Thanks for the bug report and the details. It looks like the problem
describe was not really a bug in the software but more a configuration
issue?

** Package changed: network-manager (Ubuntu) => network-manager-l2tp
(Ubuntu)

** Changed in: network-manager-l2tp (Ubuntu)
   Importance: Undecided => Low

** Changed in: network-manager-l2tp (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/2078529

Title:
  L2TP/IPSec VPN stopped working after upgrade to Ubuntu 24.04

Status in network-manager-l2tp package in Ubuntu:
  Incomplete

Bug description:
  After upgrading from Ubuntu 22.04 to Ubuntu 24.04, when I try to
  connect to the L2TP/IPSec VPN configured earlier in Ubuntu 22.04 and
  which worked, I get an error in the syslog: "pppd: peer does not want
  to authenticate us with eap".

  The remote L2TP/IPSec server (1.1.1.1) is on MikroTik, the
  configuration has not changed. I was able to connect to Ubuntu 22.04
  and I can still connect from Windows.

  Packages used:
  - network-manager (1.46.0-1ubuntu2)
  - network-manager-l2tp (1.20.16-1~ubuntu24.04.1~ppa1.1)
  - network-manager-l2tp-gnome (1.20.16-1~ubuntu24.04.1~ppa1.1)
  - network-manager-strongswan (1.6.0-3build2)

  I already tried without success:
  - sudo apt purge network-manager-l2tp network-manager-l2tp-gnome & sudo apt 
install network-manager-l2tp network-manager-l2tp-gnome
  - sudo apt install xl2tpd & sudo apt purge xl2tpd

  /var/log/syslog:
  2024-08-31T00:26:10.487531+02:00 Notebook systemd[1]: Reloading finished in 
560 ms.
  2024-08-31T00:26:10.577209+02:00 Notebook NetworkManager[1603]: <info>  
[1725056770.5767] audit: op="connection-update" 
uuid="371969d2-3408-423e-910c-082a3975366d" name="Office" pid=4075 uid=1000 
result="success"
  2024-08-31T00:26:11.056009+02:00 Notebook NetworkManager[1603]: <info>  
[1725056771.0557] 
vpn[0x5a331d72aae0,371969d2-3408-423e-910c-082a3975366d,"Office"]: starting l2tp
  2024-08-31T00:26:11.056857+02:00 Notebook NetworkManager[1603]: <info>  
[1725056771.0567] audit: op="connection-activate" 
uuid="371969d2-3408-423e-910c-082a3975366d" name="Office" pid=4075 uid=1000 
result="success"
  2024-08-31T00:26:11.084359+02:00 Notebook nm-l2tp-service[5149]: Check port 
1701
  2024-08-31T00:26:11.098416+02:00 Notebook NetworkManager[5167]: Stopping 
strongSwan IPsec...
  2024-08-31T00:26:11.099219+02:00 Notebook charon: 00[DMN] SIGINT received, 
shutting down
  2024-08-31T00:26:11.100976+02:00 Notebook ipsec[1982]: 00[DMN] Starting IKE 
charon daemon (strongSwan 5.9.13, Linux 6.8.0-41-generic, x86_64)
  2024-08-31T00:26:11.101036+02:00 Notebook ipsec[1982]: 00[LIB] providers 
loaded by OpenSSL: legacy default
  2024-08-31T00:26:11.101064+02:00 Notebook ipsec[1982]: 00[CFG] using 
'/sbin/resolvconf' to install DNS servers
  2024-08-31T00:26:11.101089+02:00 Notebook ipsec[1982]: 00[CFG] loading ca 
certificates from '/etc/ipsec.d/cacerts'
  2024-08-31T00:26:11.101114+02:00 Notebook ipsec[1982]: 00[CFG] loading aa 
certificates from '/etc/ipsec.d/aacerts'
  2024-08-31T00:26:11.101145+02:00 Notebook ipsec[1982]: 00[CFG] loading ocsp 
signer certificates from '/etc/ipsec.d/ocspcerts'
  2024-08-31T00:26:11.101171+02:00 Notebook ipsec[1982]: 00[CFG] loading 
attribute certificates from '/etc/ipsec.d/acerts'
  2024-08-31T00:26:11.101195+02:00 Notebook ipsec[1982]: 00[CFG] loading crls 
from '/etc/ipsec.d/crls'
  2024-08-31T00:26:11.101220+02:00 Notebook ipsec[1982]: 00[CFG] loading 
secrets from '/etc/ipsec.secrets'
  2024-08-31T00:26:11.101246+02:00 Notebook ipsec[1982]: 00[LIB] loaded 
plugins: charon aesni aes rc2 sha2 sha1 md5 mgf1 random nonce x509 revocation 
constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 
fips-prf gmp agent xcbc hmac kdf gcm drbg attr kernel-netlink resolve 
socket-default connmark stroke updown eap-mschapv2 xauth-generic counters
  2024-08-31T00:26:11.101267+02:00 Notebook ipsec[1982]: 00[LIB] dropped 
capabilities, running as uid 0, gid 0
  2024-08-31T00:26:11.101306+02:00 Notebook ipsec[1982]: 00[JOB] spawning 16 
worker threads
  2024-08-31T00:26:11.101334+02:00 Notebook ipsec[1982]: 09[KNL] 192.168.122.1 
appeared on virbr0
  2024-08-31T00:26:11.101361+02:00 Notebook ipsec[1982]: 13[KNL] interface 
virbr0 activated
  2024-08-31T00:26:11.101390+02:00 Notebook ipsec[1982]: 06[KNL] 10.10.10.101 
appeared on wlp3s0
  2024-08-31T00:26:11.101414+02:00 Notebook ipsec[1982]: 00[DMN] SIGINT 
received, shutting down
  2024-08-31T00:26:11.102121+02:00 Notebook ipsec[1935]: charon stopped after 
200 ms
  2024-08-31T00:26:11.102174+02:00 Notebook ipsec[1935]: ipsec starter stopped
  2024-08-31T00:26:11.103688+02:00 Notebook systemd[1]: 
strongswan-starter.service: Deactivated successfully.
  2024-08-31T00:26:13.222597+02:00 Notebook NetworkManager[5164]: Starting 
strongSwan 5.9.13 IPsec [starter]...
  2024-08-31T00:26:13.222804+02:00 Notebook NetworkManager[5164]: Loading 
config setup
  2024-08-31T00:26:13.222896+02:00 Notebook NetworkManager[5164]: Loading conn 
'371969d2-3408-423e-910c-082a3975366d'
  2024-08-31T00:26:13.231098+02:00 Notebook charon: 00[DMN] Starting IKE charon 
daemon (strongSwan 5.9.13, Linux 6.8.0-41-generic, x86_64)
  2024-08-31T00:26:13.235066+02:00 Notebook charon: 00[LIB] providers loaded by 
OpenSSL: legacy default
  2024-08-31T00:26:13.236761+02:00 Notebook charon: 00[CFG] using 
'/sbin/resolvconf' to install DNS servers
  2024-08-31T00:26:13.258630+02:00 Notebook charon: 00[CFG] loading ca 
certificates from '/etc/ipsec.d/cacerts'
  2024-08-31T00:26:13.258761+02:00 Notebook charon: 00[CFG] loading aa 
certificates from '/etc/ipsec.d/aacerts'
  2024-08-31T00:26:13.258837+02:00 Notebook charon: 00[CFG] loading ocsp signer 
certificates from '/etc/ipsec.d/ocspcerts'
  2024-08-31T00:26:13.258925+02:00 Notebook charon: 00[CFG] loading attribute 
certificates from '/etc/ipsec.d/acerts'
  2024-08-31T00:26:13.259000+02:00 Notebook charon: 00[CFG] loading crls from 
'/etc/ipsec.d/crls'
  2024-08-31T00:26:13.259074+02:00 Notebook charon: 00[CFG] loading secrets 
from '/etc/ipsec.secrets'
  2024-08-31T00:26:13.259131+02:00 Notebook charon: 00[CFG] loading secrets 
from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
  2024-08-31T00:26:13.259210+02:00 Notebook charon: 00[CFG]   loaded IKE secret 
for %any
  2024-08-31T00:26:13.259296+02:00 Notebook charon: 00[LIB] loaded plugins: 
charon aesni aes rc2 sha2 sha1 md5 mgf1 random nonce x509 revocation 
constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 
fips-prf gmp agent xcbc hmac kdf gcm drbg attr kernel-netlink resolve 
socket-default connmark stroke updown eap-mschapv2 xauth-generic counters
  2024-08-31T00:26:13.259380+02:00 Notebook charon: 00[LIB] dropped 
capabilities, running as uid 0, gid 0
  2024-08-31T00:26:13.259454+02:00 Notebook charon: 00[JOB] spawning 16 worker 
threads
  2024-08-31T00:26:13.267154+02:00 Notebook charon: 09[CFG] received stroke: 
add connection '371969d2-3408-423e-910c-082a3975366d'
  2024-08-31T00:26:13.267227+02:00 Notebook charon: 09[CFG] added configuration 
'371969d2-3408-423e-910c-082a3975366d'
  2024-08-31T00:26:14.241418+02:00 Notebook charon: 11[CFG] rereading secrets
  2024-08-31T00:26:14.241511+02:00 Notebook charon: 11[CFG] loading secrets 
from '/etc/ipsec.secrets'
  2024-08-31T00:26:14.241552+02:00 Notebook charon: 11[CFG] loading secrets 
from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
  2024-08-31T00:26:14.241593+02:00 Notebook charon: 11[CFG]   loaded IKE secret 
for %any
  2024-08-31T00:26:14.251586+02:00 Notebook charon: 13[CFG] received stroke: 
initiate '371969d2-3408-423e-910c-082a3975366d'
  2024-08-31T00:26:14.254125+02:00 Notebook charon: 15[IKE] initiating Main 
Mode IKE_SA 371969d2-3408-423e-910c-082a3975366d[1] to 1.1.1.1
  2024-08-31T00:26:14.254295+02:00 Notebook charon: 15[ENC] generating ID_PROT 
request 0 [ SA V V V V V ]
  2024-08-31T00:26:14.254379+02:00 Notebook charon: 15[NET] sending packet: 
from 10.10.10.101[500] to 1.1.1.1[500] (532 bytes)
  2024-08-31T00:26:14.340691+02:00 Notebook charon: 16[NET] received packet: 
from 1.1.1.1[500] to 10.10.10.101[500] (156 bytes)
  2024-08-31T00:26:14.340799+02:00 Notebook charon: 16[ENC] parsed ID_PROT 
response 0 [ SA V V V V ]
  2024-08-31T00:26:14.340838+02:00 Notebook charon: 16[IKE] received NAT-T (RFC 
3947) vendor ID
  2024-08-31T00:26:14.340877+02:00 Notebook charon: 16[IKE] received XAuth 
vendor ID
  2024-08-31T00:26:14.340914+02:00 Notebook charon: 16[IKE] received DPD vendor 
ID
  2024-08-31T00:26:14.340950+02:00 Notebook charon: 16[IKE] received 
FRAGMENTATION vendor ID
  2024-08-31T00:26:14.340995+02:00 Notebook charon: 16[CFG] selected proposal: 
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
  2024-08-31T00:26:14.343718+02:00 Notebook charon: 16[ENC] generating ID_PROT 
request 0 [ KE No NAT-D NAT-D ]
  2024-08-31T00:26:14.343935+02:00 Notebook charon: 16[NET] sending packet: 
from 10.10.10.101[500] to 1.1.1.1[500] (372 bytes)
  2024-08-31T00:26:14.904597+02:00 Notebook charon: 04[NET] received packet: 
from 1.1.1.1[500] to 10.10.10.101[500] (364 bytes)
  2024-08-31T00:26:14.904710+02:00 Notebook charon: 04[ENC] parsed ID_PROT 
response 0 [ KE No NAT-D NAT-D ]
  2024-08-31T00:26:14.918587+02:00 Notebook charon: 04[IKE] local host is 
behind NAT, sending keep alives
  2024-08-31T00:26:14.918988+02:00 Notebook charon: 04[ENC] generating ID_PROT 
request 0 [ ID HASH ]
  2024-08-31T00:26:14.919159+02:00 Notebook charon: 04[NET] sending packet: 
from 10.10.10.101[4500] to 1.1.1.1[4500] (68 bytes)
  2024-08-31T00:26:15.495864+02:00 Notebook charon: 06[NET] received packet: 
from 1.1.1.1[4500] to 10.10.10.101[4500] (68 bytes)
  2024-08-31T00:26:15.496236+02:00 Notebook charon: 06[ENC] parsed ID_PROT 
response 0 [ ID HASH ]
  2024-08-31T00:26:15.496298+02:00 Notebook charon: 06[IKE] IKE_SA 
371969d2-3408-423e-910c-082a3975366d[1] established between 
10.10.10.101[10.10.10.101]...1.1.1.1[1.1.1.1]
  2024-08-31T00:26:15.496421+02:00 Notebook charon: 06[IKE] scheduling 
reauthentication in 9955s
  2024-08-31T00:26:15.496465+02:00 Notebook charon: 06[IKE] maximum IKE_SA 
lifetime 10495s
  2024-08-31T00:26:15.496541+02:00 Notebook charon: 06[ENC] generating 
QUICK_MODE request 3869703877 [ HASH SA No ID ID NAT-OA NAT-OA ]
  2024-08-31T00:26:15.496587+02:00 Notebook charon: 06[NET] sending packet: 
from 10.10.10.101[4500] to 1.1.1.1[4500] (244 bytes)
  2024-08-31T00:26:15.580457+02:00 Notebook charon: 07[NET] received packet: 
from 1.1.1.1[4500] to 10.10.10.101[4500] (188 bytes)
  2024-08-31T00:26:15.580581+02:00 Notebook charon: 07[ENC] parsed QUICK_MODE 
response 3869703877 [ HASH SA No ID ID NAT-OA NAT-OA ]
  2024-08-31T00:26:15.580626+02:00 Notebook charon: 07[CFG] selected proposal: 
ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
  2024-08-31T00:26:15.636900+02:00 Notebook charon: 07[IKE] CHILD_SA 
371969d2-3408-423e-910c-082a3975366d{1} established with SPIs cb2fe3a3_i 
0613d457_o and TS 10.10.10.101/32[udp/l2f] === 1.1.1.1/32[udp/l2f]
  2024-08-31T00:26:15.637215+02:00 Notebook charon: 07[ENC] generating 
QUICK_MODE request 3869703877 [ HASH ]
  2024-08-31T00:26:15.637625+02:00 Notebook NetworkManager[5220]: initiating 
Main Mode IKE_SA 371969d2-3408-423e-910c-082a3975366d[1] to 1.1.1.1
  2024-08-31T00:26:15.637666+02:00 Notebook NetworkManager[5220]: generating 
ID_PROT request 0 [ SA V V V V V ]
  2024-08-31T00:26:15.637686+02:00 Notebook NetworkManager[5220]: sending 
packet: from 10.10.10.101[500] to 1.1.1.1[500] (532 bytes)
  2024-08-31T00:26:15.637709+02:00 Notebook NetworkManager[5220]: received 
packet: from 1.1.1.1[500] to 10.10.10.101[500] (156 bytes)
  2024-08-31T00:26:15.637728+02:00 Notebook NetworkManager[5220]: parsed 
ID_PROT response 0 [ SA V V V V ]
  2024-08-31T00:26:15.637746+02:00 Notebook NetworkManager[5220]: received 
NAT-T (RFC 3947) vendor ID
  2024-08-31T00:26:15.637765+02:00 Notebook NetworkManager[5220]: received 
XAuth vendor ID
  2024-08-31T00:26:15.637787+02:00 Notebook NetworkManager[5220]: received DPD 
vendor ID
  2024-08-31T00:26:15.637809+02:00 Notebook NetworkManager[5220]: received 
FRAGMENTATION vendor ID
  2024-08-31T00:26:15.637828+02:00 Notebook NetworkManager[5220]: selected 
proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
  2024-08-31T00:26:15.637847+02:00 Notebook NetworkManager[5220]: generating 
ID_PROT request 0 [ KE No NAT-D NAT-D ]
  2024-08-31T00:26:15.637866+02:00 Notebook NetworkManager[5220]: sending 
packet: from 10.10.10.101[500] to 1.1.1.1[500] (372 bytes)
  2024-08-31T00:26:15.637890+02:00 Notebook NetworkManager[5220]: received 
packet: from 1.1.1.1[500] to 10.10.10.101[500] (364 bytes)
  2024-08-31T00:26:15.637910+02:00 Notebook NetworkManager[5220]: parsed 
ID_PROT response 0 [ KE No NAT-D NAT-D ]
  2024-08-31T00:26:15.637932+02:00 Notebook NetworkManager[5220]: local host is 
behind NAT, sending keep alives
  2024-08-31T00:26:15.637954+02:00 Notebook NetworkManager[5220]: generating 
ID_PROT request 0 [ ID HASH ]
  2024-08-31T00:26:15.637976+02:00 Notebook NetworkManager[5220]: sending 
packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (68 bytes)
  2024-08-31T00:26:15.637995+02:00 Notebook NetworkManager[5220]: received 
packet: from 1.1.1.1[4500] to 10.10.10.101[4500] (68 bytes)
  2024-08-31T00:26:15.638014+02:00 Notebook NetworkManager[5220]: parsed 
ID_PROT response 0 [ ID HASH ]
  2024-08-31T00:26:15.638036+02:00 Notebook NetworkManager[5220]: IKE_SA 
371969d2-3408-423e-910c-082a3975366d[1] established between 
10.10.10.101[10.10.10.101]...1.1.1.1[1.1.1.1]
  2024-08-31T00:26:15.638058+02:00 Notebook NetworkManager[5220]: scheduling 
reauthentication in 9955s
  2024-08-31T00:26:15.638077+02:00 Notebook NetworkManager[5220]: maximum 
IKE_SA lifetime 10495s
  2024-08-31T00:26:15.638099+02:00 Notebook NetworkManager[5220]: generating 
QUICK_MODE request 3869703877 [ HASH SA No ID ID NAT-OA NAT-OA ]
  2024-08-31T00:26:15.638121+02:00 Notebook NetworkManager[5220]: sending 
packet: from 10.10.10.101[4500] to 1.1.1.1[4500] (244 bytes)
  2024-08-31T00:26:15.638140+02:00 Notebook NetworkManager[5220]: received 
packet: from 1.1.1.1[4500] to 10.10.10.101[4500] (188 bytes)
  2024-08-31T00:26:15.638166+02:00 Notebook NetworkManager[5220]: parsed 
QUICK_MODE response 3869703877 [ HASH SA No ID ID NAT-OA NAT-OA ]
  2024-08-31T00:26:15.638188+02:00 Notebook NetworkManager[5220]: selected 
proposal: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
  2024-08-31T00:26:15.638211+02:00 Notebook NetworkManager[5220]: CHILD_SA 
371969d2-3408-423e-910c-082a3975366d{1} established with SPIs cb2fe3a3_i 
0613d457_o and TS 10.10.10.101/32[udp/l2f] === 1.1.1.1/32[udp/l2f]
  2024-08-31T00:26:15.638235+02:00 Notebook NetworkManager[5220]: connection 
'371969d2-3408-423e-910c-082a3975366d' established successfully
  2024-08-31T00:26:15.638267+02:00 Notebook charon: 07[NET] sending packet: 
from 10.10.10.101[4500] to 1.1.1.1[4500] (60 bytes)
  2024-08-31T00:26:15.760056+02:00 Notebook nm-l2tp-service[5149]: strongSwan 
IPsec connection is up.
  2024-08-31T00:26:15.761373+02:00 Notebook nm-l2tp-service[5149]: kl2tpd 
started with pid 5248
  2024-08-31T00:26:15.790306+02:00 Notebook kernel: l2tp_core: L2TP core 
driver, V2.0
  2024-08-31T00:26:15.792294+02:00 Notebook kernel: l2tp_netlink: L2TP netlink 
interface
  2024-08-31T00:26:15.792919+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 session_name=s1 message="new dynamic session" session_id=9814 
peer_session_id=0 pseudowire=7
  2024-08-31T00:26:15.793002+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 message="new dynamic tunnel" version=2 encap=UDP 
local=0.0.0.0:1701 peer=1.1.1.1:1701 tunnel_id=16587 peer_tunnel_id=0
  2024-08-31T00:26:15.793041+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 message="fsm event" event=open
  2024-08-31T00:26:15.793074+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq
  2024-08-31T00:26:15.793108+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeSccrq 
ns=0 nr=0 isRetransmit=false
  2024-08-31T00:26:15.850771+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="socket recv" length=98
  2024-08-31T00:26:15.850981+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=recv message_type=avpMsgTypeSccrp
  2024-08-31T00:26:15.851111+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="send complete" 
message_type=avpMsgTypeSccrq error=null
  2024-08-31T00:26:15.851212+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 message="fsm event" event=sccrp
  2024-08-31T00:26:15.851339+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeScccn
  2024-08-31T00:26:15.851445+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeScccn 
ns=1 nr=1 isRetransmit=false
  2024-08-31T00:26:15.906519+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="socket recv" length=12
  2024-08-31T00:26:15.906716+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="send complete" 
message_type=avpMsgTypeScccn error=null
  2024-08-31T00:26:15.906833+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 message="control plane established"
  2024-08-31T00:26:15.906933+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 message="data plane established"
  2024-08-31T00:26:15.907022+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 message="fsm event" event=newsession
  2024-08-31T00:26:15.907069+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 session_name=s1 message="fsm event" event=tunnelopen
  2024-08-31T00:26:15.907172+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeIcrq
  2024-08-31T00:26:15.907226+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeIcrq ns=2 
nr=1 isRetransmit=false
  2024-08-31T00:26:15.962621+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="socket recv" length=28
  2024-08-31T00:26:15.962917+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=recv message_type=avpMsgTypeIcrp
  2024-08-31T00:26:15.963015+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="send complete" 
message_type=avpMsgTypeIcrq error=null
  2024-08-31T00:26:15.963110+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 message="fsm event" event=sessionmsg
  2024-08-31T00:26:15.963197+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 session_name=s1 message="fsm event" event=icrp
  2024-08-31T00:26:15.963396+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeIccn
  2024-08-31T00:26:15.963507+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeIccn ns=3 
nr=2 isRetransmit=false
  2024-08-31T00:26:16.022761+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="socket recv" length=12
  2024-08-31T00:26:16.022888+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="send complete" 
message_type=avpMsgTypeIccn error=null
  2024-08-31T00:26:16.023003+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 session_name=s1 message="control plane established"
  2024-08-31T00:26:16.030327+02:00 Notebook kernel: NET: Registered PF_PPPOX 
protocol family
  2024-08-31T00:26:16.033306+02:00 Notebook kernel: l2tp_ppp: PPPoL2TP kernel 
driver, V2.0
  2024-08-31T00:26:16.033993+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 session_name=s1 message="data plane established"
  2024-08-31T00:26:16.034117+02:00 Notebook NetworkManager[5248]: level=info 
message="session up" tunnel_name=t1 session_name=s1 tunnel_id=16587 
session_id=9814 peer_tunnel_id=376 peer_session_id=1
  2024-08-31T00:26:16.043279+02:00 Notebook pppd[5258]: Plugin pppol2tp.so 
loaded.
  2024-08-31T00:26:16.045340+02:00 Notebook pppd[5258]: Plugin 
/usr/lib/pppd/2.4.9/nm-l2tp-pppd-plugin.so loaded.
  2024-08-31T00:26:16.048163+02:00 Notebook pppd[5258]: pppd 2.4.9 started by 
root, uid 0
  2024-08-31T00:26:16.048513+02:00 Notebook pppd[5258]: Using interface ppp0
  2024-08-31T00:26:16.048593+02:00 Notebook pppd[5258]: Connect: ppp0 <-->
  2024-08-31T00:26:16.048662+02:00 Notebook pppd[5258]: Overriding mtu 1500 to 
1400
  2024-08-31T00:26:16.048788+02:00 Notebook pppd[5258]: Overriding mru 1500 to 
mtu value 1400
  2024-08-31T00:26:16.049827+02:00 Notebook NetworkManager[1603]: <info>  
[1725056776.0494] manager: (ppp0): new Ppp device 
(/org/freedesktop/NetworkManager/Devices/9)
  2024-08-31T00:26:16.174573+02:00 Notebook pppd[5258]: Overriding mtu 1460 to 
1400
  2024-08-31T00:26:16.174667+02:00 Notebook pppd[5258]: peer doesn't want to 
authenticate us with eap
  2024-08-31T00:26:16.174725+02:00 Notebook pppd[5258]: Overriding mtu 1500 to 
1400
  2024-08-31T00:26:16.174758+02:00 Notebook pppd[5258]: Overriding mru 1500 to 
mtu value 1400
  2024-08-31T00:26:16.226609+02:00 Notebook pppd[5258]: Connection terminated.
  2024-08-31T00:26:16.227094+02:00 Notebook charon: 15[KNL] interface ppp0 
deleted
  2024-08-31T00:26:16.228048+02:00 Notebook NetworkManager[5248]: level=info 
message="received signal, shutting down"
  2024-08-31T00:26:16.228165+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 message="fsm event" event=close
  2024-08-31T00:26:16.228241+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeStopccn
  2024-08-31T00:26:16.228354+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeStopccn 
ns=4 nr=2 isRetransmit=false
  2024-08-31T00:26:16.228764+02:00 Notebook NetworkManager[1603]: <warn>  
[1725056776.2286] 
vpn[0x5a331d72aae0,371969d2-3408-423e-910c-082a3975366d,"Office"]: dbus: 
failure: connect-failed (1)
  2024-08-31T00:26:16.230630+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="socket recv" length=36
  2024-08-31T00:26:16.230730+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=recv message_type=avpMsgTypeCdn
  2024-08-31T00:26:16.232901+02:00 Notebook NetworkManager[5266]: Stopping 
strongSwan IPsec...
  2024-08-31T00:26:16.233702+02:00 Notebook pppd[5258]: Exit.
  2024-08-31T00:26:16.234318+02:00 Notebook charon: 00[DMN] SIGINT received, 
shutting down
  2024-08-31T00:26:16.234796+02:00 Notebook charon: 00[IKE] closing CHILD_SA 
371969d2-3408-423e-910c-082a3975366d{1} with SPIs cb2fe3a3_i (390 bytes) 
0613d457_o (383 bytes) and TS 10.10.10.101/32[udp/l2f] === 1.1.1.1/32[udp/l2f]
  2024-08-31T00:26:16.234970+02:00 Notebook NetworkManager[5248]: level=error 
message="pppd exited with an error code" error="exit status 11" 
error_message="the peer system failed or refused to authenticate itself"
  2024-08-31T00:26:16.235025+02:00 Notebook NetworkManager[5248]: level=info 
message="pseudowire terminated"
  2024-08-31T00:26:16.235086+02:00 Notebook charon: 00[IKE] sending DELETE for 
ESP CHILD_SA with SPI cb2fe3a3
  2024-08-31T00:26:16.235153+02:00 Notebook charon: 00[ENC] generating 
INFORMATIONAL_V1 request 806525166 [ HASH D ]
  2024-08-31T00:26:16.235220+02:00 Notebook charon: 00[NET] sending packet: 
from 10.10.10.101[4500] to 1.1.1.1[4500] (76 bytes)
  2024-08-31T00:26:16.235285+02:00 Notebook charon: 00[IKE] deleting IKE_SA 
371969d2-3408-423e-910c-082a3975366d[1] between 
10.10.10.101[10.10.10.101]...1.1.1.1[1.1.1.1]
  2024-08-31T00:26:16.235429+02:00 Notebook charon: 00[IKE] sending DELETE for 
IKE_SA 371969d2-3408-423e-910c-082a3975366d[1]
  2024-08-31T00:26:16.235501+02:00 Notebook charon: 00[ENC] generating 
INFORMATIONAL_V1 request 3623491453 [ HASH D ]
  2024-08-31T00:26:16.235549+02:00 Notebook charon: 00[NET] sending packet: 
from 10.10.10.101[4500] to 1.1.1.1[4500] (84 bytes)
  2024-08-31T00:26:16.331612+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeAck ns=5 
nr=3 isRetransmit=false
  2024-08-31T00:26:16.338006+02:00 Notebook nm-l2tp-service[5149]: ipsec shut 
down
  2024-08-31T00:26:17.230175+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 function=transport message=retransmit 
message_type=avpMsgTypeStopccn
  2024-08-31T00:26:17.230263+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeStopccn 
ns=4 nr=3 isRetransmit=true
  2024-08-31T00:26:19.231831+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 function=transport message=retransmit 
message_type=avpMsgTypeStopccn
  2024-08-31T00:26:19.231884+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message=send message_type=avpMsgTypeStopccn 
ns=4 nr=3 isRetransmit=true
  2024-08-31T00:26:19.761887+02:00 Notebook systemd[2748]: Started 
app-gnome-org.gnome.Terminal-5273.scope - Application launched by gnome-shell.
  2024-08-31T00:26:20.168219+02:00 Notebook dbus-daemon[2788]: [session 
uid=1000 pid=2788] Activating via systemd: service name='org.gnome.Terminal' 
unit='gnome-terminal-server.service' requested by ':1.133' (uid=1000 pid=5280 
comm="/usr/bin/gnome-terminal.real" label="unconfined")
  2024-08-31T00:26:20.169669+02:00 Notebook systemd[2748]: Created slice 
app-org.gnome.Terminal.slice - Slice /app/org.gnome.Terminal.
  2024-08-31T00:26:20.186842+02:00 Notebook systemd[2748]: Starting 
gnome-terminal-server.service - GNOME Terminal Server...
  2024-08-31T00:26:20.499151+02:00 Notebook dbus-daemon[2788]: [session 
uid=1000 pid=2788] Successfully activated service 'org.gnome.Terminal'
  2024-08-31T00:26:20.499588+02:00 Notebook systemd[2748]: Started 
gnome-terminal-server.service - GNOME Terminal Server.
  2024-08-31T00:26:20.611636+02:00 Notebook gnome-shell[3040]: 
meta_window_set_stack_position_no_sync: assertion 'window->stack_position >= 0' 
failed
  2024-08-31T00:26:20.624632+02:00 Notebook systemd[2748]: Started 
vte-spawn-11099c72-370b-4b43-a8c5-ebfde316934e.scope - VTE child process 5300 
launched by gnome-terminal-server process 5292.
  2024-08-31T00:26:23.236075+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 function=transport message=retransmit 
message_type=avpMsgTypeStopccn
  2024-08-31T00:26:23.236459+02:00 Notebook NetworkManager[5248]: level=debug 
tunnel_name=t1 function=transport message="send complete" 
message_type=avpMsgTypeStopccn error="transmit of avpMsgTypeStopccn failed 
after 3 retry attempts"
  2024-08-31T00:26:23.236659+02:00 Notebook NetworkManager[5248]: level=error 
tunnel_name=t1 function=transport message="socket read failed" error="use of 
closed file"
  2024-08-31T00:26:23.236760+02:00 Notebook NetworkManager[5248]: level=error 
tunnel_name=t1 function=transport message="transport down" error="transmit of 
avpMsgTypeStopccn failed after 3 retry attempts"
  2024-08-31T00:26:23.236858+02:00 Notebook NetworkManager[5248]: level=error 
tunnel_name=t1 session_name=s1 message="dataplane down failed" error="netlink 
receive: no such device"
  2024-08-31T00:26:23.236946+02:00 Notebook NetworkManager[5248]: level=info 
message="session down" result= tunnel_name=t1 session_name=s1 tunnel_id=16587 
session_id=9814 peer_tunnel_id=376 peer_session_id=1
  2024-08-31T00:26:23.236990+02:00 Notebook NetworkManager[5248]: level=info 
message="killing pseudowire"
  2024-08-31T00:26:23.237099+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 session_name=s1 message=close
  2024-08-31T00:26:23.237195+02:00 Notebook NetworkManager[5248]: level=info 
tunnel_name=t1 message=close
  2024-08-31T00:26:23.237341+02:00 Notebook NetworkManager[5248]: level=info 
message="graceful shutdown complete"
  2024-08-31T00:26:34.937013+02:00 Notebook dbus-daemon[2788]: [session 
uid=1000 pid=2788] Activating service name='org.gnome.DejaDup' requested by 
':1.132' (uid=1000 pid=4379 comm="/usr/libexec/deja-dup/deja-dup-monitor" 
label="unconfined")
  2024-08-31T00:26:34.973033+02:00 Notebook dbus-daemon[2788]: [session 
uid=1000 pid=2788] Successfully activated service 'org.gnome.DejaDup'
  2024-08-31T00:27:11.628292+02:00 Notebook systemd[1]: Starting 
update-notifier-download.service - Download data for packages that failed at 
package install time...
  2024-08-31T00:27:11.757128+02:00 Notebook systemd[1]: 
update-notifier-download.service: Deactivated successfully.
  2024-08-31T00:27:11.757983+02:00 Notebook systemd[1]: Finished 
update-notifier-download.service - Download data for packages that failed at 
package install time.
  2024-08-31T00:27:13.734816+02:00 Notebook dbus-daemon[1485]: [system] 
Activating via systemd: service name='org.freedesktop.timedate1' 
unit='dbus-org.freedesktop.timedate1.service' requested by ':1.19' (uid=0 
pid=1537 comm="/usr/lib/snapd/snapd" label="unconfined")
  2024-08-31T00:27:13.763193+02:00 Notebook systemd[1]: Starting 
systemd-timedated.service - Time & Date Service...
  2024-08-31T00:27:13.850381+02:00 Notebook dbus-daemon[1485]: [system] 
Successfully activated service 'org.freedesktop.timedate1'
  2024-08-31T00:27:13.850630+02:00 Notebook systemd[1]: Started 
systemd-timedated.service - Time & Date Service.
  2024-08-31T00:27:15.318814+02:00 Notebook NetworkManager[1603]: <info>  
[1725056835.3184] dhcp4 (wlp3s0): state changed new lease, address=10.10.10.101
  2024-08-31T00:27:15.320055+02:00 Notebook dbus-daemon[1485]: [system] 
Activating via systemd: service name='org.freedesktop.nm_dispatcher' 
unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.10' (uid=0 
pid=1603 comm="/usr/sbin/NetworkManager --no-daemon" label="unconfined")
  2024-08-31T00:27:15.346361+02:00 Notebook systemd[1]: Starting 
NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service...
  2024-08-31T00:27:15.355059+02:00 Notebook dbus-daemon[1485]: [system] 
Successfully activated service 'org.freedesktop.nm_dispatcher'
  2024-08-31T00:27:15.355292+02:00 Notebook systemd[1]: Started 
NetworkManager-dispatcher.service - Network Manager Script Dispatcher Service.
  2024-08-31T00:27:25.369904+02:00 Notebook systemd[1]: 
NetworkManager-dispatcher.service: Deactivated successfully.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-l2tp/+bug/2078529/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to