0

我试过vpn l2tp连接,但我无法连接。我使用 GUI 网络管理器。这是调试代码

nm-l2tp[25816] <info>  starting ipsec
Stopping strongSwan IPsec failed: starter is not running
Starting strongSwan 5.5.1 IPsec [starter]...
Loading config setup
Loading conn 'b90b8bb2-cbd9-456c-a33e-b43adc975dec'
found netkey IPsec stack
nm-l2tp[25816] <info>  Spawned ipsec up script with PID 25879.
initiating Main Mode IKE_SA b90b8bb2-cbd9-456c-a33e-b43adc975dec[1] to 103.76.22.130
generating ID_PROT request 0 [ SA V V V V V ]
sending packet: from 192.168.42.162[500] to 103.76.22.130[500] (240 bytes)
sending retransmit 1 of request message ID 0, seq 1
sending packet: from 192.168.42.162[500] to 103.76.22.130[500] (240 bytes)
nm-l2tp[25816] <warn>  Timeout trying to establish IPsec connection
nm-l2tp[25816] <info>  Terminating ipsec script with PID 25879.
Stopping strongSwan IPsec...
destroying IKE_SA in state CONNECTING without notification
establishing connection 'b90b8bb2-cbd9-456c-a33e-b43adc975dec' failed
nm-l2tp[25816] <warn>  Could not establish IPsec tunnel.

(nm-l2tp-service:25816): GLib-GIO-CRITICAL **: g_dbus_method_invocation_take_error: assertion 'error != NULL' failed

有人可以帮助我发生了什么或解决它吗?我在这里这里尝试过教程

4

1 回答 1

0

从您提供的第二个链接运行 ./ike-scan.sh 脚本会导致:

    sudo ipsec stop
    sudo ./ike-scan.sh 103.76.22.130 | grep SA=
      SA=(Enc=3DES Hash=SHA1 Auth=PSK Group=2:modp1024 LifeType=Seconds LifeDuration(4)=0x00007080)
      SA=(Enc=3DES Hash=SHA1 Auth=PSK Group=14:modp2048 LifeType=Seconds LifeDuration(4)=0x00007080)
      SA=(Enc=AES Hash=SHA1 Auth=PSK Group=2:modp1024 KeyLength=128 LifeType=Seconds LifeDuration(4)=0x00007080)
      SA=(Enc=AES Hash=SHA1 Auth=PSK Group=14:modp2048 KeyLength=128 LifeType=Seconds LifeDuration(4)=0x00007080)
      SA=(Enc=AES Hash=SHA1 Auth=PSK Group=2:modp1024 KeyLength=192 LifeType=Seconds LifeDuration(4)=0x00007080)
      SA=(Enc=AES Hash=SHA1 Auth=PSK Group=14:modp2048 KeyLength=192 LifeType=Seconds LifeDuration(4)=0x00007080)
      SA=(Enc=AES Hash=SHA1 Auth=PSK Group=2:modp1024 KeyLength=256 LifeType=Seconds LifeDuration(4)=0x00007080)
      SA=(Enc=AES Hash=SHA1 Auth=PSK Group=14:modp2048 KeyLength=256 LifeType=Seconds LifeDuration(4)=0x00007080)

该 VPN 服务器的所有建议都被认为是弱的,因为它们使用 SHA1 和/或 modp1024。您能否尝试以下第 1 阶段和第 2 阶段算法:

  • Phase1 算法:aes256-sha1-modp2048,aes256-sha1-modp1024!
  • Phase2 算法:aes256-sha1!

我选择了 VPN 服务器为阶段 1 提供的两个最强提案。感叹号 ( !) 用于将 VPN 客户端限制为指定的提案,并且不包括 strongSwan 的默认提案。一些 VPN 服务器不喜欢被大量来自客户端的建议淹没。

于 2018-08-29T13:12:57.897 回答