Issue metadata
Sign in to add a comment
|
Customer is having issues connecting to L2TP/IPSec after updating their ChromeOS to version 58 |
||||||||||||||||||||||
Issue descriptionopening new bug as per crbug/707139 c#25 Chrome Version: - Stable: 57.0.2987.146 || 57.0.2987.123 || 58.0.3029.110 - Beta: 59.0.3071.47 - Canary: 60.0.3101.0 OS: ChromeOs What steps will reproduce the problem? 1. Connect to a Ubuntu 12.04.05 LTS. with: Openswan version is U2.637.K3.2.0-74-generic-pae Xl2tpd version is xletpd-1.3.1 Configuration: https://drive.google.com/open?id=0B01ZVp8vDQocaXFjUnc5Y2FvVms 2. Connection will fail with internal error Logs: https://drive.google.com/open?id=0B01ZVp8vDQocYnkwdk0xQU5mNEU 3. Problem did not occur with v.56 What is the expected result? VPN connections should work What happens instead? VPN doesn't work
,
May 26 2017
Here is the output of the command ip xfrm state as requested.
,
May 26 2017
> auth-trunc hmac(sha256) 0x07574b99b77fdb1724537db815b2aa63de8b13b8f057f5ebd18809e22af25fb3 96 Thanks, the "96" at the end confirms that it is the truncation bug. If you run the same command on a Chromebook or on a newer Linux distribution, it will say "128" instead. I would suggest updating Openswan to 2.6.38+ (or at least asking Openswan not to propose sha256 for ESP).
,
May 30 2017
I believe this will be resolved with the Openswan upgrade. If not, please re-open.
,
Jun 23 2017
Reopening this bug with new details from customer. Chrome Version: Stable -59.0.3071.91 Beta - 60.0.3112.26 OS: ChromeOs VPN server is setup on TPLink TL-ER6120. Connection fails with internal error again. From the net.log it looks like IKE SA is being established using main mode, but quick mode fails to establish IPsec SA. After few retransmit request IPsec connection timed out. Attached logs: https://drive.google.com/drive/folders/0By9xEkAUmm_cXy1XNHpuOU8wWE0?usp=sharing
,
Jun 24 2017
> From the net.log it looks like IKE SA is being established using main mode, but quick mode fails to establish IPsec SA. After few retransmit request IPsec connection timed out. I agree with this analysis. The Chromebook sends four Quick Mode requests to 12.x.x.x at 35s, 39s, 46s, and 59s, but the gateway never responds. I would suggest enabling verbose logging on the remote end to see what is happening when it receives the Quick Mode requests. This is different from the other failure modes I've seen so far. It is more common to see either: a) IPsec SA can't be established because the two sides cannot agree on crypto parameters, so charon gets a NO_PROPOSAL_CHOSEN reply and aborts or b) IPsec SA is established, but L2TP negotiation times out because one side uses SHA256_96 to encrypt the data traffic and the other side uses SHA256_128
,
Sep 3 2017
|
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by cernekee@chromium.org
, May 24 2017