5248]: level=info message="graceful shutdown complete" 2024-08-31T00:26:34.937013+02:00 Notebook dbus-daemon[2788]: [session uid=1000 pid=2788] Activating service name='org.gnome.DejaDup' requested by ':1.132' (uid=1000 pid=4379 comm="/usr/libexec/deja-dup/deja-dup-monitor" label="unconfined") 2024-08-31T00:26:34.973033+02:00 Notebook dbus-daemon[2788]: [session uid=1000 pid=2788] Successfully activated service 'org.gnome.DejaDup' 2024-08-31T00:27:11.628292+02:00 Notebook systemd[1]: Starting update-notifier-download.service - Download data for packages that failed at package install time... 2024-08-31T00:27:11.757128+02:00 Notebook systemd[1]: update-notifier-download.service: Deactivated successfully. 2024-08-31T00:27:11.757983+02:00 Notebook systemd[1]: Finished update-notifier-download.service - Download data for packages that failed at package install time. 2024-08-31T00:27:13.734816+02:00 Notebook dbus-daemon[1485]: [system] Activating via systemd: service name='org.freedesktop.timedate1' unit='dbus-org.freedesktop.timedate1.service' requested by ':1.19' (uid=0 pid=1537 comm="/usr/lib/snapd/snapd" label="unconfined") 2024-08-31T00:27:13.763193+02:00 Notebook systemd[1]: Starting systemd-timedated.service - Time & Date Service... 2024-08-31T00:27:13.850381+02:00 Notebook dbus-daemon[1485]: [system] Successfully activated service 'org.freedesktop.timedate1' 2024-08-31T00:27:13.850630+02:00 Notebook systemd[1]: Started systemd-timedated.service - Time & Date Service. 2024-08-31T00:27:15.318814+02:00 Notebook NetworkManager[1603]: <info> [1725056835.3184] dhcp4 (wlp3s0): state changed new lease, address=10.10.10.101 2024-08-31T00:27:15.320055+02:00 Notebook dbus-daemon[1485]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.10' (uid=0 pid=1603 comm="/usr/sbin/NetworkManager --no-daemon" label="unconfined") 2024-08-31T00:27:15.346361+02:00 Notebook systemd[1]: Starting NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service... 2024-08-31T00:27:15.355059+02:00 Notebook dbus-daemon[1485]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' 2024-08-31T00:27:15.355292+02:00 Notebook systemd[1]: Started NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service. 2024-08-31T00:27:25.369904+02:00 Notebook systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager-l2tp/+bug/2078529/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp