Status Update
Comments
le...@gmail.com <le...@gmail.com> #2
ri...@gmail.com <ri...@gmail.com> #3
Thanks for reporting this!
bs...@gmail.com <bs...@gmail.com> #4
Same here, any update? Stuck at alpha02 for a long time.
br...@gmail.com <br...@gmail.com> #5
A few notes:
- Should be using
viewLifecyclerOwner.lifecycleScope
instead of justlifecycleScope
in aFragment
. - Cancellation is happening as a result of the fragment automatically paging over when they are initially created / added to viewpager2 (this is expected as far as I can tell)
- Right now
RemoteMediator
kind of acts as a dumb callback wheneverPagingSource
runs out of items to load, soREFRESH
error doesn't prevent remotePREPEND
/APPEND
. It's not clear to me yet whether it should or if we should change guidance to just handleAPPEND
. This is due to us changing the behavior of Remote REFRESH after the codelab was produced, so I'm very sorry for that. REFRESH is meant to handle any init that needs to happen, technically the initial network page fetch happens as a result of running out of items on the APPEND side.
e.g., Here is a modified sample from the opening post / #1's repro project that fixes the issue:
PageKeyedRemoteMediator.kt
override suspend fun load(
loadType: LoadType,
state: PagingState<Int, RedditPost>
): MediatorResult {
try {
// Get the closest item from PagingState that we want to load data around.
val loadKey = when (loadType) {
REFRESH -> {
db.withTransaction {
postDao.deleteBySubreddit(subredditName)
remoteKeyDao.deleteBySubreddit(subredditName)
}
return MediatorResult.Success(endOfPaginationReached = false)
}
PREPEND -> return MediatorResult.Success(endOfPaginationReached = true)
APPEND -> {
// Query DB for SubredditRemoteKey for the subreddit.
// SubredditRemoteKey is a wrapper object we use to keep track of page keys we
// receive from the Reddit API to fetch the next or previous page.
val remoteKey = db.withTransaction {
remoteKeyDao.remoteKeyByPost(subredditName)
}
when {
remoteKey == null -> null
// We must explicitly check if the page key is null after initial load, since the
// Reddit API informs the end of the list by returning null for page key, but
// passing a null key to Reddit API will fetch the initial page.
remoteKey.nextPageKey == null -> {
return MediatorResult.Success(endOfPaginationReached = true)
}
else -> remoteKey.nextPageKey
}
}
}
val data = redditApi.getTop(
subreddit = subredditName,
after = loadKey,
before = null,
limit = state.config.pageSize * 3
).data
val items = data.children.map { it.data }
db.withTransaction {
remoteKeyDao.insert(SubredditRemoteKey(subredditName, data.after))
postDao.insertAll(items)
}
return MediatorResult.Success(endOfPaginationReached = items.isEmpty())
} catch (e: IOException) {
return MediatorResult.Error(e)
} catch (e: HttpException) {
return MediatorResult.Error(e)
} catch (e: CancellationException) {
Log.d("RemoteMediator","$subredditName $loadType canceled")
throw e
}
}
bs...@gmail.com <bs...@gmail.com> #6
Will keep this bug open to track the decision on blocking RemoteMediator
PREPEND
/ APPEND
after remote REFRESH error and any possible updates to the Codelab / Github samples.
The inconvenience of blocking on REFRESH is going to surface via needing to call retry()
, but it's possible there's something better we can do to handle cancellation more gracefully since we don't want to keep creating new PagingData
and also support loading in the background. (the thing to change to control this is when you start collecting from Pager.flow
, and the scope collection happens in).
yo...@gmail.com <yo...@gmail.com> #7
I have a question about the modified sample. Shouldn't deleteByXXX
be moved to after redditApi
execute successfully?
The UI side will see blink twice in this sample: Show db cache first then disappeared, show data again after redditApi
successful and insert data. The user experience is pretty bad.
fs...@gmail.com <fs...@gmail.com> #8
To be clear the above sample is a workaround a deeper issue in Paging which isn't handling cancellation gracefully due to Remote REFRESH errors not blocking remote PREPEND / APPEND.
bh...@gmail.com <bh...@gmail.com> #9
I found that if using fragment.lifecycleScope.launchWhenResume to collect each page data then it will work normally. ViewPager2 FragmentStatePager will move fragment to onResume/onPause.
jn...@gmail.com <jn...@gmail.com> #10
Good to hear, I think we can still do a better job of handling cancellation and propagating remote state, e.g., if you have many pages in viewpager and flip back and forth I think you'll still eventually get stuck, since the collector on PagingData will get canceled and there's no invalidate signal to restart it without manually calling adapter.refresh()
.
ma...@gmail.com <ma...@gmail.com> #11
Branch: androidx-master-dev
commit c97e21810e49b3f8043c8d7c3951b16e8b38e6db
Author: Yigit Boyar <yboyar@google.com>
Date: Fri Oct 16 10:39:22 2020
Add priority to single runner
This CL adds ability to accept priority to SingleRunner.
It will be necessary for the new remote mediator implementation
where it will rely on single runner to cancel lower priority
requests.
Bug: 162252536
Test: SingleRunnerTest
Change-Id: I01351ac385b252f80ab6079d42f2cf0edf8d6667
M paging/common/src/main/kotlin/androidx/paging/SingleRunner.kt
M paging/common/src/test/kotlin/androidx/paging/SingleRunnerTest.kt
ya...@gmail.com <ya...@gmail.com> #12
Branch: androidx-master-dev
commit f86129d60bb33243d06837291f0e2bd0f26f4bd3
Author: Yigit Boyar <yboyar@google.com>
Date: Fri Oct 09 11:34:07 2020
RemoteMediatorAccessor Refactor
This CL changes how remote mediator and snapshots interact.
Previously, all calls to remote mediator were done in a
snapshot's scope and snapshot was also responsible to track
load states.
It created a problem where remote mediator calls would be
cancelled when snapshot is replaced by a newer one. It also
made the load state logic fairly complicated in PageFetcherSnapshot.
This CL de-couples the two as much as possible.
With this change, RemoteMediatorAcccessor uses the scope of
the `Pager.flow` collection instead of the scope from the
PageFetcherSnapshot. PageFetcherSnapshot is now only responsible
to send events to the accessor when it needs more data.
RemoteMediatorAccessor manages its own loading state.
We still need some syncronization between the two to ensure certain
load events are not dispatched before data is loaded (e.g. after a
pull to refresh, you don't want refresh state to go idle before the
new local data is loaded for UI consistency). This logic is now
handled by the PageFetcher where it appends the load states to each
insert page and for other events (loading, error), directly sends them
to the downstream.
Bug: 162252536
Test: RemoteMediatorAccessorTest, PageFetcherSnapshotTest
Relnote: "Paging will no longer cancel a `RemoteMediator#load` call
due to a page invalidation. It will also no longer make an
append/prepend load request, *if REFRESH is required*, until REFRESH
request completes successfully."
Change-Id: I6390be0c0c1073005456f928a2a8afa81c16d3ef
M paging/common/api/current.txt
M paging/common/api/public_plus_experimental_current.txt
M paging/common/api/restricted_current.txt
M paging/common/src/main/kotlin/androidx/paging/CachedPageEventFlow.kt
M paging/common/src/main/kotlin/androidx/paging/LoadStates.kt
M paging/common/src/main/kotlin/androidx/paging/MutableLoadStateCollection.kt
M paging/common/src/main/kotlin/androidx/paging/PageEvent.kt
M paging/common/src/main/kotlin/androidx/paging/PageFetcher.kt
M paging/common/src/main/kotlin/androidx/paging/PageFetcherSnapshot.kt
M paging/common/src/main/kotlin/androidx/paging/PageFetcherSnapshotState.kt
M paging/common/src/main/kotlin/androidx/paging/PagingDataDiffer.kt
M paging/common/src/main/kotlin/androidx/paging/RemoteMediator.kt
M paging/common/src/main/kotlin/androidx/paging/RemoteMediatorAccessor.kt
M paging/common/src/test/kotlin/androidx/paging/PageEventTest.kt
M paging/common/src/test/kotlin/androidx/paging/PageFetcherSnapshotStateTest.kt
M paging/common/src/test/kotlin/androidx/paging/PageFetcherSnapshotTest.kt
M paging/common/src/test/kotlin/androidx/paging/RemoteMediatorAccessorTest.kt
M testutils/testutils-paging/src/main/java/androidx/paging/RemoteMediatorMock.kt
fs...@gmail.com <fs...@gmail.com> #13
gv...@gmail.com <gv...@gmail.com> #14
ph...@googlemail.com <ph...@googlemail.com> #15
bs...@gmail.com <bs...@gmail.com> #16
rs...@gmail.com <rs...@gmail.com> #17
ji...@gmail.com <ji...@gmail.com> #18
ru...@gmail.com <ru...@gmail.com> #19
Connecting from another Android phone v2.3.5 to the same L2TP w ipsec psk works just fine. Please fix this bug ASAP!
ji...@gmail.com <ji...@gmail.com> #20
It is IPsec Xauth with PSK. Nexus S GSM running v4.0.3.
ja...@gmail.com <ja...@gmail.com> #21
tt...@gmail.com <tt...@gmail.com> #22
em...@craigsherriff.co.uk <em...@craigsherriff.co.uk> #23
cr...@gmail.com <cr...@gmail.com> #24
PPTP works fine but is obviously less secure.
All worked fine previously on 2.3.7
VPN Router is DrayTek Vigor 2830Vn plus.
pe...@gmail.com <pe...@gmail.com> #25
sh...@gmail.com <sh...@gmail.com> #26
bi...@gmail.com <bi...@gmail.com> #27
I confirmed that I'm able to connect to the VPN just fine using my phone (still running Gingerbread) while connected to the same wi-fi router as the Xoom, so it's absolutely not a router or connectivity issue.
vs...@gmail.com <vs...@gmail.com> #28
fs...@gmail.com <fs...@gmail.com> #29
mi...@gmail.com <mi...@gmail.com> #30
be...@gmail.com <be...@gmail.com> #31
nb...@gmail.com <nb...@gmail.com> #32
xb...@gmail.com <xb...@gmail.com> #33
be...@capitollien.com <be...@capitollien.com> #34
er...@gmail.com <er...@gmail.com> #35
xb...@gmail.com <xb...@gmail.com> #36
You can either insmod the module or reboot to get it loaded. The tun.ko
made anyconnect work, but I also have some other modules in the same dir,
that are suppose to help with the native vpn options. A simple google
search will point you in the correct direction if my method doesn't help
you.
On Jan 26, 2012 11:10 PM, <android@googlecode.com> wrote:
sh...@gmail.com <sh...@gmail.com> #37
sh...@gmail.com <sh...@gmail.com> #38
sh...@gmail.com <sh...@gmail.com> #39
sh...@gmail.com <sh...@gmail.com> #40
[Deleted User] <[Deleted User]> #41
Same Issue: With Android 3.2.1 it has always been possible to establish a VPN connection (L2TP/IPSec with PSK), on Android 4.0.3 the connection is rejected with a timeout error. ... very annoying!
Is there any information available on how and especially when this error is going to be fixed?
sh...@gmail.com <sh...@gmail.com> #42
nb...@gmail.com <nb...@gmail.com> #43
mt...@gmail.com <mt...@gmail.com> #44
he...@gmail.com <he...@gmail.com> #45
he...@gmail.com <he...@gmail.com> #46
ro...@gmail.com <ro...@gmail.com> #47
mp...@googlemail.com <mp...@googlemail.com> #48
syslog:
eb 3 13:15:01 neptun xl2tpd[1393]: Connection 4116 closed to 192.168.0.122, port 57384 (Timeout)
Feb 3 13:15:01 neptun xl2tpd[1393]: check_control: Received out of order control packet on tunnel -1 (got 1, expected 0)
Feb 3 13:15:01 neptun xl2tpd[1393]: handle_packet: bad control packet!
Feb 3 13:15:06 neptun xl2tpd[1393]: Maximum retries exceeded for tunnel 39949. Closing.
Feb 3 13:15:06 neptun xl2tpd[1393]: Unable to deliver closing message for tunnel 58809. Destroying anyway.
auth.log:
Feb 3 14:55:23 neptun pluto[1667]: "L2TP-PSK-NAT"[20] 192.168.0.122 #18: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Feb 3 14:55:23 neptun pluto[1667]: "L2TP-PSK-NAT"[20] 192.168.0.122 #18: malformed payload in packet
Feb 3 14:55:23 neptun pluto[1667]: | payload malformed after IV
Feb 3 14:55:23 neptun pluto[1667]: | ee 26 6c bb f8 0d e2 fe bf 11 0a aa ed 7e c7 98
Feb 3 14:55:23 neptun pluto[1667]: "L2TP-PSK-NAT"[20] 192.168.0.122 #18: sending notification PAYLOAD_MALFORMED to
I use
openswan 1:2.6.23+dfsg-1ubuntu1
xl2tpd 1.2.5+dfsg-1
pa...@gmail.com <pa...@gmail.com> #49
Server - behind NAT - running CentOS 6.2 x86_64 with Openswan-2.6.32-9.el6
Client - public IP - Nexus S with 4.0.3
Other reports of the same error on the Openswan mailinglist mentioned that their server was on a public IP address while their phone was behind NAT.
Here is the comment of Paul Wouters - one of the Openswan developers on the Openswan mailinglist:
Jan 18 13:27:38 vpnbox pluto[23572]: "ipsec-l2tp-roadwarrior"[135]
x.x.x.29 #69644: byte 7 of ISAKMP NAT-OA Payload must be zero, but is
not
There is either a bug in the openswan NAT-OA implementation, or one in
the android implementation. We have to check this on the RFC and see if
we can see what's going on there (
I hope you guys can fix this asap. If you have a fix I'll be happy to test it for you. Thanks!
la...@gmail.com <la...@gmail.com> #50
jo...@gmail.com <jo...@gmail.com> #51
ICS on Board VPN: Time out.
VPNC Widget from Android Market: Works great without problems...
I use the ICS-ROM form
(a soon fix would be REALLY great)
ga...@googlemail.com <ga...@googlemail.com> #52
ma...@gmail.com <ma...@gmail.com> #53
Thank you very much for recommending the VPNC Widget! I had a lot of issues connecting to our university IPSEC PSK auth (CISCO) VPN with the stock client. Strangely, stock VPN client did connect without any problems, but no data was transferred.
Now - with the VPNC Widget, everything works smooth! Awesome
Using Galaxy Nexus, ICS 4.0.3 AOPK Milestone 3, Francokernel 15.2
br...@gmail.com <br...@gmail.com> #54
xm...@gmail.com <xm...@gmail.com> #55
auth.log
Feb 8 20:10:16 localhost pluto[7325]: | payload malformed after IV
Feb 8 20:10:16 localhost pluto[7325]: | bb 4e aa 73 d8 7c 7f 3e 1b 69 a7 86 cb 95 90 cf
Feb 8 20:10:16 localhost pluto[7325]: "L2TP-PSK-NAT"[32] 121.0.29.206 #30: sending notification PAYLOAD_MALFORMED to
Feb 8 20:10:19 localhost pluto[7325]: "L2TP-PSK-NAT"[32] 121.0.29.206 #30: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Feb 8 20:10:19 localhost pluto[7325]: "L2TP-PSK-NAT"[32] 121.0.29.206 #30: malformed payload in packet
syslog
Feb 8 20:10:52 localhost xl2tpd[7691]: check_control: Received out of order control packet on tunnel -1 (got 1, expected 0)
Feb 8 20:10:52 localhost xl2tpd[7691]: handle_packet: bad control packet!
Feb 8 20:10:57 localhost xl2tpd[7691]: Maximum retries exceeded for tunnel 7459. Closing
jo...@gmail.com <jo...@gmail.com> #56
ma...@gmail.com <ma...@gmail.com> #57
wa...@gmail.com <wa...@gmail.com> #58
wa...@gmail.com <wa...@gmail.com> #59
I hope this can help some I have not yet tried this when using L2TP.
n-...@naftolijacobs.com <n-...@naftolijacobs.com> #60
re...@gmail.com <re...@gmail.com> #61
pe...@gmail.com <pe...@gmail.com> #62
Server - behind NAT - running Fedora 16 x86_64 with openswan-2.6.37-1.fc16
Client - public IP - Galaxy S with 4.0.3
pa...@gmail.com <pa...@gmail.com> #63
Google need to fix this, I went back to Honeycomb, and won't be buying any ics devices until this is fixed.
ma...@gmail.com <ma...@gmail.com> #64
ne...@gmail.com <ne...@gmail.com> #65
It's just annoying.
ba...@gmail.com <ba...@gmail.com> #66
kr...@gmail.com <kr...@gmail.com> #67
Otherwise I see the same behaviour reported in
ke...@gmail.com <ke...@gmail.com> #68
I use vpn daily, and this is a major problem form me. HELP!!!!
ke...@gmail.com <ke...@gmail.com> #69
ke...@gmail.com <ke...@gmail.com> #70
ke...@gmail.com <ke...@gmail.com> #71
gd...@gmail.com <gd...@gmail.com> #72
Issue not solved.
st...@googlemail.com <st...@googlemail.com> #73
ga...@gmail.com <ga...@gmail.com> #74
I also have a ZTE Blade phone with 2.3.5 and the VPN works fine.
da...@gmail.com <da...@gmail.com> #75
kr...@gmail.com <kr...@gmail.com> #76
It's still WIP, but you should be able to figure it out especially if you already have a {open,strong}swan installation (the only difference is racoon).
ma...@gmail.com <ma...@gmail.com> #77
ca...@gmail.com <ca...@gmail.com> #78
ma...@beck.im <ma...@beck.im> #79
bs...@gmail.com <bs...@gmail.com> #80
VPN client called "mobile Connect". It was made specify for ICS 4.0 and
higher. It works great for us sonicwall users! It's available in the app
world for free.
Note, do not download the Net extender as it won't work on ICS.
Hope all you other users get a VPN solution soon. I know how bad it sucks
not having it.
Take care
ka...@gmail.com <ka...@gmail.com> #81
This appears to be only a on network solution through SSL VPN, so if Im not on my companies network Im still SOL as far as connecting remotely to the VPN
jo...@ltjr.net <jo...@ltjr.net> #82
le...@ltjr.net <le...@ltjr.net> #83
Just loaded the latest OTA update 9.4.2.15, but hasn't fixed the problem.
Connecting to Sonicwall PRO 3060 running SonicOS Enhanced 4.2.1.3-4e
The Sonicwall logs indicate that phase 1 completes successfully. The Sonicwall receives a "Quick Mode request (phase 2)" and then receives another packet from the tablet. That packet generates an error: "Payload Processing failed ... VPN Policy: WAN GroupVPN; Payload Type: NATOA-RFC3947"
I see that there's an updated Sonicwall firmware available -- has anyone tried this with another Sonicwall firmware version?
For what it's worth, I can connect from my Mac and my Droid (Android 2.2) just fine.
I can't get VPNC to work either -- it completes phase 1, but then it just hangs. Any pointers on getting VPNC to work with Sonicwall?
al...@gmail.com <al...@gmail.com> #84
dr...@emailaccount.nl <dr...@emailaccount.nl> #85
de...@gmail.com <de...@gmail.com> #86
I get this in the syslog after connecting to an AVM Fritzbox 7170:
I/Vpn ( 194): Switched from [Legacy VPN] to [Legacy VPN]
I/Vpn ( 194): Switched from [Legacy VPN] to [Legacy VPN]
I/Vpn ( 194): Switched from [Legacy VPN] to [Legacy VPN]
V/LegacyVpnRunner( 194): Waiting
V/LegacyVpnRunner( 194): Executing
D/racoon (22949): Waiting for control socket
D/racoon (22949): Received 9 arguments
I/racoon (22949): ipsec-tools 0.8.0 (
W/JNIHelp ( 194): Discarding pending exception (java.io.IOException: Try again) to throw java/io/IOExceptionI/racoon (22949): 31.251.xxx.xxx[500] used for NAT-T
I/racoon (22949): 31.251.xxx.xxx[500] used as isakmp port (fd=10)
I/racoon (22949): 31.251.xxx.xxx[4500] used for NAT-T
I/racoon (22949): 31.251.xxx.xxx[4500] used as isakmp port (fd=11)
I/racoon (22949): initiate new phase 1 negotiation: 31.251.xxx.xxx[500]<=>79.228.xxx.xxx[500] I/racoon (22949): begin Aggressive mode.
I/LegacyVpnRunner( 194): AbortingI/LegacyVpnRunner( 194): java.lang.IllegalStateException: Time is up
I/LegacyVpnRunner( 194): at com.android.server.connectivity.Vpn$LegacyVpnRunner.checkpoint(Vpn.java:460)
I/LegacyVpnRunner( 194): at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:571)
I/LegacyVpnRunner( 194): at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:447)
E/racoon (22949): Connection is closed I/racoon (22949): Bye
al...@gmail.com <al...@gmail.com> #87
al...@gmail.com <al...@gmail.com> #88
Same bug on Samsung Galaxy S2 ICS 4.0.3
L2TP/IPSec Connection with PSK, on an OpenSwan server.
Here is what my auth.log says :
Mar 14 12:06:16 serverVpnIpsec pluto[24356]: "test"[15] 217.XXX.XXX.XXX #49: new NAT mapping for #49, was 217.XXX.XXX.XXX:44571, now 217.XXX.XXX.XXX:55271
Mar 14 12:06:16 serverVpnIpsec pluto[24356]: "test"[15] 217.XXX.XXX.XXX #49: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
Mar 14 12:06:16 serverVpnIpsec pluto[24356]: "test"[15] 217.XXX.XXX.XXX #49: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
Mar 14 12:06:16 serverVpnIpsec pluto[24356]: "test"[15] 217.XXX.XXX.XXX #49: received and ignored informational message
Mar 14 12:06:17 serverVpnIpsec pluto[24356]: "test"[15] 217.XXX.XXX.XXX #49: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Mar 14 12:06:17 serverVpnIpsec pluto[24356]: "test"[15] 217.XXX.XXX.XXX #49: malformed payload in packet
And here is what rfc 3947 (
The format of the NAT-OA packet is
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
+---------------+---------------+---------------+---------------+
| Next Payload | RESERVED | Payload length |
+---------------+---------------+---------------+---------------+
| ID Type | RESERVED | RESERVED |
+---------------+---------------+---------------+---------------+
| IPv4 (4 octets) or IPv6 address (16 octets) |
+---------------+---------------+---------------+---------------+
The payload type for the NAT original address payload is 21.
The ID type is defined in the [RFC2407]. Only ID_IPV4_ADDR and
ID_IPV6_ADDR types are allowed. The two reserved fields after the ID
Type must be zero.
The 7th byte should be 0 according to the RFC. Android is apparently not following this, thus giving an error with OpenSwan implementation of NAT-T.
With a Cisco ASA gateway, I haven't encountered this issues, maybe Cisco implementation is more tolerant regarding RSERVED bytes.
du...@gmail.com <du...@gmail.com> #89
byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Please fix this ASAP!
o....@gmail.com <o....@gmail.com> #90
de...@gmail.com <de...@gmail.com> #91
sc...@gmail.com <sc...@gmail.com> #92
sc...@gmail.com <sc...@gmail.com> #93
ch...@android.com <ch...@android.com> #94
ro...@gmail.com <ro...@gmail.com> #95
ch...@android.com <ch...@android.com> #96
it seems that ipsec-tools 0.8.0 introduced several compatibility issues. For example, NAT-OA in RFC 3947 was added in isakmp_quick.c:quick_i1send() in version 0.8.0. It should only affect NAT cases. If anyone can make his device out of NAT, such as over 3G, could you give it a try and let me know how it works? Thanks.
Hi lee@ltjr.net,
SonicWALL uses DHCP over IPSec (RFC 3456), which is currently not supported by ipsec-tools. What we do right now is mode-config.
ca...@gmail.com <ca...@gmail.com> #97
ch...@android.com <ch...@android.com> #98
ch...@android.com <ch...@android.com> #99
ri...@gmail.com <ri...@gmail.com> #100
ar...@gmail.com <ar...@gmail.com> #101
can you create a patch file to fix this problem ?
i don't know what are you talking about .
ch...@android.com <ch...@android.com> #102
eq...@gmail.com <eq...@gmail.com> #103
eq...@gmail.com <eq...@gmail.com> #104
eq...@gmail.com <eq...@gmail.com> #105
pa...@gmail.com <pa...@gmail.com> #106
Cheers
eq...@gmail.com <eq...@gmail.com> #108
eq...@gmail.com <eq...@gmail.com> #109
When do you give us a beta version to test? Thanks for your support.
mi...@gmail.com <mi...@gmail.com> #110
here is the associated log:
I/Vpn ( 190): Switched from [Legacy VPN] to [Legacy VPN]
V/LegacyVpnRunner( 190): Waiting
V/LegacyVpnRunner( 190): Executing
D/mtpd ( 4222): Waiting for control socket
I/LatinIME( 543): InputType.TYPE_NULL is specified
W/LatinIME( 543): Unexpected input class: inputType=0x00000000 imeOptions=0x00000000
D/mtpd ( 4222): Received 20 arguments
I/mtpd ( 4222): Using protocol pptp
I/mtpd ( 4222): Connecting to 72.28.97.3 port 1723 via eth0
I/mtpd ( 4222): Connection established (socket = 11)
D/mtpd ( 4222): Sending SCCRQ
D/mtpd ( 4222): Received SCCRP -> Sending OCRQ (local = 12191)
I/mtpd ( 4222): Tunnel established
D/mtpd ( 4222): Received OCRQ (remote = 46935)
I/mtpd ( 4222): Session established
I/mtpd ( 4222): Creating PPPoX socket
F/mtpd ( 4222): Socket() Protocol not supported
I/LegacyVpnRunner( 190): Aborting
I/LegacyVpnRunner( 190): java.lang.IllegalStateException: mtpd is dead
I/LegacyVpnRunner( 190): at com.android.server.connectivity.Vpn$LegacyVpnRunne r.execute(Vpn.java:569)
I/LegacyVpnRunner( 190): at com.android.server.connectivity.Vpn$LegacyVpnRunne r.run(Vpn.java:447)
ch...@android.com <ch...@android.com> #111
Your build is broken. Both VPN drivers were missing in your kernel, as shown in:
I/mtpd ( 4222): Creating PPPoX socket
F/mtpd ( 4222): Socket() Protocol not supported
You need PPPOLAC and PPPOPNS drivers.
pr...@gmail.com <pr...@gmail.com> #112
PPPOPNS and PPPOLAC are included in the kernel along with TUN.
ICS 4.0.3.
mtpd service line is in init. Is there anything else needed to get this going?
ch...@android.com <ch...@android.com> #114
Are you seeing the same error as Michael? If you know how to build a kernel, please also make sure that if_pppnlac.h, if_pppopns.h, and if_pppox.h in the kernel tree match the ones in bionic.
pr...@gmail.com <pr...@gmail.com> #115
Will log an attempt, and will also check those files out and reply back here (either tonight or tomorrow).
Thanks so much for the assistance.
ch...@android.com <ch...@android.com> #116
The drivers in your tree were out of date, so you got a mismatch between kernel space and user space. The latest drivers can be found from
pr...@gmail.com <pr...@gmail.com> #117
de...@gmail.com <de...@gmail.com> #118
Kinda annoying, no connection (even over wifi) to ANY VPN-server with the Galaxy Nexus and ICS 4.0.2
pr...@gmail.com <pr...@gmail.com> #119
pptp without encryption works without issue. with encryption is non working:
E/pppd ( 1981): MPPE required but peer negotiation failed
D/pppd ( 1981): Discarded non-LCP packet when LCP not open
D/pppd ( 1981): Discarded non-LCP packet when LCP not open
D/mtpd ( 1979): Recevied SLI
I/pppd ( 1981): Connection terminated.
W/Netd ( 111): No subsystem found in netlink event
D/NetlinkEvent( 111): Unexpected netlink message. type=0x11
l2tp with shared key is non working as well. l2tp is enabled.
D/mtpd ( 1963): Timeout -> Sending SCCRQ
I/racoon ( 1742): the packet is retransmitted by xx.xx.xx.x[500] (2).
and so on and so forth.
any thoughts? XFRM should be recent in my tree, and mppe falls under the backport.
thx.
pr...@gmail.com <pr...@gmail.com> #120
please get back to me when you can. eager to get this fixed up.
thx.
te...@gmail.com <te...@gmail.com> #121
Thx,
pr...@gmail.com <pr...@gmail.com> #122
l2tp over 3g works. l2tp over wifi doesnt work (timeout -> sccrq).
letting you know.
an...@gmail.com <an...@gmail.com> #123
ev...@gmail.com <ev...@gmail.com> #124
ak...@gmail.com <ak...@gmail.com> #125
ya...@gmail.com <ya...@gmail.com> #126
Can I know when you will submit the patch and we can get the fix?
le...@ltjr.net <le...@ltjr.net> #127
For what its worth, I just loaded the most recent OTA firmware upgrade from ASUS for my transformer prime (version 9.4.2.21) and still have this issue. Not surprised; seems like the work that Chia and others are doing is not fully baked yet.
Don't hesitte to email me if I can help.
Lee
hy...@gmail.com <hy...@gmail.com> #128
jm...@gmail.com <jm...@gmail.com> #129
ma...@gmail.com <ma...@gmail.com> #130
ti...@gmail.com <ti...@gmail.com> #131
[Deleted User] <[Deleted User]> #132
sa...@gmail.com <sa...@gmail.com> #133
sh...@gmail.com <sh...@gmail.com> #134
bi...@gmail.com <bi...@gmail.com> #135
eq...@gmail.com <eq...@gmail.com> #136
When can we get the patch of your fixed? We have been troubled for a long time, need your help. Thanks.
my...@gmail.com <my...@gmail.com> #137
xc...@gmail.com <xc...@gmail.com> #138
please fix this bug ASOP, it is crucial for the people who behind GFW.
家齊,freedom is waiting for your push!
vb...@gmail.com <vb...@gmail.com> #139
I have the same problems as everyone else above, when do you think it will be fixed? Should we rollback to 3.2.1.
ya...@gmail.com <ya...@gmail.com> #140
pi...@gmail.com <pi...@gmail.com> #141
ae...@gmail.com <ae...@gmail.com> #142
We bought tablets to access our servers in mobility... this is a CRUCIAL issue for us !
pa...@gmail.com <pa...@gmail.com> #143
te...@gmail.com <te...@gmail.com> #144
ne...@gmail.com <ne...@gmail.com> #145
Hope it will get fixed soon!
sh...@googlemail.com <sh...@googlemail.com> #146
With my old version 2.3.5 it works without any problems, now with ICS I get a timeout
[Deleted User] <[Deleted User]> #147
I wonder if there's a way we could compile a flashable zip with a new ipsec-tools.
ch...@gmail.com <ch...@gmail.com> #148
Samsung Nexus S - ICS 4.0.4 / SonicWall
Used to work flawlessly with GB 2.3.6!
ch...@gmail.com <ch...@gmail.com> #149
logcat log:
I/racoon ( 2673): IPsec-SA request for 124.248.205.110 queued due to no phase1 found.
I/racoon ( 2673): initiate new phase 1 negotiation: 10.109.143.112[500]<=>124.248.205.110[500]
I/racoon ( 2673): begin Identity Protection mode.
D/mtpd ( 2913): Timeout -> Sending SCCRQ
I/racoon ( 2673): received Vendor ID: DPD
I/racoon ( 2673): received Vendor ID: RFC 3947
I/racoon ( 2673): Selected NAT-T version: RFC 3947
I/racoon ( 2673): Hashing 124.248.205.110[500] with algo #2
I/racoon ( 2673): Hashing 10.109.143.112[500] with algo #2
I/racoon ( 2673): Adding remote and local NAT-D payloads.
I/racoon ( 2673): Hashing 10.109.143.112[500] with algo #2
I/racoon ( 2673): NAT-D payload #0 doesn't match
I/racoon ( 2673): Hashing 124.248.205.110[500] with algo #2
I/racoon ( 2673): NAT-D payload #1 verified
I/racoon ( 2673): NAT detected: ME
I/racoon ( 2673): KA list add: 10.109.143.112[4500]->124.248.205.110[4500]
I/racoon ( 2673): ISAKMP-SA established 10.109.143.112[4500]-124.248.205.110[4500] spi:9a914198c3c32791:0668bf416d52cbfa
D/dalvikvm( 395): GC_CONCURRENT freed 490K, 13% free 7350K/8391K, paused 4ms+11ms
D/mtpd ( 2913): Timeout -> Sending SCCRQ
I/racoon ( 2673): initiate new phase 2 negotiation: 10.109.143.112[4500]<=>124.248.205.110[4500]
I/racoon ( 2673): NAT detected -> UDP encapsulation (ENC_MODE 2->4).
E/racoon ( 2673): none message must be encrypted
D/mtpd ( 2913): Timeout -> Sending SCCRQ
E/racoon ( 2673): none message must be encrypted
D/dalvikvm( 395): GC_CONCURRENT freed 410K, 13% free 7329K/8391K, paused 3ms+11ms
D/mtpd ( 2913): Timeout -> Sending SCCRQ
E/racoon ( 2673): none message must be encrypted
D/mtpd ( 2913): Timeout -> Sending SCCRQ
I/racoon ( 2673): IPsec-SA expired: ESP/Transport 124.248.205.110[500]->10.109.143.112[500] spi=253661069(0xf1e8f8d)
W/racoon ( 2673): PF_KEY EXPIRE message received from kernel for SA being negotiated. Stopping negotiation.
D/mtpd ( 2913): Timeout -> Sending SCCRQ
D/dalvikvm( 395): GC_CONCURRENT freed 409K, 13% free 7329K/8391K, paused 5ms+10ms
D/mtpd ( 2913): Timeout -> Sending SCCRQ
D/mtpd ( 2913): Timeout -> Sending SCCRQ
D/mtpd ( 2913): Timeout -> Sending SCCRQ
D/mtpd ( 2913): Timeout -> Sending SCCRQ
D/dalvikvm( 395): GC_CONCURRENT freed 410K, 13% free 7329K/8391K, paused 3ms+9ms
D/mtpd ( 2913): Timeout -> Sending SCCRQ
D/mtpd ( 2913): Timeout -> Sending SCCRQ
D/mtpd ( 2913): Timeout -> Sending SCCRQ
D/dalvikvm( 395): GC_CONCURRENT freed 409K, 13% free 7330K/8391K, paused 4ms+10ms
D/mtpd ( 2913): Timeout -> Sending SCCRQ
I/LegacyVpnRunner( 168): Aborting
I/LegacyVpnRunner( 168): java.lang.IllegalStateException: Time is up
I/LegacyVpnRunner( 168): at com.android.server.connectivity.Vpn$LegacyVpnRunner.checkpoint(Vpn.java:460)
I/LegacyVpnRunner( 168): at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:572)
I/LegacyVpnRunner( 168): at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:447)
E/racoon ( 2673): Connection is closed
D/mtpd ( 2913): Timeout -> Sending SCCRQ
what's the problem with this
st...@gmail.com <st...@gmail.com> #150
Apr 20 14:55:59 corleone pluto[7179]: packet from
Apr 20 14:55:59 corleone pluto[7179]: packet from
Apr 20 14:55:59 corleone pluto[7179]: packet from
Apr 20 14:55:59 corleone pluto[7179]: packet from
Apr 20 14:55:59 corleone pluto[7179]: packet from
Apr 20 14:55:59 corleone pluto[7179]: packet from
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: responding to Main Mode from unknown peer 89.24.91.2
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: STATE_MAIN_R1: sent MR1, expecting MI2
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: STATE_MAIN_R2: sent MR2, expecting MI3
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: Main mode peer ID is ID_IPV4_ADDR: '10.75.114.229'
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: new NAT mapping for #11, was
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
Apr 20 14:55:59 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: received and ignored informational message
Apr 20 14:56:00 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:00 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:00 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:00 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:00 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:03 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:03 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:03 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:03 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:03 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:06 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:06 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:06 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:06 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:06 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:09 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:09 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:09 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:09 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:09 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:12 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:12 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:12 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:12 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:12 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:15 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:15 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:15 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:15 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:15 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:18 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:18 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:18 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:18 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:18 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:21 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:21 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:21 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:21 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:21 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:24 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:24 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:24 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:24 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:24 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:27 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:27 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:27 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:27 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:27 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:32 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:32 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:32 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:32 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:32 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:35 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:35 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:35 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:35 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:35 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:37 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:37 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:37 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:37 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:37 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:40 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:40 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:40 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:40 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:40 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:43 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:43 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:43 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:43 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:43 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:46 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:46 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:46 corleone pluto[7179]: | payload malformed after IV
Apr 20 14:56:46 corleone pluto[7179]: | 9c 25 f0 71 90 96 6d 89 96 12 19 d8 b0 cb 17 3e
Apr 20 14:56:46 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: sending notification PAYLOAD_MALFORMED to
Apr 20 14:56:49 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
Apr 20 14:56:49 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: malformed payload in packet
Apr 20 14:56:49 corleone pluto[7179]: "L2TP-PSK"[10] 89.24.91.2 #11: too many (17) malformed payloads. Deleting state
st...@gmail.com <st...@gmail.com> #151
nb...@gmail.com <nb...@gmail.com> #152
months with no fix for a key feature for business users. I have deplyed new
tablets to my remote sales force with instructions not to install any
firmware updates due to this issue. If they install the tablet cannot be
used to access the network. Also the firmware updates include manufacturer
bug fixes so i cant get those either. If it installs i cannot restore back
to honeycomb making the tablet useless for my users and forcing me to buy a
new one. I can understand bugs but a key networking feature being down for
three months with no fix. What do you expect people to do give up using
vpns all together? This is going to force business users away from android.
Sent from my Verizon Wireless 4G LTE DROID
ho...@gmail.com <ho...@gmail.com> #153
mp...@gmail.com <mp...@gmail.com> #154
ja...@gmail.com <ja...@gmail.com> #155
n8...@gmail.com <n8...@gmail.com> #156
te...@gmail.com <te...@gmail.com> #157
il...@gmail.com <il...@gmail.com> #158
L2TP over IPSEC to our Draytec Vigor 3200n results in timeout as seen via LogCat.
al...@gmail.com <al...@gmail.com> #159
The answer for L2TP is "Time out"
me...@gmail.com <me...@gmail.com> #160
me...@gmail.com <me...@gmail.com> #161
sh...@gmail.com <sh...@gmail.com> #162
de...@coswayne.org <de...@coswayne.org> #163
Can confirm two things with our L2TP/IPSEC-PSK VPN setup (Sonicwall):
1) VPN is NOT working from off-site: same Time-out error as others.
... however....
2) VPN connection IS working over on-site Wifi (Managed Sonicwall AP's)
af...@gmail.com <af...@gmail.com> #164
ro...@gmail.com <ro...@gmail.com> #165
bx...@gmail.com <bx...@gmail.com> #166
cr...@gmail.com <cr...@gmail.com> #167
When will google fix this bug?
ty...@gmail.com <ty...@gmail.com> #168
bx...@gmail.com <bx...@gmail.com> #169
Is there some one who has resoled the issue?
If have, please share your method, thanks.
pe...@gmail.com <pe...@gmail.com> #170
pe...@gmail.com <pe...@gmail.com> #171
ba...@gmail.com <ba...@gmail.com> #172
But thankfully I found an alternative, OpenVPN below and it works well with NO need to root the device if using ICS.
Hope this helps someone.
nb...@gmail.com <nb...@gmail.com> #173
See the link below to the playstore app download.
fr...@gmail.com <fr...@gmail.com> #174
sy...@gmail.com <sy...@gmail.com> #176
ch...@gmail.com <ch...@gmail.com> #177
It works like a charm on my Nexus S (not rooted)!
Thanks to the XDA community for this! Without them Android is completely useless!
Google you suck!
ou...@gmail.com <ou...@gmail.com> #178
Both L2TP/PSK and IPSec Xauth PSK
go...@gmail.com <go...@gmail.com> #179
V/LegacyVpnRunner( 2000): Waiting
V/LegacyVpnRunner( 2000): Executing
D/racoon (12505): Waiting for control socket
I/power ( 2000): *** release_dvfs_lock : lockType : 2
D/PowerManagerService( 2000): releaseDVFSLockLocked : all DVFS_MAX_LIMIT are released
D/PowerManagerService( 2000): mIsSipVisible : true
D/PowerManagerService( 2000): mIsSipVisible : false
D/racoon (12505): Received 10 arguments
I/racoon (12505): ipsec-tools 0.8.0 (
I/SurfaceFlinger( 1834): id=473 Removed idx=3 Map Size=5
I/SurfaceFlinger( 1834): id=473 Removed idx=-2 Map Size=5
I/racoon (12505): Bye
D/dalvikvm( 2118): GC_FOR_ALLOC freed 380K, 29% free 10252K/14279K, paused 20ms
D/PowerManagerService( 2000): onSensorChanged: light value: 1000
D/dalvikvm( 2118): GC_CONCURRENT freed 308K, 28% free 10379K/14279K, paused 2ms+2ms
I/SurfaceFlinger( 1834): id=474 Removed idx=3 Map Size=4
I/SurfaceFlinger( 1834): id=474 Removed idx=-2 Map Size=4
I/LegacyVpnRunner( 2000): Aborting
I/LegacyVpnRunner( 2000): java.lang.IllegalStateException: racoon is dead
I/LegacyVpnRunner( 2000): at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:569)
I/LegacyVpnRunner( 2000): at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:447)
I tried L2TP and that at least tries to make a connection.
Seems like racoon has a problem (it's dead).
am...@gmail.com <am...@gmail.com> #180
vpn conection made but never conected!!
anyone could conect vpn?
always say unsucces!!! pptp or l2tp
sorrry for google eith this update !!!!!!!!!!!!!1
pa...@gmail.com <pa...@gmail.com> #181
If you are using Openswan on the server side then there is a solution thanks to Red Hat's Paul Wouters. He has created a patch that works around the Android ICS ipsec-tools bug so a connection from Android ICS using L2TP/IPsec VPN with pre-shared keys or certificates works with Openswan on the server side (thanks Paul!).
The patch is attached. You need to apply it to the Openswan 2.6.38 sources and build and install it.
Let's hope the Android team will soon release a proper fix together with TLS client certificate authentication for the IMAP client :-)
jp...@gmail.com <jp...@gmail.com> #182
al...@gmail.com <al...@gmail.com> #184
on how to use FeatVPN client. Instructions are customized for Breakwall VPN service (which I use) but should work with other services too. I have successfully setup this client on my Android 4 device.
ma...@gmail.com <ma...@gmail.com> #185
tr...@gmail.com <tr...@gmail.com> #186
Kernel - 2.6.39.4
Build - 9.4.2.28-20120525
Plus faceunlock works too
ov...@gmail.com <ov...@gmail.com> #187
Is this fixed in Jelly Bean 4.1 ?
li...@gmail.com <li...@gmail.com> #188
au...@gmail.com <au...@gmail.com> #189
au...@gmail.com <au...@gmail.com> #190
au...@gmail.com <au...@gmail.com> #191
I had a try yesterday and my L2TP VPN worked well.
sc...@googlemail.com <sc...@googlemail.com> #192
But VPNCilla is a good solution until jelly bean is released.
he...@gmail.com <he...@gmail.com> #193
vi...@gmail.com <vi...@gmail.com> #194
Native VPN connects in 1 of 10 times. Type of server L2TP/IPSec PSK. Am I alove with that kind of problem?
ch...@gmail.com <ch...@gmail.com> #195
zi...@gmail.com <zi...@gmail.com> #196
se...@gmail.com <se...@gmail.com> #197
ka...@gmail.com <ka...@gmail.com> #198
he...@gmail.com <he...@gmail.com> #199
pb...@gmail.com <pb...@gmail.com> #200
st...@gmail.com <st...@gmail.com> #201
This issue is detected as the L2TP/IPSec VPN reconnect problem. Things are like this:
If you disconnect your L2TP/IPSec VPN for the first time, your VPN server might send you a 'informational' message but as racoon daemon dies too quickly once after the control socket is closed, this message could not be received for the last time connection. Your server keeps re-sending this 'informational' message with 'delete (SA)' command to your client for a short period (I tested with Cisco A5505 and found it keeps resending the message for 1.5 min), and within this time gap, if you kick start another connection, you would see failure... This is because the delete command would deletes your newly created SA negotiated by IKE ph2 immediately once your IPSec-SA is established.
I have fixed this issue myself with my racoon source code on both JellyBean and ICS (IPSec-tools 0.7.3 and 0.8.0).
bx...@gmail.com <bx...@gmail.com> #202
Did you merge the JB racoon changes to ICS?
If you can share your source code, it will be very good, thanks.
cl...@gmail.com <cl...@gmail.com> #203
st...@gmail.com <st...@gmail.com> #204
The way to try :
(1) make sure your phone is rooted
(2) adb push racoon /system/bin/
(3) adb shell chmod 777 /system/bin/racoon
(4) go ahead with your VPN connection.
This patch fixed 2 problems :
(a) Some VPN Server (eg.based on openswan) could not be connected using L2TP/IPSec VPN for ICS (JB has another solution and this is only for your ICS build)
(b) L2TP/IPSec VPN could not be RE-connected after last connection has been disconnected within a short while (about 1min) (This issue is still seen on both ICS and JB at present)
Thanks !
st...@gmail.com <st...@gmail.com> #205
Please make sure you back up your origin executable racoon first to avoid any trouble brought by incompatibility...
run
adb pull /system/bin/racoon {somewhere on your computer}
firstly.
If you failed (or even crashed) with my patch, you can restore it with the backup one :)
iv...@gmail.com <iv...@gmail.com> #206
Thank you! I tried patched racoon on Asus TF101G (ICS) with Checkpoint L2TP PSK vpn server and it resolved connection problem. Now I am able to use vpn again since I've upgraded to ICS.
gr...@gmail.com <gr...@gmail.com> #207
jo...@gmail.com <jo...@gmail.com> #208
sn...@gmail.com <sn...@gmail.com> #209
ad...@gmail.com <ad...@gmail.com> #210
do...@gmail.com <do...@gmail.com> #211
do...@gmail.com <do...@gmail.com> #212
My device:
Samsung Galaxy S3
Model SPH-L710
Android Version: 4.0.4
Kernel Version: 3.0.8-618049-user
Build #: IMM760D.L710VPALG2
2012:08:20-14:31:18 wahine pluto[7999]: "S_for doug"[4]
2012:08:20-14:31:18 wahine pluto[7999]: "S_for doug"[4] <my ip address>:16881 #3: ignoring informational payload, type IPSEC_INITIAL_CONTACT
2012:08:20-14:31:19 wahine pluto[7999]: "S_for doug"[4] <my ip address>:16881 #3: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
2012:08:20-14:31:19 wahine pluto[7999]: "S_for doug"[4] <my ip address>:16881 #3: malformed payload in packet
2012:08:20-14:31:19 wahine pluto[7999]: "S_for doug"[4] <my ip address>:16881 #3: sending encrypted notification PAYLOAD_MALFORMED
The Android is not following the VPN protocol and the connections fails.
iv...@gmail.com <iv...@gmail.com> #213
I am using ASUS TF101G, patched racoon and internet connection over wi-fi.
za...@gmail.com <za...@gmail.com> #214
ma...@gmail.com <ma...@gmail.com> #215
bf...@gmail.com <bf...@gmail.com> #216
Any updates on this issue ?
Going to try the racoon file fix.
lu...@gmail.com <lu...@gmail.com> #217
st...@gmail.com <st...@gmail.com> #218
Racoon is a good Ipsec solution,but it stopped maintaining for some time, however Android picked it as a daemon,I'm still working on it trying to introduce more features,like IKEV2,MOBIKE,etc...
ma...@gmail.com <ma...@gmail.com> #219
ma...@gmail.com <ma...@gmail.com> #220
n8...@gmail.com <n8...@gmail.com> #221
jo...@gmail.com <jo...@gmail.com> #222
in my VPN server logs. Two different Windows 7 PC's connect fine. This is not cool.
ma...@gmail.com <ma...@gmail.com> #223
Do all your instructions (post number 203). It works! VPN L2TP IPSec PSK
Regards from Russia!
pd...@gmail.com <pd...@gmail.com> #224
It works
We are able to use vpn again since we've upgraded to ICS with:
Galaxy S3 (GT-i9300) android 4.0.4
Galaxy Tab Note 10.1 (N8000) android 4.0.4
da...@gmail.com <da...@gmail.com> #225
da...@gmail.com <da...@gmail.com> #226
da...@gmail.com <da...@gmail.com> #227
I was having exactly the same problem as everyone above:
"L2TP-PSK-NAT"[16] 11.22.33.44#15: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not
"L2TP-PSK-NAT"[16] 11.22.33.44#15: malformed payload in packet
| payload malformed after IV
| 7c 98 58 d1 bd 64 bd 43 6f c3 5d 7c 19 e3 23 ef
"L2TP-PSK-NAT"[16] 11.22.33.44#15: sending notification PAYLOAD_MALFORMED to
But finally it works, thanks to you !!!! I just can't believe Google hasn't fixed that in ICS (I understand it seems to be fixed in JellyBean but many users do not have JB), VPN to L2TP/IpSec is a big deal for many business users.
fe...@googlemail.com <fe...@googlemail.com> #228
[1]
gs...@bbxy.net <gs...@bbxy.net> #229
se...@gmail.com <se...@gmail.com> #230
But iPhone(iOS6) doesn't work .......
z....@gmail.com <z....@gmail.com> #231
bo...@gmail.com <bo...@gmail.com> #232
Received my ICS 4.0.4 upgrade today from VZ on my Droid Bionic and I ended up here for all the VPN issues I was experiencing. Having a custom IpCop setup I didn't want to change the server side but the forces led me down that road unfortunately for the better actually. In short I had to change the ike and esp values on the firewall as security 'always' gets better over time so my old 3des setting no long worked with the new firmware. Just to be clear I am using the default "Basic VPN" within ICS.
See more here: h.t.t.p.s.:.//
Hope it helps at least one person.
Bo
zy...@gmail.com <zy...@gmail.com> #233
ca...@gmail.com <ca...@gmail.com> #234
ca...@gmail.com <ca...@gmail.com> #235
I have tried to install tun.ko but no tun is aviable for my kernel.
ch...@gmail.com <ch...@gmail.com> #236
Is there any hope to have a simple vpn client on Android? Any IPhone owner has it, any linux distribution has it.
I'm running 4.1.1 : no luck.
Should we wait 5.1.1?
gb...@gmail.com <gb...@gmail.com> #237
ma...@gmail.com <ma...@gmail.com> #238
ri...@gmail.com <ri...@gmail.com> #239
ma...@gmail.com <ma...@gmail.com> #240
cd...@gmail.com <cd...@gmail.com> #241
cd...@gmail.com <cd...@gmail.com> #242
gm...@gmail.com <gm...@gmail.com> #243
hk...@gmail.com <hk...@gmail.com> #244
sh...@gmail.com <sh...@gmail.com> #245
Device: XOOM MZ604 running Android 4.0.4 (Not rooted)
ju...@gmail.com <ju...@gmail.com> #246
After replacing racoon file with the one in coment #203 I still could not connect VPNs. I have assigned 777 permission to folder /data/misc/vpn and IT'S WORKING NOW
Thanks strawman
sh...@gmail.com <sh...@gmail.com> #247
pa...@gmail.com <pa...@gmail.com> #248
pa...@gmail.com <pa...@gmail.com> #249
jp...@gmail.com <jp...@gmail.com> #250
dh...@gmail.com <dh...@gmail.com> #251
sa...@gmail.com <sa...@gmail.com> #252
I tried implementing above patch on my Android MID- Mtk6575 Chinese Tablet.
Using ADB or terminal I was unable to chgrep hence i used root explorer to do so but still it is giving message unsuccessful.
I am connecting to Checkpoint VPN.
the error on the Firewall is as below:-
Information IKE: Main Mode Failed to match proposal:
Transform: AES-128, MD5, Pre-shared secret, Group 2 (1024 bit)
Reason: unsupported authentication method 65001
any help that can resolve this issue is highly appreciated, i am stuck with this from almost a week.
Best Regards
Sarfaraz
pa...@gmail.com <pa...@gmail.com> #253
za...@gmail.com <za...@gmail.com> #254
Phone: Samsung Galaxy Nexus
Android Version: 4.2.2
Build: JDQ39
Ubuntu Server L2TP VPN
Ubuntu - 13.04
openswan - 2.6.37-1
xl2tpd - 1.3.1
Note: VPN is listening behind a NAT router and so has NAT-T enabled.
Windows, iOS devices etc all connect fine to VPN. First phase to establish IPSec SA tunnel works fine, but then I see the following in server logs and phone disconnects.
Jun 23 19:17:39 sam xl2tpd[19176]: control_finish: Peer requested tunnel 38838 twice, ignoring second one.
Jun 23 19:17:40 sam xl2tpd[19176]: check_control: Received out of order control packet on tunnel -1 (got 1, expected 0)
Jun 23 19:17:40 sam xl2tpd[19176]: handle_packet: bad control packet!
Jun 23 19:17:44 sam xl2tpd[19176]: Maximum retries exceeded for tunnel 22505. Closing.
Jun 23 19:17:44 sam xl2tpd[19176]: Connection 38838 closed to 82.xx.xxx.xxx, port 52693 (Timeout)
Jun 23 19:17:49 sam xl2tpd[19176]: Unable to deliver closing message for tunnel 22505. Destroying anyway.
See the following in the logcat logs:
D/mtpd (23534): Received 20 arguments
I/mtpd (23534): Using protocol l2tp
I/mtpd (23534): Connecting to xxx.xx port 1701 via rmnet0
I/mtpd (23534): Connection established (socket = 11)
D/mtpd (23534): Sending SCCRQ (local_tunnel = 46743)
I/racoon (23237): IPsec-SA request for xx.xx.xx.xx queued due to no phase1 found.
I/racoon (23237): initiate new phase 1 negotiation: xx.xx.xx.xx[500]<=>xx.xx.xx.xx[500]
I/racoon (23237): begin Identity Protection mode.
I/racoon (23237): received Vendor ID: DPD
I/racoon (23237): received Vendor ID: RFC 3947
I/racoon (23237): Selected NAT-T version: RFC 3947
I/racoon (23237): Hashing xx.xx.xx.xx[500] with algo #2
I/racoon (23237): Hashing xx.xx.xx.xx[500] with algo #2
I/racoon (23237): Adding remote and local NAT-D payloads.
I/racoon (23237): Hashing xx.xx.xx.xx[500] with algo #2
I/racoon (23237): NAT-D payload #0 doesn't match
I/racoon (23237): Hashing xx.xx.xx.xx[500] with algo #2
I/racoon (23237): NAT-D payload #1 doesn't match
I/racoon (23237): NAT detected: ME PEER
I/racoon (23237): KA list add: xx.xx.xx.xx[4500]->xx.xx.xx.xx[4500]
I/racoon (23237): ISAKMP-SA established xx.xx.xx.xx[4500]-xx.xx.xx.xx[4500] spi:5fc60b957f8829b0:9b0e32fde3d20a33
I/racoon (23237): initiate new phase 2 negotiation: xx.xx.xx.xx[4500]<=>xx.xx.xx.xx[4500]
I/racoon (23237): NAT detected -> UDP encapsulation (ENC_MODE 2->4).
I/racoon (23237): Adjusting my encmode UDP-Transport->Transport
I/racoon (23237): Adjusting peer's encmode UDP-Transport(4)->Transport(2)
I/racoon (23237): IPsec-SA established: ESP/Transport xx.xx.xx.xx[0]->xx.xx.xx.xx[0] spi=141298307(0x86c0a83)
I/racoon (23237): IPsec-SA established: ESP/Transport xx.xx.xx.xx[4500]->xx.xx.xx.xx[4500] spi=1224951881(0x49034849)
D/mtpd (23534): Timeout -> Sending SCCRQ
D/mtpd (23534): Timeout -> Sending SCCRQ
D/mtpd (23534): Received SCCRP without valid challenge response
E/mtpd (23534): Protocol error
D/mtpd (23534): Sending STOPCCN
I/mtpd (23534): Mtpd is terminated (status = 4)
I/LegacyVpnRunner( 936): Aborting
I/LegacyVpnRunner( 936): java.lang.IllegalStateException: mtpd is dead
I/LegacyVpnRunner( 936): at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:792)
I/LegacyVpnRunner( 936): at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:671)
I/racoon (23237): Connection is closed
D/Vpn ( 936): setting state=DISCONNECTED, reason=exit
ya...@gmail.com <ya...@gmail.com> #255
The connection works fine when I use the internal IP address. But it will not connect when using it outside the network, although NAT is perfectly fine (it works with all my other devices, iOS, computers, etc). When using the external IP, it throws a timeout sending SCCRQ.
Here are both logs:
Using internal IP, connection is good
06-24 10:16:23.888 I/Vpn (495): Switched from [Legacy VPN] to [Legacy VPN]
06-24 10:16:23.888 D/Vpn (495): setting state=IDLE, reason=prepare
06-24 10:16:23.888 D/Vpn (495): setting state=CONNECTING, reason=startLegacyVpn
06-24 10:16:23.898 D/Vpn (495): setting state=CONNECTING, reason=execute
06-24 10:16:23.908 D/racoon (25845): Waiting for control socket
06-24 10:16:24.108 D/racoon (25845): Received 6 arguments
06-24 10:16:24.108 I/racoon (25845): ipsec-tools 0.7.3 (
06-24 10:16:24.198 I/racoon (25845): x.x.x.x[500] used as isakmp port (fd=10)
06-24 10:16:24.198 I/racoon (25845): x.x.x.x[500] used for NAT-T
06-24 10:16:24.198 I/racoon (25845): x.x.x.x[4500] used as isakmp port (fd=11)
06-24 10:16:24.198 I/racoon (25845): x.x.x.x[4500] used for NAT-T
06-24 10:16:24.228 D/mtpd (26140): Waiting for control socket
06-24 10:16:24.438 D/mtpd (26140): Received 20 arguments
06-24 10:16:24.438 I/mtpd (26140): Using protocol l2tp
06-24 10:16:24.438 I/mtpd (26140): Connecting to x.x.x.x port 1701 via wlan0
06-24 10:16:24.448 I/mtpd (26140): Connection established (socket = 11)
06-24 10:16:24.448 D/mtpd (26140): Sending SCCRQ (local_tunnel = 19498)
06-24 10:16:24.448 I/racoon (25845): IPsec-SA request for x.x.x.x queued due to no phase1 found.
06-24 10:16:24.448 I/racoon (25845): initiate new phase 1 negotiation: x.x.x.x[500]<=>x.x.x.x[500]
06-24 10:16:24.448 I/racoon (25845): begin Identity Protection mode.
06-24 10:16:24.458 I/racoon (25845): received Vendor ID: RFC 3947
06-24 10:16:24.458 I/racoon (25845): received Vendor ID: DPD
06-24 10:16:24.458 I/racoon (25845): received broken Microsoft ID: FRAGMENTATION
06-24 10:16:24.458 I/racoon (25845): Selected NAT-T version: RFC 3947
06-24 10:16:24.488 I/racoon (25845): Hashing x.x.x.x[500] with algo #2
06-24 10:16:24.488 I/racoon (25845): Hashing x.x.x.x[500] with algo #2
06-24 10:16:24.488 I/racoon (25845): Adding remote and local NAT-D payloads.
06-24 10:16:24.488 I/racoon (25845): Hashing x.x.x.126[500] with algo #2
06-24 10:16:24.488 I/racoon (25845): NAT-D payload #0 verified
06-24 10:16:24.488 I/racoon (25845): Hashing x.x.x.2[500] with algo #2
06-24 10:16:24.488 I/racoon (25845): NAT-D payload #1 verified
06-24 10:16:24.488 I/racoon (25845): NAT not detected
06-24 10:16:24.528 I/racoon (25845): ISAKMP-SA established x.x.x.126[500]-x.x.x.2[500] spi:4769f842e4c3cae7:7c4c07d502a809e4
06-24 10:16:25.529 I/racoon (25845): initiate new phase 2 negotiation: x.x.x.126[500]<=>x.x.x.2[500]
06-24 10:16:25.539 W/racoon (25845): ignore RESPONDER-LIFETIME notification.
06-24 10:16:25.539 I/racoon (25845): IPsec-SA established: ESP/Transport x.x.x.2[0]->x.x.x.126[0] spi=264567205(0xfc4f9a5)
06-24 10:16:25.539 I/racoon (25845): IPsec-SA established: ESP/Transport x.x.x.126[500]->x.x.x.2[500] spi=126150331(0x784e6bb)
06-24 10:16:26.450 D/mtpd (26140): Timeout -> Sending SCCRQ
06-24 10:16:26.781 D/mtpd (26140): Received SCCRP (remote_tunnel = 1280) -> Sending SCCCN
06-24 10:16:27.391 D/mtpd (26140): Received ACK -> Sending ICRQ (local_session = 37836)
06-24 10:16:27.391 I/mtpd (26140): Tunnel established
06-24 10:16:27.491 D/mtpd (26140): Received ICRP (remote_session = 8211) -> Sending ICCN
06-24 10:16:27.902 D/mtpd (26140): Received ACK
06-24 10:16:27.902 I/mtpd (26140): Session established
06-24 10:16:27.902 I/mtpd (26140): Creating PPPoX socket
06-24 10:16:27.902 I/mtpd (26140): Starting pppd (pppox = 12)
06-24 10:16:27.902 I/mtpd (26140): Pppd started (pid = 26146)
06-24 10:16:27.912 I/pppd (26146): Using PPPoX (socket = 12)
06-24 10:16:27.922 D/pppd (26146): using channel 3
06-24 10:16:27.922 I/pppd (26146): Using interface ppp0
06-24 10:16:27.922 I/pppd (26146): Connect: ppp0 <-->
06-24 10:16:30.965 I/pppd (26146): local IP address x.x.x.228
06-24 10:16:30.965 I/pppd (26146): remote IP address x.x.x.2
06-24 10:16:30.965 I/pppd (26146): primary DNS address x.x.x.2
06-24 10:16:30.965 I/pppd (26146): secondary DNS address 8.8.8.8
06-24 10:16:31.065 D/VpnJni (495): Route added on ppp0:
06-24 10:16:31.085 I/LegacyVpnRunner(495): Connected!
06-24 10:16:31.085 D/Vpn (495): setting state=CONNECTED, reason=execute
06-24 10:16:31.595 E/racoon (25845): unknown Informational exchange received.
Using external IP, no connection
06-24 10:07:33.504 D/Vpn (495): setting state=DISCONNECTED, reason=exit
06-24 10:07:33.504 I/Vpn (495): Switched from [Legacy VPN] to [Legacy VPN]
06-24 10:07:33.504 D/Vpn (495): setting state=IDLE, reason=prepare
06-24 10:07:33.504 I/Vpn (495): Switched from [Legacy VPN] to [Legacy VPN]
06-24 10:07:33.504 D/Vpn (495): setting state=IDLE, reason=prepare
06-24 10:07:33.504 D/Vpn (495): setting state=CONNECTING, reason=startLegacyVpn
06-24 10:07:33.504 D/Vpn (495): setting state=CONNECTING, reason=execute
06-24 10:07:33.514 D/racoon (24496): Waiting for control socket
06-24 10:07:33.714 D/racoon (24496): Received 6 arguments
06-24 10:07:33.714 I/racoon (24496): ipsec-tools 0.7.3 (
06-24 10:07:34.044 I/racoon (24496): x.x.x.x[500] used as isakmp port (fd=10)
06-24 10:07:34.044 I/racoon (24496): x.x.x.x[500] used for NAT-T
06-24 10:07:34.044 I/racoon (24496): x.x.x.x[4500] used as isakmp port (fd=11)
06-24 10:07:34.044 I/racoon (24496): x.x.x.x[4500] used for NAT-T
06-24 10:07:34.054 D/mtpd (24793): Waiting for control socket
06-24 10:07:34.275 D/mtpd (24793): Received 20 arguments
06-24 10:07:34.275 I/mtpd (24793): Using protocol l2tp
06-24 10:07:34.275 I/mtpd (24793): Connecting to
06-24 10:07:34.275 I/mtpd (24793): Connection established (socket = 11)
06-24 10:07:34.275 D/mtpd (24793): Sending SCCRQ (local_tunnel = 50517)
06-24 10:07:34.285 I/racoon (24496): IPsec-SA request for x.x.x.x queued due to no phase1 found.
06-24 10:07:34.285 I/racoon (24496): initiate new phase 1 negotiation: x.x.x.x[500]<=>x.x.x.x[500]
06-24 10:07:34.285 I/racoon (24496): begin Identity Protection mode.
06-24 10:07:34.295 I/racoon (24496): received Vendor ID: RFC 3947
06-24 10:07:34.295 I/racoon (24496): received Vendor ID: DPD
06-24 10:07:34.295 I/racoon (24496): received broken Microsoft ID: FRAGMENTATION
06-24 10:07:34.295 I/racoon (24496): Selected NAT-T version: RFC 3947
06-24 10:07:34.305 I/racoon (24496): Hashing x.x.x.x[500] with algo #2
06-24 10:07:34.305 I/racoon (24496): Hashing x.x.x.x[500] with algo #2
06-24 10:07:34.305 I/racoon (24496): Adding remote and local NAT-D payloads.
06-24 10:07:34.315 I/racoon (24496): Hashing x.x.x.x[500] with algo #2
06-24 10:07:34.315 I/racoon (24496): NAT-D payload #0 doesn't match
06-24 10:07:34.315 I/racoon (24496): Hashing x.x.x.x[500] with algo #2
06-24 10:07:34.315 I/racoon (24496): NAT-D payload #1 doesn't match
06-24 10:07:34.315 I/racoon (24496): NAT detected: ME PEER
06-24 10:07:34.315 I/racoon (24496): KA list add: x.x.x.x4500]->x.x.x.x[4500]
06-24 10:07:34.335 I/racoon (24496): ISAKMP-SA established x.x.x.x[4500]-x.x.x.x[4500] spi:36df33804849d65d:1e2eef6b0f125dfe
06-24 10:07:35.336 I/racoon (24496): initiate new phase 2 negotiation: x.x.x.x[4500]<=>x.x.x.x[4500]
06-24 10:07:35.336 I/racoon (24496): NAT detected -> UDP encapsulation (ENC_MODE 2->4).
06-24 10:07:35.346 E/racoon (24496): failed to pre-process packet.
06-24 10:07:36.287 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:37.888 E/racoon (24496): failed to pre-process packet.
06-24 10:07:38.288 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:38.899 E/racoon (24496): failed to pre-process packet.
06-24 10:07:40.280 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:40.861 E/racoon (24496): unknown Informational exchange received.
06-24 10:07:40.861 E/racoon (24496): failed to pre-process packet.
06-24 10:07:41.872 E/racoon (24496): failed to pre-process packet.
06-24 10:07:42.282 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:43.834 E/racoon (24496): failed to pre-process packet.
06-24 10:07:44.294 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:44.845 E/racoon (24496): failed to pre-process packet.
06-24 10:07:46.296 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:46.707 E/racoon (24496): failed to pre-process packet.
06-24 10:07:47.718 E/racoon (24496): failed to pre-process packet.
06-24 10:07:48.298 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:49.870 E/racoon (24496): failed to pre-process packet.
06-24 10:07:50.290 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:52.302 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:52.833 E/racoon (24496): failed to pre-process packet.
06-24 10:07:54.304 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:55.906 E/racoon (24496): failed to pre-process packet.
06-24 10:07:56.306 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:58.318 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:58.879 E/racoon (24496): failed to pre-process packet.
06-24 10:07:59.900 E/racoon (24496): failed to pre-process packet.
06-24 10:08:00.310 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:08:01.841 E/racoon (24496): failed to pre-process packet.
06-24 10:08:02.312 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:08:04.314 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:08:05.345 I/racoon (24496): IPsec-SA expired: ESP/Transport x.x.x.x[0]->x.x.x.x[0] spi=4241664(0x40b900)
06-24 10:08:05.345 W/racoon (24496): the expire message is received but the handler has not been established.
06-24 10:08:05.345 E/racoon (24496): x.x.x.x give up to get IPsec-SA due to time up to wait.
06-24 10:08:05.385 I/racoon (24496): Bye
ya...@gmail.com <ya...@gmail.com> #256
I've been trying for a long time to connect to my VPN (based on OS X Server) from my Android phone.
I have a couple logs. The VPN works fine when I use the internal IP address. But it will not connect when using it outside the network, although NAT is perfectly fine (it works with all my other devices, iOS, computers, etc). When using the external IP, it throws a timeout sending SCCRQ.
Here are both logs:
Using internal IP, connection is good
06-24 10:16:23.888 I/Vpn (495): Switched from [Legacy VPN] to [Legacy VPN]
06-24 10:16:23.888 D/Vpn (495): setting state=IDLE, reason=prepare
06-24 10:16:23.888 D/Vpn (495): setting state=CONNECTING, reason=startLegacyVpn
06-24 10:16:23.898 D/Vpn (495): setting state=CONNECTING, reason=execute
06-24 10:16:23.908 D/racoon (25845): Waiting for control socket
06-24 10:16:24.108 D/racoon (25845): Received 6 arguments
06-24 10:16:24.108 I/racoon (25845): ipsec-tools 0.7.3 (
06-24 10:16:24.198 I/racoon (25845): x.x.x.x[500] used as isakmp port (fd=10)
06-24 10:16:24.198 I/racoon (25845): x.x.x.x[500] used for NAT-T
06-24 10:16:24.198 I/racoon (25845): x.x.x.x[4500] used as isakmp port (fd=11)
06-24 10:16:24.198 I/racoon (25845): x.x.x.x[4500] used for NAT-T
06-24 10:16:24.228 D/mtpd (26140): Waiting for control socket
06-24 10:16:24.438 D/mtpd (26140): Received 20 arguments
06-24 10:16:24.438 I/mtpd (26140): Using protocol l2tp
06-24 10:16:24.438 I/mtpd (26140): Connecting to x.x.x.x port 1701 via wlan0
06-24 10:16:24.448 I/mtpd (26140): Connection established (socket = 11)
06-24 10:16:24.448 D/mtpd (26140): Sending SCCRQ (local_tunnel = 19498)
06-24 10:16:24.448 I/racoon (25845): IPsec-SA request for x.x.x.x queued due to no phase1 found.
06-24 10:16:24.448 I/racoon (25845): initiate new phase 1 negotiation: x.x.x.x[500]<=>x.x.x.x[500]
06-24 10:16:24.448 I/racoon (25845): begin Identity Protection mode.
06-24 10:16:24.458 I/racoon (25845): received Vendor ID: RFC 3947
06-24 10:16:24.458 I/racoon (25845): received Vendor ID: DPD
06-24 10:16:24.458 I/racoon (25845): received broken Microsoft ID: FRAGMENTATION
06-24 10:16:24.458 I/racoon (25845): Selected NAT-T version: RFC 3947
06-24 10:16:24.488 I/racoon (25845): Hashing x.x.x.x[500] with algo #2
06-24 10:16:24.488 I/racoon (25845): Hashing x.x.x.x[500] with algo #2
06-24 10:16:24.488 I/racoon (25845): Adding remote and local NAT-D payloads.
06-24 10:16:24.488 I/racoon (25845): Hashing x.x.x.126[500] with algo #2
06-24 10:16:24.488 I/racoon (25845): NAT-D payload #0 verified
06-24 10:16:24.488 I/racoon (25845): Hashing x.x.x.2[500] with algo #2
06-24 10:16:24.488 I/racoon (25845): NAT-D payload #1 verified
06-24 10:16:24.488 I/racoon (25845): NAT not detected
06-24 10:16:24.528 I/racoon (25845): ISAKMP-SA established x.x.x.126[500]-x.x.x.2[500] spi:4769f842e4c3cae7:7c4c07d502a809e4
06-24 10:16:25.529 I/racoon (25845): initiate new phase 2 negotiation: x.x.x.126[500]<=>x.x.x.2[500]
06-24 10:16:25.539 W/racoon (25845): ignore RESPONDER-LIFETIME notification.
06-24 10:16:25.539 I/racoon (25845): IPsec-SA established: ESP/Transport x.x.x.2[0]->x.x.x.126[0] spi=264567205(0xfc4f9a5)
06-24 10:16:25.539 I/racoon (25845): IPsec-SA established: ESP/Transport x.x.x.126[500]->x.x.x.2[500] spi=126150331(0x784e6bb)
06-24 10:16:26.450 D/mtpd (26140): Timeout -> Sending SCCRQ
06-24 10:16:26.781 D/mtpd (26140): Received SCCRP (remote_tunnel = 1280) -> Sending SCCCN
06-24 10:16:27.391 D/mtpd (26140): Received ACK -> Sending ICRQ (local_session = 37836)
06-24 10:16:27.391 I/mtpd (26140): Tunnel established
06-24 10:16:27.491 D/mtpd (26140): Received ICRP (remote_session = 8211) -> Sending ICCN
06-24 10:16:27.902 D/mtpd (26140): Received ACK
06-24 10:16:27.902 I/mtpd (26140): Session established
06-24 10:16:27.902 I/mtpd (26140): Creating PPPoX socket
06-24 10:16:27.902 I/mtpd (26140): Starting pppd (pppox = 12)
06-24 10:16:27.902 I/mtpd (26140): Pppd started (pid = 26146)
06-24 10:16:27.912 I/pppd (26146): Using PPPoX (socket = 12)
06-24 10:16:27.922 D/pppd (26146): using channel 3
06-24 10:16:27.922 I/pppd (26146): Using interface ppp0
06-24 10:16:27.922 I/pppd (26146): Connect: ppp0 <-->
06-24 10:16:30.965 I/pppd (26146): local IP address x.x.x.228
06-24 10:16:30.965 I/pppd (26146): remote IP address x.x.x.2
06-24 10:16:30.965 I/pppd (26146): primary DNS address x.x.x.2
06-24 10:16:30.965 I/pppd (26146): secondary DNS address 8.8.8.8
06-24 10:16:31.065 D/VpnJni (495): Route added on ppp0:
06-24 10:16:31.085 I/LegacyVpnRunner(495): Connected!
06-24 10:16:31.085 D/Vpn (495): setting state=CONNECTED, reason=execute
06-24 10:16:31.595 E/racoon (25845): unknown Informational exchange received.
Using external IP through DDNS, no connection. It does not matter if I do it connected to 3G or WiFi.
06-24 10:07:33.504 D/Vpn (495): setting state=DISCONNECTED, reason=exit
06-24 10:07:33.504 I/Vpn (495): Switched from [Legacy VPN] to [Legacy VPN]
06-24 10:07:33.504 D/Vpn (495): setting state=IDLE, reason=prepare
06-24 10:07:33.504 I/Vpn (495): Switched from [Legacy VPN] to [Legacy VPN]
06-24 10:07:33.504 D/Vpn (495): setting state=IDLE, reason=prepare
06-24 10:07:33.504 D/Vpn (495): setting state=CONNECTING, reason=startLegacyVpn
06-24 10:07:33.504 D/Vpn (495): setting state=CONNECTING, reason=execute
06-24 10:07:33.514 D/racoon (24496): Waiting for control socket
06-24 10:07:33.714 D/racoon (24496): Received 6 arguments
06-24 10:07:33.714 I/racoon (24496): ipsec-tools 0.7.3 (
06-24 10:07:34.044 I/racoon (24496): x.x.x.x[500] used as isakmp port (fd=10)
06-24 10:07:34.044 I/racoon (24496): x.x.x.x[500] used for NAT-T
06-24 10:07:34.044 I/racoon (24496): x.x.x.x[4500] used as isakmp port (fd=11)
06-24 10:07:34.044 I/racoon (24496): x.x.x.x[4500] used for NAT-T
06-24 10:07:34.054 D/mtpd (24793): Waiting for control socket
06-24 10:07:34.275 D/mtpd (24793): Received 20 arguments
06-24 10:07:34.275 I/mtpd (24793): Using protocol l2tp
06-24 10:07:34.275 I/mtpd (24793): Connecting to
06-24 10:07:34.275 I/mtpd (24793): Connection established (socket = 11)
06-24 10:07:34.275 D/mtpd (24793): Sending SCCRQ (local_tunnel = 50517)
06-24 10:07:34.285 I/racoon (24496): IPsec-SA request for x.x.x.x queued due to no phase1 found.
06-24 10:07:34.285 I/racoon (24496): initiate new phase 1 negotiation: x.x.x.x[500]<=>x.x.x.x[500]
06-24 10:07:34.285 I/racoon (24496): begin Identity Protection mode.
06-24 10:07:34.295 I/racoon (24496): received Vendor ID: RFC 3947
06-24 10:07:34.295 I/racoon (24496): received Vendor ID: DPD
06-24 10:07:34.295 I/racoon (24496): received broken Microsoft ID: FRAGMENTATION
06-24 10:07:34.295 I/racoon (24496): Selected NAT-T version: RFC 3947
06-24 10:07:34.305 I/racoon (24496): Hashing x.x.x.x[500] with algo #2
06-24 10:07:34.305 I/racoon (24496): Hashing x.x.x.x[500] with algo #2
06-24 10:07:34.305 I/racoon (24496): Adding remote and local NAT-D payloads.
06-24 10:07:34.315 I/racoon (24496): Hashing x.x.x.x[500] with algo #2
06-24 10:07:34.315 I/racoon (24496): NAT-D payload #0 doesn't match
06-24 10:07:34.315 I/racoon (24496): Hashing x.x.x.x[500] with algo #2
06-24 10:07:34.315 I/racoon (24496): NAT-D payload #1 doesn't match
06-24 10:07:34.315 I/racoon (24496): NAT detected: ME PEER
06-24 10:07:34.315 I/racoon (24496): KA list add: x.x.x.x4500]->x.x.x.x[4500]
06-24 10:07:34.335 I/racoon (24496): ISAKMP-SA established x.x.x.x[4500]-x.x.x.x[4500] spi:36df33804849d65d:1e2eef6b0f125dfe
06-24 10:07:35.336 I/racoon (24496): initiate new phase 2 negotiation: x.x.x.x[4500]<=>x.x.x.x[4500]
06-24 10:07:35.336 I/racoon (24496): NAT detected -> UDP encapsulation (ENC_MODE 2->4).
06-24 10:07:35.346 E/racoon (24496): failed to pre-process packet.
06-24 10:07:36.287 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:37.888 E/racoon (24496): failed to pre-process packet.
06-24 10:07:38.288 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:38.899 E/racoon (24496): failed to pre-process packet.
06-24 10:07:40.280 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:40.861 E/racoon (24496): unknown Informational exchange received.
06-24 10:07:40.861 E/racoon (24496): failed to pre-process packet.
06-24 10:07:41.872 E/racoon (24496): failed to pre-process packet.
06-24 10:07:42.282 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:43.834 E/racoon (24496): failed to pre-process packet.
06-24 10:07:44.294 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:44.845 E/racoon (24496): failed to pre-process packet.
06-24 10:07:46.296 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:46.707 E/racoon (24496): failed to pre-process packet.
06-24 10:07:47.718 E/racoon (24496): failed to pre-process packet.
06-24 10:07:48.298 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:49.870 E/racoon (24496): failed to pre-process packet.
06-24 10:07:50.290 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:52.302 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:52.833 E/racoon (24496): failed to pre-process packet.
06-24 10:07:54.304 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:55.906 E/racoon (24496): failed to pre-process packet.
06-24 10:07:56.306 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:58.318 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:07:58.879 E/racoon (24496): failed to pre-process packet.
06-24 10:07:59.900 E/racoon (24496): failed to pre-process packet.
06-24 10:08:00.310 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:08:01.841 E/racoon (24496): failed to pre-process packet.
06-24 10:08:02.312 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:08:04.314 D/mtpd (24793): Timeout -> Sending SCCRQ
06-24 10:08:05.345 I/racoon (24496): IPsec-SA expired: ESP/Transport x.x.x.x[0]->x.x.x.x[0] spi=4241664(0x40b900)
06-24 10:08:05.345 W/racoon (24496): the expire message is received but the handler has not been established.
06-24 10:08:05.345 E/racoon (24496): x.x.x.x give up to get IPsec-SA due to time up to wait.
06-24 10:08:05.385 I/racoon (24496): Bye
sa...@gmail.com <sa...@gmail.com> #257
ya...@gmail.com <ya...@gmail.com> #258
It works perfectly fine with any other of my devices (computers, iOS, etc) but would fail with my Android phones (tested with 2.3.6, 4.1.2, 4.2.2).
Attached you can find logfiles for connections from inside and outside the network.
su...@surak.eti.br <su...@surak.eti.br> #259
al...@gmail.com <al...@gmail.com> #260
hi...@gmail.com <hi...@gmail.com> #261
(1) switch your phone to "fly mode" if you use WiFi connection. Or
(2) use 3G connection
da...@gmail.com <da...@gmail.com> #262
Same problem? Google: Where are you?
b3...@gmail.com <b3...@gmail.com> #263
b3...@gmail.com <b3...@gmail.com> #264
when setting up the L2TP IPsec PSK connection i used the following settings
NAME: what ever you want to call it
type: L2TP/IPSec PSK
server address: the address of the vpn server your are connecting to
L2TP secret : IMPORTANT!! LEAVE THIS FIELD BLANK
IPSec Identifier: LEAVE BLANK
IPSec Pre-Shared Key: enter your pre-shared key
click save
now open your connection
enter your username for the connection
enter you L2TP password not your pre-shared password
tick the save box
click connect and see how that goes. THIS DID IT FOR ME.
if it still will not work try replace the racoon file, link in comment 203
let me know if this works and all your devices :)
b3...@gmail.com <b3...@gmail.com> #265
al...@gmail.com <al...@gmail.com> #266
I can't seem to find a way to contact Google, apparently the email contact are removed. It just doesn't feel right not being able to get a response from Google.
Someone please find a way to inform Google of this VPN issue! This topic has started since 2011 and the problem is still not solve!
cp...@gmail.com <cp...@gmail.com> #267
Sorry for the language but WTF is this still an issue after 3 years! Google, it's only hurting you not to address this as we are willing to allow Android devices at work but if we can't even connect to the VPN then forget it.
en...@gmail.com <en...@gmail.com> #268
Confirms the same problem.
Also confirm that #264 works!! Edit your VPN info, leave "L2TP Secret" blank, and it connects normally.
ma...@gmail.com <ma...@gmail.com> #269
ph...@gmail.com <ph...@gmail.com> #270
wi...@gmail.com <wi...@gmail.com> #271
[Deleted User] <[Deleted User]> #272
ar...@gmail.com <ar...@gmail.com> #273
vv...@gmail.com <vv...@gmail.com> #274
VPN: L2TP/IPSec PSW
The IOS and OSX can connect to VPN perfectly. But the problem is still remaining in Android
qa...@gmail.com <qa...@gmail.com> #275
ba...@gmail.com <ba...@gmail.com> #276
po...@gmail.com <po...@gmail.com> #277
I have the same problem of everybody here
I have Samsung galaxy note 5 version 7.0 and it impossible for me to set VPN on it !!
There is some issues?
Thank' s a lot.
Description
I'm going in settings > wireless > VPN.
The VPN is using L2tp - Ipsec with preshared keys. The vpn is still working with my tab (honeycomb 3.1).
I have check (and recheck) the passwords. I have a "Timeout" answer.
I have check a little on the VPN side, it is using xl2tp on Debian. The log just says:
check_control: Received out of order control packet on tunnel -1 (got 1, expected 0)