New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 779545 link

Starred by 4 users

Issue metadata

Status: Unconfirmed
Owner: ----
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 2
Type: Bug



Sign in to add a comment

PSK exchange on L2TP/IPSec doesn't work

Reported by michael....@clever-soft.de, Oct 30 2017

Issue description

UserAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.75 Safari/537.36
Platform: 9765.85.0 (Official Build) stable-channel-kip

Example URL:

Steps to reproduce the problem:
1. Connecting to Cisco VPN (Cisco ASA 5505)
2. Using specific tunnel group Name
3. getting 'internal error'

What is the expected behavior?
Should establish a Connection

What went wrong?
On the Cisco Asa, the exchange of the Pre-Shared key is from their perspective done so it waits for the IPSec packets but they never arrive so the Connection runs into a timeout.

Did this work before? N/A 

Chrome version: 61.0.3163.123  Channel: stable
OS Version: 61.0.3163.123
Flash Version: 27.0.0.170
 
chrome-net-export-log.json
787 KB View Download
What are you using to connect to Cisco? You'll probably want to file a bug with the extension author, since we don't have any special logic for VPN connections in Chrome directly.
Labels: Needs-Feedback
We are using the built-in VPN of Chrome OS. The connection is going to be established over IKev1 and uses L2TP/IPSec with a Pre-Shared Key.
Project Member

Comment 4 by sheriffbot@chromium.org, Nov 3 2017

Cc: svaldez@chromium.org
Labels: -Needs-Feedback
Thank you for providing more feedback. Adding requester "svaldez@chromium.org" to the cc list and removing "Needs-Feedback" label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Components: -Internals>Network Internals>Network>VPN
Got the same issue. If using Cisco VPN Client on Windows there's no problem. Using Android VPN no problem too.
It would help to gather packet traces + logs from both sides (client and ASA).
Labels: Enterprise-Triaged

Sign in to add a comment