Kali 中文网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

搜索
查看: 503|回复: 3

[求助] Kali配置L2tp客户端连接失败的问题

[复制链接]
发表于 2018-11-29 02:06:41 | 显示全部楼层 |阅读模式
用windows连接服务器正常,用Kali配置好后,连接VPN服务器,收到提示连接失败:Connection failed  Activation of network connection failed.
看日志里面前面一切正常,除了
Dec  3 05:00:26 localhost charon: 07[CFG] expanding file expression '/var/lib/strongswan/ipsec.secrets.inc' failed/var/lib/strongswn/下面只有ipsec.conf.inc,没有上面的文件
失败了两次以外,后面双向收发貌似都成功了,可是突然提示
Dec  3 05:00:42 localhost NetworkManager[1121]: xl2tpd[3653]: death_handler: Fatal signal 15 received

然后就断开连接了!郁闷啊!求高手指教,另外,我是纯小白。

后面附件是log文件,求指点啊!急等


Dec  3 05:00:23 localhost NetworkManager[1121]: <info>  [1543813223.7835] audit: op="connection-activate" uuid="261946ee-5a59-453e-8e93-5cdc5214a05a" name="VPN 1" pid=2455 uid=0 result="success"
Dec  3 05:00:23 localhost NetworkManager[1121]: <info>  [1543813223.8080] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: Started the VPN service, PID 3582
Dec  3 05:00:23 localhost NetworkManager[1121]: <info>  [1543813223.8197] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: Saw the service appear; activating connection
Dec  3 05:00:23 localhost NetworkManager[1121]: <info>  [1543813223.8276] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: VPN connection: (ConnectInteractive) reply received
Dec  3 05:00:23 localhost nm-l2tp-service[3582]: Check port 1701
Dec  3 05:00:23 localhost NetworkManager[1121]: Stopping strongSwan IPsec failed: starter is not running
Dec  3 05:00:25 localhost NetworkManager[1121]: Starting strongSwan 5.7.1 IPsec [starter]...
Dec  3 05:00:25 localhost NetworkManager[1121]: Loading config setup
Dec  3 05:00:25 localhost NetworkManager[1121]: Loading conn '261946ee-5a59-453e-8e93-5cdc5214a05a'
Dec  3 05:00:25 localhost NetworkManager[1121]: found netkey IPsec stack
Dec  3 05:00:25 localhost charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.7.1, Linux 4.18.0-kali2-amd64, x86_64)
Dec  3 05:00:25 localhost charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
Dec  3 05:00:25 localhost charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
Dec  3 05:00:25 localhost charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
Dec  3 05:00:25 localhost charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
Dec  3 05:00:25 localhost charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
Dec  3 05:00:25 localhost charon: 00[CFG] loading secrets from '/etc/ipsec.secrets'
Dec  3 05:00:25 localhost charon: 00[CFG] expanding file expression '/var/lib/strongswan/ipsec.secrets.inc' failed
Dec  3 05:00:25 localhost charon: 00[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-261946ee-5a59-453e-8e93-5cdc5214a05a.secrets'
Dec  3 05:00:25 localhost charon: 00[CFG]   loaded IKE secret for %any
Dec  3 05:00:25 localhost charon: 00[LIB] loaded plugins: charon aesni aes rc2 sha2 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown counters
Dec  3 05:00:25 localhost charon: 00[LIB] dropped capabilities, running as uid 0, gid 0
Dec  3 05:00:25 localhost charon: 00[JOB] spawning 16 worker threads
Dec  3 05:00:25 localhost charon: 06[CFG] received stroke: add connection '261946ee-5a59-453e-8e93-5cdc5214a05a'
Dec  3 05:00:25 localhost charon: 06[CFG] added configuration '261946ee-5a59-453e-8e93-5cdc5214a05a'
Dec  3 05:00:26 localhost charon: 07[CFG] rereading secrets
Dec  3 05:00:26 localhost charon: 07[CFG] loading secrets from '/etc/ipsec.secrets'
Dec  3 05:00:26 localhost charon: 07[CFG] expanding file expression '/var/lib/strongswan/ipsec.secrets.inc' failed
Dec  3 05:00:26 localhost charon: 07[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-261946ee-5a59-453e-8e93-5cdc5214a05a.secrets'
Dec  3 05:00:26 localhost charon: 07[CFG]   loaded IKE secret for %any
Dec  3 05:00:26 localhost charon: 09[CFG] received stroke: initiate '261946ee-5a59-453e-8e93-5cdc5214a05a'
Dec  3 05:00:26 localhost charon: 11[IKE] initiating Main Mode IKE_SA 261946ee-5a59-453e-8e93-5cdc5214a05a[1] to 207.246.112.232
Dec  3 05:00:26 localhost charon: 11[ENC] generating ID_PROT request 0 [ SA V V V V V ]
Dec  3 05:00:26 localhost charon: 11[NET] sending packet: from 192.168.3.4[500] to 207.246.112.232[500] (204 bytes)
Dec  3 05:00:27 localhost charon: 12[NET] received packet: from 207.246.112.232[500] to 192.168.3.4[500] (144 bytes)
Dec  3 05:00:27 localhost charon: 12[ENC] parsed ID_PROT response 0 [ SA V V V ]
Dec  3 05:00:27 localhost charon: 12[IKE] received DPD vendor ID
Dec  3 05:00:27 localhost charon: 12[IKE] received FRAGMENTATION vendor ID
Dec  3 05:00:27 localhost charon: 12[IKE] received NAT-T (RFC 3947) vendor ID
Dec  3 05:00:27 localhost charon: 12[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
Dec  3 05:00:27 localhost charon: 12[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
Dec  3 05:00:27 localhost charon: 12[NET] sending packet: from 192.168.3.4[500] to 207.246.112.232[500] (204 bytes)
Dec  3 05:00:27 localhost charon: 13[NET] received packet: from 207.246.112.232[500] to 192.168.3.4[500] (204 bytes)
Dec  3 05:00:27 localhost charon: 13[ENC] parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
Dec  3 05:00:27 localhost charon: 13[IKE] local host is behind NAT, sending keep alives
Dec  3 05:00:27 localhost charon: 13[ENC] generating ID_PROT request 0 [ ID HASH ]
Dec  3 05:00:27 localhost charon: 13[NET] sending packet: from 192.168.3.4[4500] to 207.246.112.232[4500] (92 bytes)
Dec  3 05:00:27 localhost charon: 14[NET] received packet: from 207.246.112.232[4500] to 192.168.3.4[4500] (92 bytes)
Dec  3 05:00:27 localhost charon: 14[ENC] parsed ID_PROT response 0 [ ID HASH V ]
Dec  3 05:00:27 localhost charon: 14[ENC] received unknown vendor ID: 49:4b:45:76:32
Dec  3 05:00:27 localhost charon: 14[IKE] IKE_SA 261946ee-5a59-453e-8e93-5cdc5214a05a[1] established between 192.168.3.4[192.168.3.4]...207.246.112.232[207.246.112.232]
Dec  3 05:00:27 localhost charon: 14[IKE] scheduling reauthentication in 9864s
Dec  3 05:00:27 localhost charon: 14[IKE] maximum IKE_SA lifetime 10404s
Dec  3 05:00:27 localhost charon: 14[ENC] generating QUICK_MODE request 4192104355 [ HASH SA No ID ID NAT-OA NAT-OA ]
Dec  3 05:00:27 localhost charon: 14[NET] sending packet: from 192.168.3.4[4500] to 207.246.112.232[4500] (204 bytes)
Dec  3 05:00:28 localhost charon: 15[NET] received packet: from 207.246.112.232[4500] to 192.168.3.4[4500] (188 bytes)
Dec  3 05:00:28 localhost charon: 15[ENC] parsed QUICK_MODE response 4192104355 [ HASH SA No ID ID ]
Dec  3 05:00:28 localhost charon: 15[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
Dec  3 05:00:28 localhost charon: 15[IKE] CHILD_SA 261946ee-5a59-453e-8e93-5cdc5214a05a{1} established with SPIs cae075c9_i d3c23736_o and TS 192.168.3.4/32[udp/l2f] === 207.246.112.232/32[udp/l2f]
Dec  3 05:00:28 localhost NetworkManager[1121]: initiating Main Mode IKE_SA 261946ee-5a59-453e-8e93-5cdc5214a05a[1] to 207.246.112.232
Dec  3 05:00:28 localhost NetworkManager[1121]: generating ID_PROT request 0 [ SA V V V V V ]
Dec  3 05:00:28 localhost NetworkManager[1121]: sending packet: from 192.168.3.4[500] to 207.246.112.232[500] (204 bytes)
Dec  3 05:00:28 localhost NetworkManager[1121]: received packet: from 207.246.112.232[500] to 192.168.3.4[500] (144 bytes)
Dec  3 05:00:28 localhost NetworkManager[1121]: parsed ID_PROT response 0 [ SA V V V ]
Dec  3 05:00:28 localhost NetworkManager[1121]: received DPD vendor ID
Dec  3 05:00:28 localhost NetworkManager[1121]: received FRAGMENTATION vendor ID
Dec  3 05:00:28 localhost NetworkManager[1121]: received NAT-T (RFC 3947) vendor ID
Dec  3 05:00:28 localhost NetworkManager[1121]: selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
Dec  3 05:00:28 localhost NetworkManager[1121]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
Dec  3 05:00:28 localhost NetworkManager[1121]: sending packet: from 192.168.3.4[500] to 207.246.112.232[500] (204 bytes)
Dec  3 05:00:28 localhost NetworkManager[1121]: received packet: from 207.246.112.232[500] to 192.168.3.4[500] (204 bytes)
Dec  3 05:00:28 localhost NetworkManager[1121]: parsed ID_PROT response 0 [ KE No NAT-D NAT-D ]
Dec  3 05:00:28 localhost NetworkManager[1121]: local host is behind NAT, sending keep alives
Dec  3 05:00:28 localhost NetworkManager[1121]: generating ID_PROT request 0 [ ID HASH ]
Dec  3 05:00:28 localhost NetworkManager[1121]: sending packet: from 192.168.3.4[4500] to 207.246.112.232[4500] (92 bytes)
Dec  3 05:00:28 localhost NetworkManager[1121]: received packet: from 207.246.112.232[4500] to 192.168.3.4[4500] (92 bytes)
Dec  3 05:00:28 localhost NetworkManager[1121]: parsed ID_PROT response 0 [ ID HASH V ]
Dec  3 05:00:28 localhost NetworkManager[1121]: received unknown vendor ID: 49:4b:45:76:32
Dec  3 05:00:28 localhost NetworkManager[1121]: IKE_SA 261946ee-5a59-453e-8e93-5cdc5214a05a[1] established between 192.168.3.4[192.168.3.4]...207.246.112.232[207.246.112.232]
Dec  3 05:00:28 localhost NetworkManager[1121]: scheduling reauthentication in 9864s
Dec  3 05:00:28 localhost NetworkManager[1121]: maximum IKE_SA lifetime 10404s
Dec  3 05:00:28 localhost NetworkManager[1121]: generating QUICK_MODE request 4192104355 [ HASH SA No ID ID NAT-OA NAT-OA ]
Dec  3 05:00:28 localhost NetworkManager[1121]: sending packet: from 192.168.3.4[4500] to 207.246.112.232[4500] (204 bytes)
Dec  3 05:00:28 localhost NetworkManager[1121]: received packet: from 207.246.112.232[4500] to 192.168.3.4[4500] (188 bytes)
Dec  3 05:00:28 localhost NetworkManager[1121]: parsed QUICK_MODE response 4192104355 [ HASH SA No ID ID ]
Dec  3 05:00:28 localhost NetworkManager[1121]: selected proposal: ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ
Dec  3 05:00:28 localhost NetworkManager[1121]: CHILD_SA 261946ee-5a59-453e-8e93-5cdc5214a05a{1} established with SPIs cae075c9_i d3c23736_o and TS 192.168.3.4/32[udp/l2f] === 207.246.112.232/32[udp/l2f]
Dec  3 05:00:28 localhost NetworkManager[1121]: connection '261946ee-5a59-453e-8e93-5cdc5214a05a' established successfully
Dec  3 05:00:28 localhost charon: 15[ENC] generating QUICK_MODE request 4192104355 [ HASH ]
Dec  3 05:00:28 localhost charon: 15[NET] sending packet: from 192.168.3.4[4500] to 207.246.112.232[4500] (76 bytes)
Dec  3 05:00:28 localhost nm-l2tp-service[3582]: xl2tpd started with pid 3653
Dec  3 05:00:28 localhost NetworkManager[1121]: <info>  [1543813228.1744] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: VPN plugin: state changed: starting (3)
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: Not looking for kernel SAref support.
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: Using l2tp kernel support.
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: xl2tpd version xl2tpd-1.3.12 started on kali PID:3653
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: Forked by Scott Balmos and David Stipp, (C) 2001
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: Inherited by Jeff McAdams, (C) 2002
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: Forked again by Xelerance (www.xelerance.com) (C) 2006-2016
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: Listening on IP address 0.0.0.0, port 1701
Dec  3 05:00:28 localhost NetworkManager[1121]: xl2tpd[3653]: Connecting to host 207.246.112.232, port 1701
Dec  3 05:00:42 localhost NetworkManager[1121]: xl2tpd[3653]: death_handler: Fatal signal 15 received
Dec  3 05:00:42 localhost NetworkManager[1121]: xl2tpd[3653]: Connection 0 closed to 207.246.112.232, port 1701 (Server closing)
Dec  3 05:00:42 localhost NetworkManager[1121]: <warn>  [1543813242.1905] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: VPN plugin: failed: connect-failed (1)
Dec  3 05:00:42 localhost NetworkManager[1121]: <warn>  [1543813242.1907] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: VPN plugin: failed: connect-failed (1)
Dec  3 05:00:42 localhost NetworkManager[1121]: <info>  [1543813242.1907] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: VPN plugin: state changed: stopping (5)
Dec  3 05:00:42 localhost NetworkManager[1121]: Stopping strongSwan IPsec...
Dec  3 05:00:42 localhost charon: 00[DMN] signal of type SIGINT received. Shutting down
Dec  3 05:00:42 localhost charon: 00[IKE] closing CHILD_SA 261946ee-5a59-453e-8e93-5cdc5214a05a{1} with SPIs cae075c9_i (0 bytes) d3c23736_o (496 bytes) and TS 192.168.3.4/32[udp/l2f] === 207.246.112.232/32[udp/l2f]
Dec  3 05:00:42 localhost charon: 00[IKE] sending DELETE for ESP CHILD_SA with SPI cae075c9
Dec  3 05:00:42 localhost charon: 00[ENC] generating INFORMATIONAL_V1 request 409919809 [ HASH D ]
Dec  3 05:00:42 localhost charon: 00[NET] sending packet: from 192.168.3.4[4500] to 207.246.112.232[4500] (92 bytes)
Dec  3 05:00:42 localhost charon: 00[IKE] deleting IKE_SA 261946ee-5a59-453e-8e93-5cdc5214a05a[1] between 192.168.3.4[192.168.3.4]...207.246.112.232[207.246.112.232]
Dec  3 05:00:42 localhost charon: 00[IKE] sending DELETE for IKE_SA 261946ee-5a59-453e-8e93-5cdc5214a05a[1]
Dec  3 05:00:42 localhost charon: 00[ENC] generating INFORMATIONAL_V1 request 3036951001 [ HASH D ]
Dec  3 05:00:42 localhost charon: 00[NET] sending packet: from 192.168.3.4[4500] to 207.246.112.232[4500] (108 bytes)
Dec  3 05:00:42 localhost nm-l2tp-service[3582]: ipsec shut down
Dec  3 05:00:42 localhost NetworkManager[1121]: <info>  [1543813242.3051] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: VPN plugin: state changed: stopped (6)
Dec  3 05:00:42 localhost NetworkManager[1121]: <info>  [1543813242.3081] vpn-connection[0x5652a1958330,261946ee-5a59-453e-8e93-5cdc5214a05a,"VPN 1",0]: VPN service disappeared

aaa_log.doc

82.5 KB, 下载次数: 0, 下载积分: 骨头 -1 根

log文件

点评

海!外直播 t.cn/RxBC0c2 禁闻视频 t.cn/RxBCc65 金正恩心想,那次我们阅兵,你们让周永康来,就站在我爹俩旁边,事后证明他是坏人,这不故意羞辱我们么?我要以其人之道还之,这次派崔龙海去,等他回来…  发表于 2018-12-15 23:59
+1
505°C
2
  • pointone
  • pointone
过: 他们
 楼主| 发表于 2018-12-3 02:38:48 | 显示全部楼层
没有人回复啊?有没有大神指教啊?
回复 支持 反对

使用道具 举报

 楼主| 发表于 2018-12-5 22:27:08 | 显示全部楼层
再顶一次,看看有没有大神指教
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

Kali linux ( 蜀ICP备10027298号-4 ) Topics |


免责声明:
Kali linux中文网所发布的一切教程文章仅限用于学习和研究目的;不得将上述内容用于商业或者非法用途,否则,一切后果请用户自负。本站信息来自网络,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑中彻底删除上述内容。

GMT+8, 2019-1-17 00:11 , Processed in 0.291950 second(s), 26 queries , Gzip On.

Powered by Discuz!

© 2009-2016 KALI

快速回复 返回顶部 返回列表