Obsolete
Status Update
Comments
ha...@gmail.com <ha...@gmail.com> #2
Note that the bug surfaced when I tried our app on android 5
sy...@google.com <sy...@google.com> #3
I'm also seeing this problem with our library IOCipher (https://github.com/guardianproject/IOCipher ). It all builds and works fine, until I switch the test suite from targeting android-15 to android-21, then running the tests on a android-19 (4.4.4) ROM. The NDK build uses r10d, and the IOCipher NDK build targeting android-7.
I found this workaround, which seems to work:
LOCAL_LDFLAGS += -fuse-ld=bfd
I found this workaround, which seems to work:
LOCAL_LDFLAGS += -fuse-ld=bfd
dh...@dheera.net <dh...@dheera.net> #4
please reopen if you still see this with r12.
dh...@dheera.net <dh...@dheera.net> #5
I've attached a sample setup-l2tp.sh file that can be used to setup a basic L2TP/IPSec PSK VPN for reproducing this bug.
0. Create a virtual machine somewhere for testing.
1. Edit IPSEC_PSK, VPN_USER, VPN_PASSWORD, PRIVATE_IP, PUBLIC_IP at the top of the file.
2. Run 'sudo ./setup-l2tp.sh'.
3. Verify that you can connect to your new L2TP/IPSec VPN from stock Android 5.x, Linux, MacOS, or ChromeOS, using the parameters you specified in step 1. Note that stock Windows will NOT work without registry setting modification to enable NAT traversal.
4. Now, connect to your new instance using a Nexus 6 running Android 6.0.1 and the connection will fail.
0. Create a virtual machine somewhere for testing.
1. Edit IPSEC_PSK, VPN_USER, VPN_PASSWORD, PRIVATE_IP, PUBLIC_IP at the top of the file.
2. Run 'sudo ./setup-l2tp.sh'.
3. Verify that you can connect to your new L2TP/IPSec VPN from stock Android 5.x, Linux, MacOS, or ChromeOS, using the parameters you specified in step 1. Note that stock Windows will NOT work without registry setting modification to enable NAT traversal.
4. Now, connect to your new instance using a Nexus 6 running Android 6.0.1 and the connection will fail.
sy...@google.com <sy...@google.com> #6
Hi,
Thanks for providing requested information, however a bug report from your end will help us to debug further. Below are the steps to generate and send bug report:
Android bug report
After reproducing the issue, press the volume up, volume down, and power buttons simultaneously. This will capture a bug report on your device in the “bug reports” directory. Attach this file to this issue.
Alternate method:
After reproducing the issue, navigate to developer settings, ensure ‘USB debugging’ is enabled, then enable ‘Bug report shortcut’. To take bug report, hold the power button and select the ‘Take bug report’ option.
Thanks...
Thanks for providing requested information, however a bug report from your end will help us to debug further. Below are the steps to generate and send bug report:
Android bug report
After reproducing the issue, press the volume up, volume down, and power buttons simultaneously. This will capture a bug report on your device in the “bug reports” directory. Attach this file to this issue.
Alternate method:
After reproducing the issue, navigate to developer settings, ensure ‘USB debugging’ is enabled, then enable ‘Bug report shortcut’. To take bug report, hold the power button and select the ‘Take bug report’ option.
Thanks...
vi...@gmail.com <vi...@gmail.com> #7
Hi,
I have noticed the same issue after upgrading from 5.1.1 to 6.0.1 on both my Nexus 7 (flo) and Moto G2 (titan). (I am still able to access it with devices not updated to Marshmallow or not using Android.)
I am trying to connect to a VPN on a TL-ER604W through L2TP/IPsec with PSK.
Could you please increase the priority of this issue as it is vital (for me and I think a few more people as well) to access the company network from abroad I am currently living in to be able to work from a distance?
Thank you.
I have noticed the same issue after upgrading from 5.1.1 to 6.0.1 on both my Nexus 7 (flo) and Moto G2 (titan). (I am still able to access it with devices not updated to Marshmallow or not using Android.)
I am trying to connect to a VPN on a TL-ER604W through L2TP/IPsec with PSK.
Could you please increase the priority of this issue as it is vital (for me and I think a few more people as well) to access the company network from abroad I am currently living in to be able to work from a distance?
Thank you.
sy...@google.com <sy...@google.com> #8
Hi vikingharcos,
Can you upload the bug report of the issue?
Thanks...
Can you upload the bug report of the issue?
Thanks...
dh...@dheera.net <dh...@dheera.net> #9
I'll provide a bug report in ~3 weeks when I return to the US. In the meantime I encourage others who have similar issues to provide their bug reports. Apologies for the delay.
jf...@gmail.com <jf...@gmail.com> #10
As requested, attached is a bug report immediately following two failed connection attempts from a recently wiped Nexus 9 running 6.0.1 with no apps installed. Confirmed still working on 5.1.
sy...@google.com <sy...@google.com> #11
Hi,
Thank you very much for getting back to us with the requested information. We are working on this issue and will provide updates as they are available.
Thanks...
Thank you very much for getting back to us with the requested information. We are working on this issue and will provide updates as they are available.
Thanks...
vi...@gmail.com <vi...@gmail.com> #12
Hi,
Sorry for not including the bugreport before. Not knowing what does it include I didn't want to compromise the company VPN, so I rebooted the mobile and set up a connection to a public VPNGate server, which failed the same way as ours (after about half minute it says the connection is unsuccesful), the router logs say that there are about 10 repeated IKE key exchanges per connection attempt so the reason might be a mismatch in the IKE proposals and options since Lollipop. (The strange thing is that the same VPNGate connection works now repeatedly but not our company VPN...)
At the moment I have a recent daily of Cyanogenmod with a custom kernel installed, but it behaves the same with vanilla AOSP and other kernels too.
Thanks!
Sorry for not including the bugreport before. Not knowing what does it include I didn't want to compromise the company VPN, so I rebooted the mobile and set up a connection to a public VPNGate server, which failed the same way as ours (after about half minute it says the connection is unsuccesful), the router logs say that there are about 10 repeated IKE key exchanges per connection attempt so the reason might be a mismatch in the IKE proposals and options since Lollipop. (The strange thing is that the same VPNGate connection works now repeatedly but not our company VPN...)
At the moment I have a recent daily of Cyanogenmod with a custom kernel installed, but it behaves the same with vanilla AOSP and other kernels too.
Thanks!
ni...@googlemail.com <ni...@googlemail.com> #13
Here the same! My HTC One M8 can't connect to my VPN with L2TP/PSK after upgrading to 6.0.
My old HTC One M7 with 5.0.2 is still able to connect the same VPN Server.
My old HTC One M7 with 5.0.2 is still able to connect the same VPN Server.
pa...@gmail.com <pa...@gmail.com> #14
ch...@gmail.com <ch...@gmail.com> #15
I'm having the same issue (Nexus 5 with 6.0.1 connecting to VPN router with L2TP PSK). I don't recall having this issue before upgrading to marshmallow.
The phone just shows connecting for a long time then times out with an unsuccessful message. My router doesn't show any VPN error in its log files at all - it shows some log activity when you first start a connection but then quickly stops and logs nothing, as though the device just stops communicating.
The phone just shows connecting for a long time then times out with an unsuccessful message. My router doesn't show any VPN error in its log files at all - it shows some log activity when you first start a connection but then quickly stops and logs nothing, as though the device just stops communicating.
al...@gmail.com <al...@gmail.com> #16
The same here, on a Draytek Router and a HTC M8.The connection wroked before the Update to Android 6.0.
ap...@gmail.com <ap...@gmail.com> #17
Here the same! My HTC One M8 can't connect to my VPN with L2TP/PSK after upgrading to 6.0.
gi...@gmail.com <gi...@gmail.com> #18
Am experiencing the same issue on 6.0.1 on a Nexus 5X.
pt...@gmail.com <pt...@gmail.com> #19
I have been having the same issue as described here. Since updating the software version to 6.0 on our Moto X Play devices (5 in total), all 5 cannot connect to l2tp VPN connection, with no related issue prior. There have been no issues connecting to our VPN with other devices. This was tested on both our VPN servers - 100% fail rate with the update to 6.0, 100% success rate on other operating systems.
I have not found how to extract a debug log from my device yet, but I will send it over when possible.
Please note that I have checked the logs on one of the VPN servers and the error that seems to stand out is: "VPN Decryption Failed - Pad error.". This is for a SonicOS device, alert ID 1388. I have also noticed that the VPN sees the ISP NAT IP for the connection rather than the local IPs, so I'm thinking maybe this is a DHCP issue, going outside the tunnel.
Successful connection: (VPN Policy: WAN GroupVPN; 172.18.0.0 / 255.255.255.0 -> 172.18.31.7)
Failed connection: (VPN Policy: WAN GroupVPN; [Public VPN Server IP] -> [Carrier-grade Nat Rfc6598 IP]).
I do have a log file near, but will not post it for security reasons. I could supply this file directly and after cleaning up the sensitive information if believed to help in resolving this.
I have not found how to extract a debug log from my device yet, but I will send it over when possible.
Please note that I have checked the logs on one of the VPN servers and the error that seems to stand out is: "VPN Decryption Failed - Pad error.". This is for a SonicOS device, alert ID 1388. I have also noticed that the VPN sees the ISP NAT IP for the connection rather than the local IPs, so I'm thinking maybe this is a DHCP issue, going outside the tunnel.
Successful connection: (VPN Policy: WAN GroupVPN; 172.18.0.0 / 255.255.255.0 -> 172.18.31.7)
Failed connection: (VPN Policy: WAN GroupVPN; [Public VPN Server IP] -> [Carrier-grade Nat Rfc6598 IP]).
I do have a log file near, but will not post it for security reasons. I could supply this file directly and after cleaning up the sensitive information if believed to help in resolving this.
8f...@gmail.com <8f...@gmail.com> #20
I too have a stock NEXUS 5 and NEXUS 7 running 6.0.1 and security patched to February 2016. It too fails an L2TP/IPSEC connection that did once work. According to openBSD (5.8), the "general error" is: message_negotiate_sa: no compatible proposal found.
Regardless of my server side proposal, the android responds with something completely different. Ask PSK, you offer RSA. Ask RSA, you offer CA/X509. It's like a table is skewed. This is true for enc and ah and keyex params.
Help.
Regardless of my server side proposal, the android responds with something completely different. Ask PSK, you offer RSA. Ask RSA, you offer CA/X509. It's like a table is skewed. This is true for enc and ah and keyex params.
Help.
pz...@gmail.com <pz...@gmail.com> #21
same issue here... Nexus 6P on 6.0.1
ro...@gmail.com <ro...@gmail.com> #22
I'm having the same problem (Samsung S3 i9300 with Android 6.0.1 connecting to VPN router with L2TP PSK). I've attached a ADB log file. I hope this helps!
jf...@gmail.com <jf...@gmail.com> #23
Can the priority on this get upgraded please? This bug makes it impossible for our staff to use their devices for work.
br...@gmail.com <br...@gmail.com> #24
Yeah, please upgrade the priority. All my android devices are nexus and have this problem so I'm having to use workarounds to do remote work.
gi...@gmail.com <gi...@gmail.com> #25
+1 from me, I would assume such a critical system feature being broken would have started with a higher priority. It's obvious that it's a used feature.
ni...@gmail.com <ni...@gmail.com> #26
Juste dead block for me
th...@gmail.com <th...@gmail.com> #27
Same problem on my Nexus 6p with 6.0.1 Works fine on Samsung s5 with android 5.0
Ye...@btopenworld.com <Ye...@btopenworld.com> #28
Driving me crazy. I can't do any work now on my Nexus7 if I'm not in the office. How can inability to use a secure connection be regarded as a 'small' priority? Please can the priority of this be increased, and can someone post back when a fix is likely? Many thanks
pt...@gmail.com <pt...@gmail.com> #29
I am in total agreement on the fact that this issue should have a higher priority. It is inexcusable that I cannot use my work device for work anymore.
sy...@google.com <sy...@google.com> #30
Thanks for updating with your inputs. I increased the priority for this issue and will update you as soon as possible...
go...@gmail.com <go...@gmail.com> #31
I came across this bug just today; we rarely use Android as a VPN client.
I'm reasonably certain this bug is a duplicate of:
https://code.google.com/p/android/issues/detail?id=194269
Android is requesting a SHA2 HMAC, but it is using a DRAFT version that is incompatible with the final RFC.
Operators who have libreswan on the server side can enable "sha2-truncbug=yes" but doing so will break all other clients that support the proper SHA2 HMAC.
I'm confused as to why this would be an issue, as Libreswan's documentation indicates that it affects very old platforms, such as "Linux before 2.6.33", unless the Android developers specifically enabled the DRAFT behavior.
I'm reasonably certain this bug is a duplicate of:
Android is requesting a SHA2 HMAC, but it is using a DRAFT version that is incompatible with the final RFC.
Operators who have libreswan on the server side can enable "sha2-truncbug=yes" but doing so will break all other clients that support the proper SHA2 HMAC.
I'm confused as to why this would be an issue, as Libreswan's documentation indicates that it affects very old platforms, such as "Linux before 2.6.33", unless the Android developers specifically enabled the DRAFT behavior.
rw...@gmail.com <rw...@gmail.com> #32
Issue is also present on the Samsung Galaxy S7, which uses Android 6.0.1.
Ye...@btopenworld.com <Ye...@btopenworld.com> #33
Just got the March security update - full of hope that Google development see security as important and this to be fixed but still no joy. Thanks heavens for Apple - at least they take security seriously. Just curious why the press haven't picked up on this yet. Does anyone know if 3rd party VPN clients get around this - the one I looked at just seemed to use the underlying Android code and still failed.
pz...@gmail.com <pz...@gmail.com> #34
The VPN issue here has nothing to do with the security update via google lol..
It's NordVPN that is having the issue being able to utilize Marshmallow properly..
3rd party VPN's work great with android...
It's NordVPN that is having the issue being able to utilize Marshmallow properly..
3rd party VPN's work great with android...
dh...@dheera.net <dh...@dheera.net> #35
@#33
I'm not sure what NordVPN uses but my own openswan/xl2tpd-based VPN works with Linux, MacOS, ChromeOS, Android 5.x, and Windows with registry modification to enable NAT traversal. It fails on Android 6.x. My setup can be reproduced by using the setup-l2tp.sh script I posted above, on a Ubuntu server (an EC2 instance running Ubuntu will do).
I'm not sure what NordVPN uses but my own openswan/xl2tpd-based VPN works with Linux, MacOS, ChromeOS, Android 5.x, and Windows with registry modification to enable NAT traversal. It fails on Android 6.x. My setup can be reproduced by using the setup-l2tp.sh script I posted above, on a Ubuntu server (an EC2 instance running Ubuntu will do).
ma...@gmail.com <ma...@gmail.com> #36
In your ipsec.conf file you should add three additions,
add ,aes256-sha2_256 to both ike= and phase2alg=
Then add a newline with sha2-truncbug=yes
reload ipsec
You should now be able to connect to your VPN. I've tested it on my Nexus 5x now, and works like a charm!
add ,aes256-sha2_256 to both ike= and phase2alg=
Then add a newline with sha2-truncbug=yes
reload ipsec
You should now be able to connect to your VPN. I've tested it on my Nexus 5x now, and works like a charm!
Ye...@btopenworld.com <Ye...@btopenworld.com> #37
NordVPN is a VPN service provider - I am not wanting to use a service provider, I am wanting to connect to my OWN business in-house VPN service using the standard Android VPN stack. I appreciate matsjoha's suggestions above, but not sure how I go about changing the IPsec config file on a Nexus Tablet. VPN worked in v5, and it's broken in V.6, so I don't think this is an issue elsewhere, but if someone can tell me how to change the IPsec.conf file (without rooting the device), then I am up for it.
ma...@gmail.com <ma...@gmail.com> #38
The IPsec config file is on the VPN-server, not the client.
ma...@gmail.com <ma...@gmail.com> #39
want to throw this Mobile to bin ...wht on earth marshmelwo came with with this shit ...
rp...@gmail.com <rp...@gmail.com> #40
when is this going to be fixed??? i still have this issue !
la...@gmail.com <la...@gmail.com> #41
Same Problem on S7 Edge with 6.0.1
Advise:
Some guy developed that with 2G Network in setup it works on his S7E, on mine not.
Advise:
Some guy developed that with 2G Network in setup it works on his S7E, on mine not.
am...@gmail.com <am...@gmail.com> #43
I use ExpressVPN and it was working perfectly fine before i updated my Samsung Note 5 to Android 6 (Marshmallow). I'm in China and nothing works without VPN. I don't understand when google will fix this issue!
ao...@gmail.com <ao...@gmail.com> #44
My unit is Nexus 7 with Android 6.01, using for casting with Chromecast to my TV. I cast from Nexus to the TV with normally no problems. But when I use VPN L2TP/IPSec, a paid service, and connect to SVT PLay in Sweden, I get the signal to my Nexus and can view the programs, even geo-limited, on the Nexus itself. But when I cast, it "hangs", the casting icon just blinks without sending the "content" from Nexus to the TV. On my laptop with Windows 10, everything works. When will this issue be done? I don´t know how to get out a bug report from my Nexus. If you instruct me I can send the latest one to you. My mail adress is aow.soderlund@gmail.com. Kind regards from Arne Söderlund/Portimao/Portugal.
sl...@gmail.com <sl...@gmail.com> #45
I am experiencing this myself on my Nexus 6 and Nexus 7 that both have Android 6.0.1 as well as my daughter's Cyanogenmod tablet that has the equivalent of Android 6.0 on it.
My l2tp/IPsec server is my private router running OpenBSD 5.8 using isakmpd/npppd.
It was working some time prior to November of last year (don't use this VPN feature frequently). And now it only works on my son's not yet upgraded tablet that still runs Android 5.0.x, Chromebook fully updated, work iPhone running latest iOS 9.3 as well as Windows 10 computer. But I originally setup my VPN access to home for my phone and tablet to use securely while on work WiFi or on any other WiFi I do not trust.
I noticed that any combination of authentication MAC makes almost no difference, as does the encryption algorithm so long as you specify Diffie Hellman group size of 1024 (while all other clients including Chromebook support 2048).
What's even more perplexing is that the Chromebook will only work despite the DH group size of 2048 only with hmac-md5 rather than any of the sha's.
When I pick a workable set of proposals for my Nexus 6 or Nexus 7, I get no IPsec errors in the log and my OpenBSD server logs a valid IPsec SA established and I can see the flows, no traffic appears on enc0 and npppd never see's a connection attempt. However a tcpdump on the external interface shows the Nexus device sending some kind of encrypted traffic that apparently the OpenBSD box considers invalid and silently drops. It's not caused by overzealous firewalling as nothing related shows up in pflog0 when I tcpdump that either.
I would really appreciate this getting fixed and preferably bumping support for the Diffie Hellman group size to at least 2048 so I can run a single config that's compatible with most everything except the Chromebook.
Thanks!
My l2tp/IPsec server is my private router running OpenBSD 5.8 using isakmpd/npppd.
It was working some time prior to November of last year (don't use this VPN feature frequently). And now it only works on my son's not yet upgraded tablet that still runs Android 5.0.x, Chromebook fully updated, work iPhone running latest iOS 9.3 as well as Windows 10 computer. But I originally setup my VPN access to home for my phone and tablet to use securely while on work WiFi or on any other WiFi I do not trust.
I noticed that any combination of authentication MAC makes almost no difference, as does the encryption algorithm so long as you specify Diffie Hellman group size of 1024 (while all other clients including Chromebook support 2048).
What's even more perplexing is that the Chromebook will only work despite the DH group size of 2048 only with hmac-md5 rather than any of the sha's.
When I pick a workable set of proposals for my Nexus 6 or Nexus 7, I get no IPsec errors in the log and my OpenBSD server logs a valid IPsec SA established and I can see the flows, no traffic appears on enc0 and npppd never see's a connection attempt. However a tcpdump on the external interface shows the Nexus device sending some kind of encrypted traffic that apparently the OpenBSD box considers invalid and silently drops. It's not caused by overzealous firewalling as nothing related shows up in pflog0 when I tcpdump that either.
I would really appreciate this getting fixed and preferably bumping support for the Diffie Hellman group size to at least 2048 so I can run a single config that's compatible with most everything except the Chromebook.
Thanks!
ph...@gmail.com <ph...@gmail.com> #46
Same issue on a stock samsung galayx s7 and a nexus 5 with cm13. L2tp/ipsec psk - try to connect but no log entry on a mikrotik routerbard. Test with same vpn on a samsung galaxy s3 is successful.
jo...@gmail.com <jo...@gmail.com> #47
Same issue on a Samsung Galaxy S6 with Android 6.0.1.
ne...@gmail.com <ne...@gmail.com> #48
I had an update in the past week on my samsung s6 and it works fine. Android 6.0.1
aw...@gmail.com <aw...@gmail.com> #49
Doesn't work on my Samsung S6 on Marshmallow 6.0.1 either.
Works on my Samsung S4 on Lollipop 5.1
Both connecting to DrayTek router.
Works on my Samsung S4 on Lollipop 5.1
Both connecting to DrayTek router.
rh...@gmail.com <rh...@gmail.com> #50
LG G4 Android 6.0 it doesn't work as well.
ni...@gmail.com <ni...@gmail.com> #51
Same issue on Nexus 6 cm13 build 20160325 (6.0.1)
ta...@gmail.com <ta...@gmail.com> #52
samsung s6 edge android 6.0.1. same issue can't connect to any VPN services.
at...@gmail.com <at...@gmail.com> #53
Same on Samsung S7 6.0.1. I'm not surprised Android team broke something again. VPN is a business feature, try to at least test things before pushing to public. Cost me 2 hours of debugging and googling to figure out what's wrong with my VPN server.
yo...@gmail.com <yo...@gmail.com> #54
[Comment deleted]
Ye...@btopenworld.com <Ye...@btopenworld.com> #55
SYA - any update on whether anyone is looking into this? Interesting comment in #53 by atskiiso re VPN being a business feature - the absence of VPN means I cannot use my new Android devices for business. Even when Google fix it, I figure it could be months before the manufacturers incorporate the fix into their builds..
a....@googlemail.com <a....@googlemail.com> #56
nexus 5/6 with the same problem! We 've been waiting 6 months on an update of google . google ignores the problem easy! we will switch to iphone , as does the vpn !
al...@gmail.com <al...@gmail.com> #57
Why does this issue still have priority "small" when in post #29 the owner aid it had been increased?
sy...@google.com <sy...@google.com>
di...@gmail.com <di...@gmail.com> #58
Doesn't work on my Samsung S6 on Marshmallow 6.0.1 either. Did work on Lollipop.
Works on my Samsung S3, no problem.
Could not get it to work on L2tp/ipsec psk or OpenVPN.
Works on my Samsung S3, no problem.
Could not get it to work on L2tp/ipsec psk or OpenVPN.
di...@gmail.com <di...@gmail.com> #59
Update for Android 6.0.1 OpenVPN (OpenVPN client free):
When the battery saving option is off the OpenVPN connection is working again. This is 100% reproducible by switching the battery saving option on and off.
Still no luck (battery saving toggle does not affect) for the L2tp/ipsec psk connections though.
When the battery saving option is off the OpenVPN connection is working again. This is 100% reproducible by switching the battery saving option on and off.
Still no luck (battery saving toggle does not affect) for the L2tp/ipsec psk connections though.
a....@googlemail.com <a....@googlemail.com> #60
it does not work with Nexus 6 ( 6:01 . ) !!! Last stand : windows phone 10 : VPN L2TP = no problems !!! IOS > 8.0 : VPN L2TP = no problems !!! Android > = 6 does nothing !!! We have a lot of business accounts with Goggle and currently more than 80 % of our employees are mobile Unable to work !!! This is not an option !!!
a....@googlemail.com <a....@googlemail.com> #61
[Comment deleted]
a....@googlemail.com <a....@googlemail.com> #62
[Comment deleted]
a....@googlemail.com <a....@googlemail.com> #63
I have the impression that you develop your toy phones just for kids .....
sh...@gmail.com <sh...@gmail.com> #64
Hi, i've the same problem wit nexus 6p. Connexion impossible L2TP and PPTP
By cons, if I use the phone to share the wifi connection with my computer and I turn the VPN on the computer no worries.
By cons, if I use the phone to share the wifi connection with my computer and I turn the VPN on the computer no worries.
rd...@outlook.com <rd...@outlook.com> #65
Same problem on Nexus 6 and LG G5, both on 6.0.1
ig...@ramadas.net <ig...@ramadas.net> #66
Honor 7 running EMUI 4.0 (Android 6.0) also having issues :-(
um...@gmail.com <um...@gmail.com> #67
Samsung Galaxy S4 (5.1.1) = OK
Samsung Galaxy S6 (6.0.1) = FAIL
LG G4 (5.1.1) = OK
Seems it is in the Android 6.
Samsung Galaxy S6 (6.0.1) = FAIL
LG G4 (5.1.1) = OK
Seems it is in the Android 6.
al...@gmail.com <al...@gmail.com> #68
No change after the recent April update. So much for being "critical" :D
sl...@gmail.com <sl...@gmail.com> #69
I have found a work around. If you can force your VPN server (assuming you
are in control of it the way I am with mine), and can force it to use SHA1
instead of SHA2 then it works. It seems the version of SHA2-256 that
Android 6.x.x is using is an older draft specification and the one
implemented in many other IPsec implementations uses the official SHA2-256
implementation with the correct padding and whatever else.
Has anyone else tried this? I have it set on my server and works with both
new and old Android. Though I am not fond of having to intentionally
weaken my security strength by having to run an older hash algorithm but
considering we can't use Diffie Hellman group larger than 1024 bits anyhow,
seems like a moot point.
Sly
are in control of it the way I am with mine), and can force it to use SHA1
instead of SHA2 then it works. It seems the version of SHA2-256 that
Android 6.x.x is using is an older draft specification and the one
implemented in many other IPsec implementations uses the official SHA2-256
implementation with the correct padding and whatever else.
Has anyone else tried this? I have it set on my server and works with both
new and old Android. Though I am not fond of having to intentionally
weaken my security strength by having to run an older hash algorithm but
considering we can't use Diffie Hellman group larger than 1024 bits anyhow,
seems like a moot point.
Sly
ch...@gmail.com <ch...@gmail.com> #70
After the switch to 6.0.1 my VPN connection didn't work anymore. It turned out that the power saving mode was the culprit. Once I added my vpn app to the apps that cannot be optimized my VPN connection worked again.
Ye...@btopenworld.com <Ye...@btopenworld.com> #71
#71 - I thought the problem is in the base Android Kernel. What specific 'app' or function are you excluding from optimization? I am not using any add-on app, I (and it seems some others) are using the base Android function to (try to) access a router (over which I/we have no control)
th...@gmail.com <th...@gmail.com> #72
Having the same setup and the same problem. Nexus 6, Android 6.0.1. L2tp/ipsec psk never worked on my Nexus 6 since I bought it one year ago. :-(
ma...@gmail.com <ma...@gmail.com> #73
I have the same problem after upgrade to 6.0 on my stock samsung galaxy s6 android (now)6.0.1. Did not change my configuration and other devices still work. Workt perfectly on android 5.x. problems started the minute after the upgrade to 6.0.
L2tp/ipsec psk is my protocol
L2tp/ipsec psk is my protocol
ne...@gmail.com <ne...@gmail.com> #74
Another software update last night on my samsung galaxy s6 and pleased to say my vpn (ipvanish ) continues to work with no issues.
ma...@gmail.com <ma...@gmail.com> #75
I also got the security update of 01 march '16. L2tp/ipsec psk still not working on the galaxy s6 android 6.0.1
th...@gmail.com <th...@gmail.com> #76
@Neil do you have a reference to the changelog of your update?
April security update is also not fixing the VPN for me (not that I had expected that).
April security update is also not fixing the VPN for me (not that I had expected that).
Ye...@btopenworld.com <Ye...@btopenworld.com> #78
Does ipvanish use L2TP IPSEK PSK? The only info I could find referred to PPTP which does not encrypt passwords for initial session setup so is in itself a security exposure. Maybe as a public service they are ok with that but if you are connecting to your own VPN servers then PPTP is a very very bad idea. We got PPTP to work but it's too great an exposure to our internal network.
al...@gmail.com <al...@gmail.com> #79
If this an example of the degree of urgency that so-called 'critical' updates are given, I'd hate to see what happens to ones of a lesser urgency!
There doesn't seem to be any resource constraints within Google's software development team that prevent them from implementing numerous random and confusing changes to Android apps with alarming regularity though.
There doesn't seem to be any resource constraints within Google's software development team that prevent them from implementing numerous random and confusing changes to Android apps with alarming regularity though.
de...@protonmail.com <de...@protonmail.com> #80
Like everyone above, my L2TP/IPSEC with PSK works perfectly fine on all my other devices and my HTC m7 with Android 5.0; I _NEED_ VPN to work for effective running of my business; right now I'm using my phone as a hotspot to relay the VPN connection from an iPad. Can we PLEASE get this fixed ASAP? By the way, the "power saving" trick described above doesn't work for me; I'm using the Android VPN utility (in Settings/More Connection Settings) that came with the Galaxy S7. Haven't tried shifting to SHA1 yet.
th...@gmail.com <th...@gmail.com> #81
I'm on a Moto X Pure and I'm having the same issue since running an upgrade.
nk...@gmail.com <nk...@gmail.com> #82
The vpn doesn't work anymore in my note 5 after the update 6.0.1 anyone have a solution for this issue ??
Ye...@btopenworld.com <Ye...@btopenworld.com> #83
#83 nkq18, and #81 deanecox. I hit this issue last December. My fix was to buy Iphones for us all (okay, I'm a small business so it was only 4). They just work and we've had zero issues - with hindsight I have secured 6 months of productivity so it was a good decision. We still have some Android devices but due to remote access issues they are not much use anymore. I will never buy Android again - maybe this is why most of my corporate clients are switching from BB to Appl. Much as I hate proprietary Apple and it's cost, I cannot believe Apple would have taken 6 months to do basically nothing on a security glitch. Google clearly do not take security seriously, nor business reliability.
al...@gmail.com <al...@gmail.com> #84
This is a critical bug that impacts (not only) businesses running Android 6. Is there any chance this gets fixed after almost half a year after reporting?
This bug is a no-go for Android in business use. What do you expect your users to do? Switch to an extremely unsecure PPTP VPN?
This bug is a no-go for Android in business use. What do you expect your users to do? Switch to an extremely unsecure PPTP VPN?
bu...@gmail.com <bu...@gmail.com> #85
I WAS happy when my lenovo P1 Vibe upgraded MM 6.0.1. But now because of this bug I cannot connect to my work VPN, thanks google!
Is there any workaround solution other than changing server side configuration?
Is there any workaround solution other than changing server side configuration?
al...@gmail.com <al...@gmail.com> #86
FYI I managed to get around this on my Synology RT1900AC router by editing the ipsec.conf file as outlined in post #35. I didn't have an ike= or phase2alg= line, so only needed to change sha2-truncbug= from no to yes and reboot, and it works again!
jn...@gmail.com <jn...@gmail.com> #87
Change on my NAS synology DS214+ as stated in post #87, works great! Happy now
da...@litchis.fr <da...@litchis.fr> #88
Is lorenzo@google.com (owner) still live ?
sy...@google.com <sy...@google.com> #89
Hi,
We are working on this issue. Your patience is much appreciated and we will update the bug when the issue is fixed.
Thanks...
We are working on this issue. Your patience is much appreciated and we will update the bug when the issue is fixed.
Thanks...
da...@risner.org <da...@risner.org> #90
Will this make it into a security update? It was working on my Samsung S7 Edge until the April security update was installed. Hoping that maybe the June security update will fix it????
a....@googlemail.com <a....@googlemail.com> #91
Surprise! Surprise! The issue is not resolved in May Update! The ninth month without VPN! Possibly the issue in May 2020 update fixed! Good work Google!!!
en...@gmail.com <en...@gmail.com> #92
Dear all i had the sam problem , i sloved with removing the vpn app from the optimization list
qq...@gmail.com <qq...@gmail.com> #93
[Comment deleted]
rd...@gmail.com <rd...@gmail.com> #94
Have issues with LG G5, Gpad 8.3, Nexus 7, and Nexus 6 all on 6.0.1; Moto X on 5.1 works fine.
pa...@gmail.com <pa...@gmail.com> #95
[Comment deleted]
ma...@gmail.com <ma...@gmail.com> #96
I have the same problem after upgrade to 6.0.1 on my stock samsung galaxy Note 4.
I am very disappointed by samsung
I am very disappointed by samsung
dj...@gmail.com <dj...@gmail.com> #97
Same problem on LG G3 D855 - Can no longer connect to Draytek routers with VPN L2TP IPSEC using PSK
qq...@gmail.com <qq...@gmail.com> #98
I'm having the same problem NEXUS 5 with Android 6.0.1 MOB30H
h....@gmail.com <h....@gmail.com> #99
Same Problem After update from Android 5 to 6 on my Galaxy s5. Also on new Galaxy s7. Same VPN connection works fine on my tab s2 with 5.0.2.
Neccessary to solve the problem because i am using it on business.
Neccessary to solve the problem because i am using it on business.
[Deleted User] <[Deleted User]> #100
This used to work on my HTC One M8, until I got the 6.0 update, then it wouldn't work. I just purchased the HTC 10, which came with 6.0.1 and it doesn't work.
@sly.midn...@gmail.com: I DO control the VPN at work, and it is using SHA1 (always has), and it still doesn't work.
My settings:
SonicWall VPN
IKE using Preshared secret
IKE (Phase 1):
Group2, 3DES, SHA1, 28800
IPSec (Phase 2):
ESP,3DES, SHA1, 28800 (PFS is off)
If you can post your VPN settings that work, maybe I can change our VPN so it will work.
I only have a small number of people (about 6) using the VPN, some from Windows, some from Macs and iPads, and the VPN works for all of those platforms, so I am hesitant to change anything. But, if the changes require changing their settings, it is doable.
Really stupid that this issue has not been resolved in all this time!
Griffin
@sly.midn...@gmail.com: I DO control the VPN at work, and it is using SHA1 (always has), and it still doesn't work.
My settings:
SonicWall VPN
IKE using Preshared secret
IKE (Phase 1):
Group2, 3DES, SHA1, 28800
IPSec (Phase 2):
ESP,3DES, SHA1, 28800 (PFS is off)
If you can post your VPN settings that work, maybe I can change our VPN so it will work.
I only have a small number of people (about 6) using the VPN, some from Windows, some from Macs and iPads, and the VPN works for all of those platforms, so I am hesitant to change anything. But, if the changes require changing their settings, it is doable.
Really stupid that this issue has not been resolved in all this time!
Griffin
sl...@gmail.com <sl...@gmail.com> #101
I get it to work with SHA1 AES modp1024 only. Anything else and it fails to
connect but with SHA2-256 it connects but doesn't pass any traffic.
Sly
connect but with SHA2-256 it connects but doesn't pass any traffic.
Sly
ch...@gmail.com <ch...@gmail.com> #102
This is really a JOKE...
a....@googlemail.com <a....@googlemail.com> #103
Yes this is like a joke ! And google ignores the problem with absolute obstinacy !!!
ma...@gmail.com <ma...@gmail.com> #104
Having the same issue on Samsung S6 / Android 6.0.1_0006
- Are there any updates / workarounds on this issue? Such a deal breaker using Androids in a business environment; shame!
Confirmed VPN working over L2TP/IPsec working on other devices and competitors - fails on Android 6.0.1.
Device Info / debug file excerpt (IP addresses masked) :
========================================================
== dumpstate: 2016-05-21 00:10:44
========================================================
Build: MMB29K.G920FXXU3DPDR
Build fingerprint: 'samsung/zerofltexx/zeroflte:6.0.1/MMB29K/G920FXXU3DPDR:user/release-keys'
Bootloader: G920FXXU3DPDR
Radio: unknown
Network: Optus
Kernel: Linux version 3.10.61-7169835 (dpi@SWDD6516) (gcc version 4.9.x-google 20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Sat Apr 23 23:38:07 KST 2016
Command line: console=ram loglevel=4 sec_debug.level=0 sec_watchdog.sec_pet=5 androidboot.hardware=samsungexynos7420 androidboot.debug_level=0x4f4c ess_setup=0x46000000 sec_tima_log=0x200000@0x48002000 sec_avc_log=0x40000@0x48204000 charging_mode=0x0 s3cfb.bootloaderfb=0xe2a00000 lcdtype=4194323 consoleblank=0 lpj=239616 sec_debug.reset_reason=7 ehci_hcd.park=3 oops=panic pmic_info=35 cordon=45144cb40411ad93ac150a7c9e058726 connie=SM-G920F_OPEN_EUR_472fd333a7cdd593042b72e5dfabaa02 fg_reset=0 androidboot.emmc_checksum=3 androidboot.boot_salescode= androidboot.odin_download=1 androidboot.bootloader=G920FXXU3DPDR androidboot.selinux=enforcing androidboot.security_mode=1526595585 androidboot.ucs_mode=0 androidboot.hw_rev=11 androidboot.warranty_bit=0 androidboot.hmac_mismatch=0 androidboot.sec_atd.tty=/dev/ttySAC1 androidboot.serialno=031603a455ae1b01 snd_soc_core.pmdown_time=1000 zero_sdchg_ic=0 androidboot.fmp_config=1
------ HW REVISION (/proc/device-tree/model_info-system_rev) ------
011
------ UPTIME (uptime) ------
up time: 01:14:44, idle time: 06:53:42, sleep time: 00:04:59
[uptime: 0.020s elapsed]
------ UPTIME MMC PERF (/sys/block/mmcblk0/) ------
------ MEMORY INFO (/proc/meminfo) ------
MemTotal: 2744168 kB
MemFree: 45960 kB
Buffers: 2468 kB
Cached: 339780 kB
SwapCached: 165744 kB
Active: 413328 kB
...
05-21 00:07:30.091 3510 5082 D ConnectivityService: getVpnConfig > userId : 0
05-21 00:07:30.091 3510 5082 D ConnectivityService: getVpnConfig > session : MyVPN
05-21 00:07:30.271 3047 4172 I SurfaceFlinger: id=671 Removed JnputMethod (6/8)
05-21 00:07:30.271 3047 3120 I SurfaceFlinger: id=671 Removed JnputMethod (-2/8)
05-21 00:07:30.281 3047 3047 D libEGL : eglTerminate EGLDisplay = 0x7fc3ec4e18
05-21 00:07:30.341 2710 2710 D racoon : Received 6 arguments
05-21 00:07:30.341 2710 2710 I racoon : ipsec-tools 0.7.3 (http://ipsec-tools.sf.net )
05-21 00:07:30.521 2710 2710 I racoon : XXX.XXX.X.X[500] used as isakmp port (fd=11)
05-21 00:07:30.521 2710 2710 I racoon : XXX.XXX.X.X[500] used for NAT-T
05-21 00:07:30.521 2710 2710 I racoon : XXX.XXX.X.X[4500] used as isakmp port (fd=12)
05-21 00:07:30.521 2710 2710 I racoon : XXX.XXX.X.X[4500] used for NAT-T
05-21 00:07:30.591 4158 4158 E audit : type=1415 msg=audit(1463753250.591:272): op=SPD-add auid=4294967295 ses=4294967295 subj=u:r:racoon:s0 res=1 src=XXX.XXX.X.X dst=XXX.XX.XXX.X
05-21 00:07:30.601 4158 4158 E audit : type=1300 msg=audit(1463753250.591:272): arch=c00000b7 syscall=206 success=yes exit=128 a0=d a1=7f9bf0f500 a2=80 a3=0 items=0 ppid=1 ppcomm=init pid=2710 auid=4294967295 uid=0 gid=1016 euid=0 suid=0 fsuid=0 egid=1016 sgid=1016 fsgid=1016 ses=4294967295 tty=(none) comm="racoon" exe="/system/bin/racoon" subj=u:r:racoon:s0 key=(null)
05-21 00:07:30.601 4158 4158 E audit : type=1327 msg=audit(1463753250.591:272): proctitle="/system/bin/racoon"
05-21 00:07:30.601 4158 4158 E audit : type=1320 msg=audit(1463753250.591:272):
05-21 00:07:30.601 4158 4158 E audit : type=1415 msg=audit(1463753250.591:273): op=SPD-add auid=4294967295 ses=4294967295 subj=u:r:racoon:s0 res=1 src=XXX.XX.XXX.X dst=XXX.XXX.X.X
05-21 00:07:30.601 4158 4158 E audit : type=1300 msg=audit(1463753250.591:273): arch=c00000b7 syscall=206 success=yes exit=128 a0=d a1=7f9bf0f500 a2=80 a3=0 items=0 ppid=1 ppcomm=init pid=2710 auid=4294967295 uid=0 gid=1016 euid=0 suid=0 fsuid=0 egid=1016 sgid=1016 fsgid=1016 ses=4294967295 tty=(none) comm="racoon" exe="/system/bin/racoon" subj=u:r:racoon:s0 key=(null)
05-21 00:07:30.601 4158 4158 E audit : type=1327 msg=audit(1463753250.591:273): proctitle="/system/bin/racoon"
05-21 00:07:30.601 4158 4158 E audit : type=1320 msg=audit(1463753250.591:273):
05-21 00:07:30.811 2932 2932 I FIPS_bssl: FIPS approved mode (1) | 2932 | /system/bin/mtpd
05-21 00:07:30.811 2932 2932 D mtpd : Waiting for control socket
05-21 00:07:31.101 2932 2932 D mtpd : Received 20 arguments
05-21 00:07:31.101 2932 2932 I mtpd : Using protocol l2tp
05-21 00:07:31.101 2932 2932 I mtpd : Connecting to XXX.XX.XXX.X port 1701 via wlan0
05-21 00:07:31.111 2932 2932 I mtpd : Connection established (socket = 12)
05-21 00:07:31.111 2932 2932 D mtpd : Sending SCCRQ (local_tunnel = 36321)
05-21 00:07:31.111 2710 2710 I racoon : IPsec-SA request for XXX.XX.XXX.X queued due to no phase1 found.
05-21 00:07:31.111 2710 2710 I racoon : initiate new phase 1 negotiation: XXX.XXX.X.X[500]<=>XXX.XX.XXX.X[500]
05-21 00:07:31.111 2710 2710 I racoon : begin Aggressive mode.
05-21 00:07:31.131 3510 5037 D ConnectivityService: getVpnConfig > userId : 0
05-21 00:07:31.131 3510 5037 D ConnectivityService: getVpnConfig > session : MyVPN
...
05-21 00:08:01.371 2710 2710 I racoon : Bye
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: Aborting
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: java.lang.IllegalStateException: racoon is dead
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:1863)
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:1536)
05-21 00:08:01.561 3510 2709 D Vpn : setting state=FAILED, reason=racoon is dead
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: Ignore exception
05-21 00:08:01.561 2932 2932 D mtpd : Timeout -> Sending SCCRQ
05-21 00:08:01.581 2932 2932 I mtpd : Received signal 15
05-21 00:08:01.581 2932 2932 D mtpd : Sending STOPCCN
05-21 00:08:01.581 2932 2932 I mtpd : Mtpd is terminated (status = 5)
========================================================
- Are there any updates / workarounds on this issue? Such a deal breaker using Androids in a business environment; shame!
Confirmed VPN working over L2TP/IPsec working on other devices and competitors - fails on Android 6.0.1.
Device Info / debug file excerpt (IP addresses masked) :
========================================================
== dumpstate: 2016-05-21 00:10:44
========================================================
Build: MMB29K.G920FXXU3DPDR
Build fingerprint: 'samsung/zerofltexx/zeroflte:6.0.1/MMB29K/G920FXXU3DPDR:user/release-keys'
Bootloader: G920FXXU3DPDR
Radio: unknown
Network: Optus
Kernel: Linux version 3.10.61-7169835 (dpi@SWDD6516) (gcc version 4.9.x-google 20140827 (prerelease) (GCC) ) #1 SMP PREEMPT Sat Apr 23 23:38:07 KST 2016
Command line: console=ram loglevel=4 sec_debug.level=0 sec_watchdog.sec_pet=5 androidboot.hardware=samsungexynos7420 androidboot.debug_level=0x4f4c ess_setup=0x46000000 sec_tima_log=0x200000@0x48002000 sec_avc_log=0x40000@0x48204000 charging_mode=0x0 s3cfb.bootloaderfb=0xe2a00000 lcdtype=4194323 consoleblank=0 lpj=239616 sec_debug.reset_reason=7 ehci_hcd.park=3 oops=panic pmic_info=35 cordon=45144cb40411ad93ac150a7c9e058726 connie=SM-G920F_OPEN_EUR_472fd333a7cdd593042b72e5dfabaa02 fg_reset=0 androidboot.emmc_checksum=3 androidboot.boot_salescode= androidboot.odin_download=1 androidboot.bootloader=G920FXXU3DPDR androidboot.selinux=enforcing androidboot.security_mode=1526595585 androidboot.ucs_mode=0 androidboot.hw_rev=11 androidboot.warranty_bit=0 androidboot.hmac_mismatch=0 androidboot.sec_atd.tty=/dev/ttySAC1 androidboot.serialno=031603a455ae1b01 snd_soc_core.pmdown_time=1000 zero_sdchg_ic=0 androidboot.fmp_config=1
------ HW REVISION (/proc/device-tree/model_info-system_rev) ------
011
------ UPTIME (uptime) ------
up time: 01:14:44, idle time: 06:53:42, sleep time: 00:04:59
[uptime: 0.020s elapsed]
------ UPTIME MMC PERF (/sys/block/mmcblk0/) ------
------ MEMORY INFO (/proc/meminfo) ------
MemTotal: 2744168 kB
MemFree: 45960 kB
Buffers: 2468 kB
Cached: 339780 kB
SwapCached: 165744 kB
Active: 413328 kB
...
05-21 00:07:30.091 3510 5082 D ConnectivityService: getVpnConfig > userId : 0
05-21 00:07:30.091 3510 5082 D ConnectivityService: getVpnConfig > session : MyVPN
05-21 00:07:30.271 3047 4172 I SurfaceFlinger: id=671 Removed JnputMethod (6/8)
05-21 00:07:30.271 3047 3120 I SurfaceFlinger: id=671 Removed JnputMethod (-2/8)
05-21 00:07:30.281 3047 3047 D libEGL : eglTerminate EGLDisplay = 0x7fc3ec4e18
05-21 00:07:30.341 2710 2710 D racoon : Received 6 arguments
05-21 00:07:30.341 2710 2710 I racoon : ipsec-tools 0.7.3 (
05-21 00:07:30.521 2710 2710 I racoon : XXX.XXX.X.X[500] used as isakmp port (fd=11)
05-21 00:07:30.521 2710 2710 I racoon : XXX.XXX.X.X[500] used for NAT-T
05-21 00:07:30.521 2710 2710 I racoon : XXX.XXX.X.X[4500] used as isakmp port (fd=12)
05-21 00:07:30.521 2710 2710 I racoon : XXX.XXX.X.X[4500] used for NAT-T
05-21 00:07:30.591 4158 4158 E audit : type=1415 msg=audit(1463753250.591:272): op=SPD-add auid=4294967295 ses=4294967295 subj=u:r:racoon:s0 res=1 src=XXX.XXX.X.X dst=XXX.XX.XXX.X
05-21 00:07:30.601 4158 4158 E audit : type=1300 msg=audit(1463753250.591:272): arch=c00000b7 syscall=206 success=yes exit=128 a0=d a1=7f9bf0f500 a2=80 a3=0 items=0 ppid=1 ppcomm=init pid=2710 auid=4294967295 uid=0 gid=1016 euid=0 suid=0 fsuid=0 egid=1016 sgid=1016 fsgid=1016 ses=4294967295 tty=(none) comm="racoon" exe="/system/bin/racoon" subj=u:r:racoon:s0 key=(null)
05-21 00:07:30.601 4158 4158 E audit : type=1327 msg=audit(1463753250.591:272): proctitle="/system/bin/racoon"
05-21 00:07:30.601 4158 4158 E audit : type=1320 msg=audit(1463753250.591:272):
05-21 00:07:30.601 4158 4158 E audit : type=1415 msg=audit(1463753250.591:273): op=SPD-add auid=4294967295 ses=4294967295 subj=u:r:racoon:s0 res=1 src=XXX.XX.XXX.X dst=XXX.XXX.X.X
05-21 00:07:30.601 4158 4158 E audit : type=1300 msg=audit(1463753250.591:273): arch=c00000b7 syscall=206 success=yes exit=128 a0=d a1=7f9bf0f500 a2=80 a3=0 items=0 ppid=1 ppcomm=init pid=2710 auid=4294967295 uid=0 gid=1016 euid=0 suid=0 fsuid=0 egid=1016 sgid=1016 fsgid=1016 ses=4294967295 tty=(none) comm="racoon" exe="/system/bin/racoon" subj=u:r:racoon:s0 key=(null)
05-21 00:07:30.601 4158 4158 E audit : type=1327 msg=audit(1463753250.591:273): proctitle="/system/bin/racoon"
05-21 00:07:30.601 4158 4158 E audit : type=1320 msg=audit(1463753250.591:273):
05-21 00:07:30.811 2932 2932 I FIPS_bssl: FIPS approved mode (1) | 2932 | /system/bin/mtpd
05-21 00:07:30.811 2932 2932 D mtpd : Waiting for control socket
05-21 00:07:31.101 2932 2932 D mtpd : Received 20 arguments
05-21 00:07:31.101 2932 2932 I mtpd : Using protocol l2tp
05-21 00:07:31.101 2932 2932 I mtpd : Connecting to XXX.XX.XXX.X port 1701 via wlan0
05-21 00:07:31.111 2932 2932 I mtpd : Connection established (socket = 12)
05-21 00:07:31.111 2932 2932 D mtpd : Sending SCCRQ (local_tunnel = 36321)
05-21 00:07:31.111 2710 2710 I racoon : IPsec-SA request for XXX.XX.XXX.X queued due to no phase1 found.
05-21 00:07:31.111 2710 2710 I racoon : initiate new phase 1 negotiation: XXX.XXX.X.X[500]<=>XXX.XX.XXX.X[500]
05-21 00:07:31.111 2710 2710 I racoon : begin Aggressive mode.
05-21 00:07:31.131 3510 5037 D ConnectivityService: getVpnConfig > userId : 0
05-21 00:07:31.131 3510 5037 D ConnectivityService: getVpnConfig > session : MyVPN
...
05-21 00:08:01.371 2710 2710 I racoon : Bye
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: Aborting
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: java.lang.IllegalStateException: racoon is dead
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:1863)
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:1536)
05-21 00:08:01.561 3510 2709 D Vpn : setting state=FAILED, reason=racoon is dead
05-21 00:08:01.561 3510 2709 I LegacyVpnRunner: Ignore exception
05-21 00:08:01.561 2932 2932 D mtpd : Timeout -> Sending SCCRQ
05-21 00:08:01.581 2932 2932 I mtpd : Received signal 15
05-21 00:08:01.581 2932 2932 D mtpd : Sending STOPCCN
05-21 00:08:01.581 2932 2932 I mtpd : Mtpd is terminated (status = 5)
========================================================
dr...@gmail.com <dr...@gmail.com> #105
I have the same problem on my BlackBerry PRIV, pls pls pls fix!
kl...@gmail.com <kl...@gmail.com> #106
I had the same problem.
Then I just found the OPENVPN Connect Android app, and it just works now.
https://play.google.com/store/apps/details?id=net.openvpn.openvpn
Using Samsung Galaxy S4 i9505 with Resurrection Remix v5.6.9 Marshmallow (CM13 based).
Let me know, if helps anybody else.
Then I just found the OPENVPN Connect Android app, and it just works now.
Using Samsung Galaxy S4 i9505 with Resurrection Remix v5.6.9 Marshmallow (CM13 based).
Let me know, if helps anybody else.
pu...@gmail.com <pu...@gmail.com> #107
My note 4's VPN doesn't work after upgrade to 6.0.1
It looks like Google helps NSA by not resolving this critical bug aftee 9month
What an unprossional arrogant behavior - google devs!!
It looks like Google helps NSA by not resolving this critical bug aftee 9month
What an unprossional arrogant behavior - google devs!!
n9...@gmail.com <n9...@gmail.com> #108
HTC M9, Work has VPN L2TP/IKE. Can no longer use. I've tried another program and it said that there was an invalid exchange, but would not specify what.
kl...@gmail.com <kl...@gmail.com> #109
Did you try the OPENVPN Connect Android app?
I was able to use it successfully connect to my work computer.
https://play.google.com/store/apps/details?id=net.openvpn.openvpn
Using Samsung Galaxy S4 i9505 with Resurrection Remix v5.6.9 (CM13 based).
I was able to use it successfully connect to my work computer.
Using Samsung Galaxy S4 i9505 with Resurrection Remix v5.6.9 (CM13 based).
Ye...@btopenworld.com <Ye...@btopenworld.com> #110
This has been 6 months now and frankly can't be hard to fix - likely just a parameter. Is ANYONE working on it? What's the status and outlook?
kl...@gmail.com <kl...@gmail.com> #111
Can anybody confirm that OPENVPN is working with the software I successfully use?
la...@gmail.com <la...@gmail.com> #112
Some Threae from German Telekom community says rmnet0 makes the problem. Also it will work when LTE is switched off and only 3G is on.
Not workint for me but maybe helps.
Not workint for me but maybe helps.
sy...@google.com <sy...@google.com> #113
Hi,
This issue is fixed internally and fix will be available in future releases.
Thanks...
This issue is fixed internally and fix will be available in future releases.
Thanks...
jo...@googlemail.com <jo...@googlemail.com> #114
Also seeing issue on BlackBerry PRIV on Marshmallow
cp...@gmail.com <cp...@gmail.com> #115
Just downloaded the new update and I still can not connect to my VPN. Galaxy S7
tr...@gmail.com <tr...@gmail.com> #116
#114 sya...@google.com
Hi,
This issue is fixed internally and fix will be available in future releases.
Thanks...
Status: FutureRelease
Which is akin to an answer for how long a piece of string is...
Any further details would be great, new Samsung update still does not have this fix and I continue to have to use another phone just to be able to obtain much needed work access.
Hi,
This issue is fixed internally and fix will be available in future releases.
Thanks...
Status: FutureRelease
Which is akin to an answer for how long a piece of string is...
Any further details would be great, new Samsung update still does not have this fix and I continue to have to use another phone just to be able to obtain much needed work access.
ja...@flapadar.co.uk <ja...@flapadar.co.uk> #117
> This issue is fixed internally and fix will be available in future releases.
More details please. Will this be fixed in the next update for the 5x?
More details please. Will this be fixed in the next update for the 5x?
g0...@gmail.com <g0...@gmail.com> #118
Click advanced, enable backwards compatible mode...
Solved the problem for me.
Solved the problem for me.
jn...@gmail.com <jn...@gmail.com> #119
no option 'backwards compatible mode' on my phone....
jn...@gmail.com <jn...@gmail.com> #120
[Comment deleted]
ti...@gmail.com <ti...@gmail.com> #121
I have the same issue on Android 6.0.1 (Nexus 5X). I tried to update it to Android N (NPD56N) - I didn't help. Ipsec works fine on iphones, win 10, android 4.4 devices.
And i tried to use md5 for hash and tried to change PFS to modp1024 - didn't help for me.
Can anybody say, when fix will be available for download?
And i tried to use md5 for hash and tried to change PFS to modp1024 - didn't help for me.
Can anybody say, when fix will be available for download?
ti...@gmail.com <ti...@gmail.com> #122
I found solution: if you are using libreswan for ipsec, you follow this instructions (which helped me)
Android 6 (Marshmallow) users should edit /etc/ipsec.conf on the VPN server and append ,aes256-sha2_256 to both ike= and phase2alg= lines. Then add a new line sha2-truncbug=yes immediately after those. Indent lines with two spaces. When finished, run service ipsec restart
Original posted here (see Note) :https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/docs/clients.md#android
Android 6 (Marshmallow) users should edit /etc/ipsec.conf on the VPN server and append ,aes256-sha2_256 to both ike= and phase2alg= lines. Then add a new line sha2-truncbug=yes immediately after those. Indent lines with two spaces. When finished, run service ipsec restart
Original posted here (see Note) :
il...@gmail.com <il...@gmail.com> #123
Sony xperia z5p on Android 6.0.1,NG....
il...@gmail.com <il...@gmail.com> #124
Sony xperia z5p on Android 6.0.1,NG....
f....@googlemail.com <f....@googlemail.com> #125
Hey
yesterday i bought the S7, and had the same problem.
VPN works fine with Galaxy S5 (Android 5.x), doesnt work with S7 (Android 6.01).
i'm from germany and with a hint in a user forum from a service provider (Telekom) IT NOW WORKS with VoLTE (Voice over LTE, 4G) deactivated!
If this is not an option in the US, perhaps try to use 2G or 3G ??
yesterday i bought the S7, and had the same problem.
VPN works fine with Galaxy S5 (Android 5.x), doesnt work with S7 (Android 6.01).
i'm from germany and with a hint in a user forum from a service provider (Telekom) IT NOW WORKS with VoLTE (Voice over LTE, 4G) deactivated!
If this is not an option in the US, perhaps try to use 2G or 3G ??
f....@googlemail.com <f....@googlemail.com> #126
it only works after rebooting!
jo...@gmail.com <jo...@gmail.com> #127
Gaaaa! My Samsung Note 4 updated to 6.0 Marshmellow and now my VPN connections fail to connect like the others. I am a network admin, I have to have access to my network. Is there no solution?
el...@gmail.com <el...@gmail.com> #128
Same problem here.
I have samsung galaxy note 5 vrs6.0.1 and i tried more than 10 different VPN apps and still no one work for me.
Please any help, it is definitely an issue from the android version since with my other android phone vrs 5.x all work good and as they should.1
I have samsung galaxy note 5 vrs6.0.1 and i tried more than 10 different VPN apps and still no one work for me.
Please any help, it is definitely an issue from the android version since with my other android phone vrs 5.x all work good and as they should.1
bi...@gmail.com <bi...@gmail.com> #129
Also having this issue on multiple 6.0.1 devices! Please push a fix Google!!
z0...@googlemail.com <z0...@googlemail.com> #130
Freaking crazy you, Google! Are you building an NSA-phone here, or how can it take half a year (and still counting) to fix VPN?
jn...@gmail.com <jn...@gmail.com> #131
Google please confirm it is fixed with security update July
de...@protonmail.com <de...@protonmail.com> #132
I've installed the July 1 update and it's still not working, so this release obviously didn't get the fix. Please advise WHEN this fix will be applied (not just "future releases)!!
ta...@googlemail.com <ta...@googlemail.com> #133
its a shame that such a essential feature is not fixed.
I´m using Honor 7 with all latest updates
I´m using Honor 7 with all latest updates
lu...@gmail.com <lu...@gmail.com> #134
I can confirm that the problem occurs at the OnePlus 3 (Android 6.0.1) in combination with a Synology DS213+ VPN server DSM 6.0.1-7393 Update 1 (latest update)
kr...@gmail.com <kr...@gmail.com> #135
I am having the same problem however it only appears for me when using Android 6 on a Nexus 6P which is connected to IPv6 only PDP using 464XLAT to connect to the IPv4 only VPN server (Strongswan 5.3.3). If I use native IPv4 it works fine, also if I use either IPv6 or IPv4 on a Nexus 5 there are no issues for me, same if I use a Galaxy Note 3 on IPv4 or IPv6, no issues.
Can anybody please confirm if this behavior is consistent with the issue reported here?
Can anybody please confirm if this behavior is consistent with the issue reported here?
da...@gmail.com <da...@gmail.com> #136
****### POSSIBLE SOLUTION ###****
I had Opera MAX installed on my phone and the VPN key used to appear only for Opera. Assuming it might have made changes to the VPN service or settings that are affecting the other VPN apps, I force-stopped the Opera MAX service (in settings > apps). This helped, I'm now able to tunnel through using my other VPN apps.
I had Opera MAX installed on my phone and the VPN key used to appear only for Opera. Assuming it might have made changes to the VPN service or settings that are affecting the other VPN apps, I force-stopped the Opera MAX service (in settings > apps). This helped, I'm now able to tunnel through using my other VPN apps.
al...@gmail.com <al...@gmail.com> #137
Same problem, i think about an iphone...
an...@gmail.com <an...@gmail.com> #138
This is a critical bug! I can not use my Galaxy S7 to work! Google should immediately release the fix!
se...@bluesystem.ru <se...@bluesystem.ru> #139
[Comment deleted]
al...@gmail.com <al...@gmail.com> #140
Same problem!!! In new Galaxy s7!!! Google became a corporation Like Microsoft - shit at all, only in money intrested!
ed...@gmail.com <ed...@gmail.com> #141
time for a fix?
ro...@mailrob.com <ro...@mailrob.com> #142
IVE MANAGED TO GET IT WORKING!!!
Ever since upgrading my xperia z2 to android 6 my VPN connections stopped working (using IPsec with PSK). This is what I did to get it connecting... Click the settings icon (the cog) next to your vpn profile, tick Show Advanced Options then scroll down to the bottom and Enable the Backwards-compatible mode option. Now connects :) Im running android 6.0.1.
Ever since upgrading my xperia z2 to android 6 my VPN connections stopped working (using IPsec with PSK). This is what I did to get it connecting... Click the settings icon (the cog) next to your vpn profile, tick Show Advanced Options then scroll down to the bottom and Enable the Backwards-compatible mode option. Now connects :) Im running android 6.0.1.
th...@googlemail.com <th...@googlemail.com> #143
I've tested on my Samsung galaxy s5 and galaxy tab s2.
before updated from android 5 to 6 the OpenVPN works without any problems.
After the update several problems occur :
The App starts and connects to the Server and initializes the tun0 Interface, as I could see via command "ip r l", but none of the pushed routes are set.
Second problem, the new power save rules kill the connection.
Looking at the log file shows an "Operation not permitted" error for each rooting post. So I tried it manually with "ip r add x.x.x.x/16 via x.y.z.n" and got the same message. so I think the origin of the problem is clear. The App has not enough permission to set the routes and i'm afraid for setting the new DNS-Server could be the same. (I can't test at the moment)
before updated from android 5 to 6 the OpenVPN works without any problems.
After the update several problems occur :
The App starts and connects to the Server and initializes the tun0 Interface, as I could see via command "ip r l", but none of the pushed routes are set.
Second problem, the new power save rules kill the connection.
Looking at the log file shows an "Operation not permitted" error for each rooting post. So I tried it manually with "ip r add x.x.x.x/16 via x.y.z.n" and got the same message. so I think the origin of the problem is clear. The App has not enough permission to set the routes and i'm afraid for setting the new DNS-Server could be the same. (I can't test at the moment)
jn...@gmail.com <jn...@gmail.com> #144
With regards #143, on my nexus 5x there isn't the option 'backwards compatible' at the advanced options....
te...@gmail.com <te...@gmail.com> #145
Same problem on 6.0.1. Please fix.
ph...@gmail.com <ph...@gmail.com> #146
Same problem with 6.0 and Huawei P9
do...@gmail.com <do...@gmail.com> #147
Same issue with Galaxy Tab A. Works fine on my other Android devices running 6.0.1
di...@gmail.com <di...@gmail.com> #148
Google, what's the workaround while waiting for future releases? Can't use my Nexus 7 for work now.
jn...@gmail.com <jn...@gmail.com> #149
Ok, last time I'll buy a google phone. August update still not fix this major problem. Thank you google.
st...@gmail.com <st...@gmail.com> #150
Same issue on moto e gen2 with Android 6.0. please fix it quickly!
st...@gmail.com <st...@gmail.com> #151
Same issue on moto e gen2 with Android 6.0. please fix it quickly!
to...@gmail.com <to...@gmail.com> #152
[Comment deleted]
to...@gmail.com <to...@gmail.com> #153
The same on SGS 5 (SM-G900F), android 6.0.1, MMB29M.G900FXXS1CPG2
ev...@gmail.com <ev...@gmail.com> #154
This is ridiculous, same issue on S7 edge. Google get it fixed already!
ma...@gmail.com <ma...@gmail.com> #155
[Comment deleted]
da...@gmail.com <da...@gmail.com> #156
I've got the same issue...
CM13 on my General Mobile Android One 4G :-(
CM13 on my General Mobile Android One 4G :-(
[Deleted User] <[Deleted User]> #157
[Comment deleted]
je...@gmail.com <je...@gmail.com> #158
I am able to reproduce the issue on a OnePlus 3 running 6.0.1.
ts...@gmail.com <ts...@gmail.com> #159
same thing, nexus 5, 6.0.1
se...@ooyoo.de <se...@ooyoo.de> #160
Same issue galaxy s7. Annnoying.
ri...@richardreiner.com <ri...@richardreiner.com> #161
Same issue - on both my Nexus 7 2013, and my Samsung Galaxy S5 after the Marshmallow update.
j....@gmail.com <j....@gmail.com> #162
SONY somehow fixed this on their 6.0.1 ROM(s). I'm able to connect to my Synology L2TP/IPSec VPN fine. I DO have to enable some 'Legacy mode' checkbox, that doesn't seem to be stock.
th...@gmail.com <th...@gmail.com> #163
Try the solution pointed out in #60
Works for my S5 neo
Works for my S5 neo
th...@gmail.com <th...@gmail.com> #164
for OVPN
jn...@gmail.com <jn...@gmail.com> #165
Android 7.0 stock on Nexus 5x, still same problem
lu...@gmail.com <lu...@gmail.com> #166
Same problem on SAMSUNG J5 / Android 5.1.1.
---
$[i] ip route add172.18.16.0/22 dev tun0
RTNETLINK aswers: Operation not permitted
---
And of course my private network is not listed in my tun0 routes, so the app connect fine but I can't go anywhere. Una bosta realmente! FIX IT!
---
$[i] ip route add
RTNETLINK aswers: Operation not permitted
---
And of course my private network is not listed in my tun0 routes, so the app connect fine but I can't go anywhere. Una bosta realmente! FIX IT!
pa...@gmail.com <pa...@gmail.com> #167
Same issue as mentioned above with regards to L2TP/IPsec VPN connections.
(#60 comment does not resolve L2Tp/IPsec connections, just fix for OpenVPN)
Phone: LG 5 (6.0.1)
Cannot connect to L2Tp/IPsec VPN in 6.0.1 (works with 5x running 5.1.1)
Something is definitely broken in 6.0.1 across all phone (see all comments above!) with L2Tp/IPsec VPN.
Please fix Google.
(#60 comment does not resolve L2Tp/IPsec connections, just fix for OpenVPN)
Phone: LG 5 (6.0.1)
Cannot connect to L2Tp/IPsec VPN in 6.0.1 (works with 5x running 5.1.1)
Something is definitely broken in 6.0.1 across all phone (see all comments above!) with L2Tp/IPsec VPN.
Please fix Google.
ra...@gmail.com <ra...@gmail.com> #168
On an LG G4 and same issue... had an andoid update a few days ago - still no fix. I'm on 6.0
sa...@gmail.com <sa...@gmail.com> #169
Cant connect to sophos utm anymore latest update s7 edge - good job google
ch...@gmail.com <ch...@gmail.com> #170
[Comment deleted]
ch...@gmail.com <ch...@gmail.com> #171
The status is “future release”, when can we get it?
sy...@google.com <sy...@google.com>
de...@protonmail.com <de...@protonmail.com> #172
Why has the status been downgraded? Are we getting this fixed or not??
ch...@gmail.com <ch...@gmail.com> #173
This issue has been reported since Dec2015, but no patch has been released until now even Android 7.0 near launch.
Will this issue get fix in October patch or we need wait until 2017?
Please kindly let us know.
Moreover, we wait near 9 months but still get nothing. It really seems a joke on Google.
Will this issue get fix in October patch or we need wait until 2017?
Please kindly let us know.
Moreover, we wait near 9 months but still get nothing. It really seems a joke on Google.
fs...@gmail.com <fs...@gmail.com> #174
So... in June you say "fixed internally and available in a future release", but on Android 7 out now three months later it still doesn't work? :/
a....@googlemail.com <a....@googlemail.com> #175
absolutely unprofessional!!!
sy...@google.com <sy...@google.com> #176
We tried to reproduce the issue in our setup and we are unable to reproduce it.
Can someone provide below details to investigate further on the issue?
Note: We need inputs from Nexus device users with Android N only.
1. Which Android build are you using? (e.g. NRD90M)?
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
4. What steps do others need to take in order to reproduce the issue themselves?
5. Please provide more details on how the network is configured?
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
7. Any other details are greatly appreciated
Can someone provide below details to investigate further on the issue?
Note: We need inputs from Nexus device users with Android N only.
1. Which Android build are you using? (e.g. NRD90M)?
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
4. What steps do others need to take in order to reproduce the issue themselves?
5. Please provide more details on how the network is configured?
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
7. Any other details are greatly appreciated
ja...@flapadar.co.uk <ja...@flapadar.co.uk> #177
1. Which Android build are you using? (e.g. NRD90M)?
NRD90M
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
LG G4 (my previous device) and now Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100% of the time
4. What steps do others need to take in order to reproduce the issue themselves?
4.1) Set up a L2TP IPSec VPN (PSK) connection. The issue definitely happens when using Openswan as the server with a configuration similar tohttps://raymii.org/s/tutorials/IPSEC_L2TP_vpn_with_Ubuntu_14.04.html
4.2) Attempt to connect
5. Please provide more details on how the network is configured?
Similar L2TP config tohttps://raymii.org/s/tutorials/IPSEC_L2TP_vpn_with_Ubuntu_14.04.html
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
Yes, confirmed on both.
NRD90M
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
LG G4 (my previous device) and now Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100% of the time
4. What steps do others need to take in order to reproduce the issue themselves?
4.1) Set up a L2TP IPSec VPN (PSK) connection. The issue definitely happens when using Openswan as the server with a configuration similar to
4.2) Attempt to connect
5. Please provide more details on how the network is configured?
Similar L2TP config to
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
Yes, confirmed on both.
pr...@gmail.com <pr...@gmail.com> #178
Samsung s6 edge is also having same using after update to 6.0.1. Please release the fix asap.
ch...@gmail.com <ch...@gmail.com> #179
Hey dev,
This post status has been marked as “further release”, but now is “assigned”.
After 9 months, you said that you cannot reproduce the issues. \“”/
Someone explained this issues at #30.
The log has been uploaded at OP.
I guess another 9 months we need to wait.
The fastest way to solve is buy an iPhone unless you like to wait N x 99 months.
TOTALLY DISAPPOINTED!!!
This post status has been marked as “further release”, but now is “assigned”.
After 9 months, you said that you cannot reproduce the issues. \“”/
Someone explained this issues at #30.
The log has been uploaded at OP.
I guess another 9 months we need to wait.
The fastest way to solve is buy an iPhone unless you like to wait N x 99 months.
TOTALLY DISAPPOINTED!!!
th...@gmail.com <th...@gmail.com> #180
Nexus 6 / Motorola
Build MOB30Z
Neither works with Stock Android nor with Cyanogenmod.
Android 6.0.1
Does not work 100% .
L2TP / IPSec with PSK. I'm providing hostname, psk, username, PW, doesn't connect. Same setup works on iOS.
I'm planing to get an iPhone 6 Plus soon because of that.
Build MOB30Z
Neither works with Stock Android nor with Cyanogenmod.
Android 6.0.1
Does not work 100% .
L2TP / IPSec with PSK. I'm providing hostname, psk, username, PW, doesn't connect. Same setup works on iOS.
I'm planing to get an iPhone 6 Plus soon because of that.
ve...@gmail.com <ve...@gmail.com> #181
1. Which Android build are you using? (e.g. NRD90M)?
MTC20F
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100% of the time
4. What steps do others need to take in order to reproduce the issue themselves?
Step 1: Setup a "L2TP/IPSec PSK" VPN connection with IPSec pre-shared key only. (No L2TP password and no IPSec identifier are used)
Step 2: Connect to the VPN with the VPN username and password.
Step 3: "Connecting" will be displayed, a while later it will shows "Failed"
5. Please provide more details on how the network is configured?
Phone: LTE connection
VPN server: A Synology rt1900ac router connected directly to home broadband. The router is running with package "VPN Server" to provide the VPN functionality. The router is running SRM 1.1-6338 firmware and the "VPN Server" package is running 1.3-2479. The option "Enable SHA2-256 compatible mode (96 bit)" in package "VPN Server" should not be enabled. That option is added by Synology to allow Android N connected to the VPN server. See the change log for version 1.3.0-2734 onhttps://www.synology.com/en-global/releaseNote/VPNCenter (Side note: I am glad that choose Synology. They help users to solve their trouble when the other end is still doing nothing.)
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
Yes, I can connect to the VPN using Windows 10 and OS X El Capitan.
MTC20F
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100% of the time
4. What steps do others need to take in order to reproduce the issue themselves?
Step 1: Setup a "L2TP/IPSec PSK" VPN connection with IPSec pre-shared key only. (No L2TP password and no IPSec identifier are used)
Step 2: Connect to the VPN with the VPN username and password.
Step 3: "Connecting" will be displayed, a while later it will shows "Failed"
5. Please provide more details on how the network is configured?
Phone: LTE connection
VPN server: A Synology rt1900ac router connected directly to home broadband. The router is running with package "VPN Server" to provide the VPN functionality. The router is running SRM 1.1-6338 firmware and the "VPN Server" package is running 1.3-2479. The option "Enable SHA2-256 compatible mode (96 bit)" in package "VPN Server" should not be enabled. That option is added by Synology to allow Android N connected to the VPN server. See the change log for version 1.3.0-2734 on
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
Yes, I can connect to the VPN using Windows 10 and OS X El Capitan.
ta...@gmail.com <ta...@gmail.com> #182
Confirmed for not working with libreswan and android 6.0.
fix in #123 does not work for me
This is ridiculous that google cannot reproduce the issue. Can't you guys install debian and xl2tpd?
fix in #123 does not work for me
This is ridiculous that google cannot reproduce the issue. Can't you guys install debian and xl2tpd?
gu...@googlemail.com <gu...@googlemail.com> #183
My Samsung Galaxy S7 edge with Android 6.0.1 is also affected.
My previous phone (which was a Sony Z3 with Android 6.0.1) was not affected (same settings, same remote endpoint).
This is causing me massive headaches.
My previous phone (which was a Sony Z3 with Android 6.0.1) was not affected (same settings, same remote endpoint).
This is causing me massive headaches.
ta...@gmail.com <ta...@gmail.com> #184
connection to the same server from Samsung Galaxy Note 3 android ver. 5.0
works perfectly on the same setup
debian journal log while connecting. (purged my hostname, timestamp and ip from log)
next payload type of ISAKMP Identification Payload has an unknown value: 219
probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
next payload type of ISAKMP Identification Payload has an unknown value: 219
probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
next payload type of ISAKMP Identification Payload has an unknown value: 219
probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
check_control: Received out of order control packet on tunnel -1 (got 1, expected 0)
xl2tpd[1180]: handle_packet: bad control packet!
xl2tpd[1180]: Maximum retries exceeded for tunnel 11906. Closing.
works perfectly on the same setup
debian journal log while connecting. (purged my hostname, timestamp and ip from log)
next payload type of ISAKMP Identification Payload has an unknown value: 219
probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
next payload type of ISAKMP Identification Payload has an unknown value: 219
probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
next payload type of ISAKMP Identification Payload has an unknown value: 219
probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
check_control: Received out of order control packet on tunnel -1 (got 1, expected 0)
xl2tpd[1180]: handle_packet: bad control packet!
xl2tpd[1180]: Maximum retries exceeded for tunnel 11906. Closing.
sy...@google.com <sy...@google.com> #185
FYI, This issue is fixed in Android N builds and fix is not available for Android M builds and we are unable to reproduce the issue over Android N Nexus devices with internal network setup. We are setting up the network as per comment #179 to reproduce the issue.
The reason for changing the status back to assigned is, we noticed one or two reports with Android N Nexus devices. In order to track the status, we opened the status to assigned. It doesn't mean that the issue is never fixed. It is fixed in Android N Nexus devices.
Please comment here if you can reproduce the issue on Android N with Nexus devices..
The reason for changing the status back to assigned is, we noticed one or two reports with Android N Nexus devices. In order to track the status, we opened the status to assigned. It doesn't mean that the issue is never fixed. It is fixed in Android N Nexus devices.
Please comment here if you can reproduce the issue on Android N with Nexus devices..
th...@gmail.com <th...@gmail.com> #186
I reported this back on #26 I've been waiting a very long time for this fix. My Nexus 6p is a M build. So are you saying that I will not get a fix until the OTA version of Android n is pushed out?
sy...@google.com <sy...@google.com> #187
We have Android N OTA for Nexus 6P, Nexus 5X, Nexus 9 and Pixel C. Please refer below link for more details:
https://developers.google.com/android/nexus/ota
sl...@gmail.com <sl...@gmail.com> #188
Why was no fix provided for Android 6.0.1? It's probably just a kernel option that needed to be take out an updated kernel to make proper use of the RFC for use of SHA256 hash checking.
My work around involved forcing my VPN gateway to use the older SHA1 which makes my VPN less secure than it could be.
My work around involved forcing my VPN gateway to use the older SHA1 which makes my VPN less secure than it could be.
Ye...@btopenworld.com <Ye...@btopenworld.com> #189
My Nexus 7 (2013) is M and I now understand will never get N. So basically after almost a year of waiting you now decide it's not worth the hassle to fix it (despite saying a few months back that you already had and implied it was released). Nice hardware let down by software and non-existent support. Would we buy more Android devices for business use? I think not.
dj...@gmail.com <dj...@gmail.com> #190
[Comment deleted]
dj...@gmail.com <dj...@gmail.com> #191
I reported this back in May (post #98). Can you please confirm if Android N will be released for LG G3 D855? What do I do if no Android N update is released?
ta...@gmail.com <ta...@gmail.com> #192
#187
so yeah, no fix and no complaints until you use one particular android device.
it is a bit disappointing especially for network professionals whose jobs and businesses rely on l2tp.
so yeah, no fix and no complaints until you use one particular android device.
it is a bit disappointing especially for network professionals whose jobs and businesses rely on l2tp.
pa...@gmail.com <pa...@gmail.com> #193
I can't say how dissapointed I am by Google team members' attitude and approach to sokving this problem. I have a just last gen Android Sony tablet with Android 6.0.1 with May security updates yet I have to set the IPsec proposal to use isecure 1024 DH group to connect to a L2TP server. My iPhone 4S with iOS 9.3 can use DH group 14! Iam done with Android! What anfarce
ve...@gmail.com <ve...@gmail.com> #194
Sorry I didn't notice the details need Android 7.0 (I thought N was 6.0) only. I just got OTA upgrade today and same issue on Android N.
1. Which Android build are you using? (e.g. NRD90M)?
NRD90R
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100% of the time
4. What steps do others need to take in order to reproduce the issue themselves?
Step 1: Setup a "L2TP/IPSec PSK" VPN connection with IPSec pre-shared key only. (No L2TP password and no IPSec identifier are used)
Step 2: Connect to the VPN with the VPN username and password.
Step 3: "Connecting" will be displayed, a while later it will shows "Failed"
5. Please provide more details on how the network is configured?
Phone: LTE connection
VPN server: A Synology rt1900ac router connected directly to home broadband. The router is running with package "VPN Server" to provide the VPN functionality. The router is running SRM 1.1-6338 firmware and the "VPN Server" package is running 1.3-2479. The option "Enable SHA2-256 compatible mode (96 bit)" in package "VPN Server" should not be enabled. That option is added by Synology to allow Android N connected to the VPN server. See the change log for version 1.3.0-2734 onhttps://www.synology.com/en-global/releaseNote/VPNCenter
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
Yes, I can connect to the VPN using Windows 10 and OS X El Capitan.
1. Which Android build are you using? (e.g. NRD90M)?
NRD90R
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100% of the time
4. What steps do others need to take in order to reproduce the issue themselves?
Step 1: Setup a "L2TP/IPSec PSK" VPN connection with IPSec pre-shared key only. (No L2TP password and no IPSec identifier are used)
Step 2: Connect to the VPN with the VPN username and password.
Step 3: "Connecting" will be displayed, a while later it will shows "Failed"
5. Please provide more details on how the network is configured?
Phone: LTE connection
VPN server: A Synology rt1900ac router connected directly to home broadband. The router is running with package "VPN Server" to provide the VPN functionality. The router is running SRM 1.1-6338 firmware and the "VPN Server" package is running 1.3-2479. The option "Enable SHA2-256 compatible mode (96 bit)" in package "VPN Server" should not be enabled. That option is added by Synology to allow Android N connected to the VPN server. See the change log for version 1.3.0-2734 on
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
Yes, I can connect to the VPN using Windows 10 and OS X El Capitan.
ja...@flapadar.co.uk <ja...@flapadar.co.uk> #195
Confirmed still an issue in NRD90R
a....@googlemail.com <a....@googlemail.com> #196
As head of IT , I will advise the management to exchange all Androids to IPhones ! Google may develop toy!
jn...@gmail.com <jn...@gmail.com> #197
1. Which Android build are you using? (e.g. NRD90M)?
NRD90R
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100% of the time
4. What steps do others need to take in order to reproduce the issue themselves?
Step 1: Setup a "L2TP/IPSec PSK" VPN connection with IPSec pre-shared key only. (No L2TP password and no IPSec identifier are used)
Step 2: Connect to the VPN with the VPN username and password.
Step 3: "Connecting" will be displayed, a while later it will shows "Failed"
5. Please provide more details on how the network is configured?
Phone: LTE connection
VPN server: A Synology rt1900ac router connected directly to home broadband. The router is running with package "VPN Server" to provide the VPN functionality. The router is running SRM 1.1-6338 firmware and the "VPN Server" package is running 1.3-2479. The option "Enable SHA2-256 compatible mode (96 bit)" in package "VPN Server" should not be enabled. That option is added by Synology to allow Android N connected to the VPN server. See the change log for version 1.3.0-2734 onhttps://www.synology.com/en-global/releaseNote/VPNCenter
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
Yes, I can connect to the VPN using Windows 10.
NRD90R
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100% of the time
4. What steps do others need to take in order to reproduce the issue themselves?
Step 1: Setup a "L2TP/IPSec PSK" VPN connection with IPSec pre-shared key only. (No L2TP password and no IPSec identifier are used)
Step 2: Connect to the VPN with the VPN username and password.
Step 3: "Connecting" will be displayed, a while later it will shows "Failed"
5. Please provide more details on how the network is configured?
Phone: LTE connection
VPN server: A Synology rt1900ac router connected directly to home broadband. The router is running with package "VPN Server" to provide the VPN functionality. The router is running SRM 1.1-6338 firmware and the "VPN Server" package is running 1.3-2479. The option "Enable SHA2-256 compatible mode (96 bit)" in package "VPN Server" should not be enabled. That option is added by Synology to allow Android N connected to the VPN server. See the change log for version 1.3.0-2734 on
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
Yes, I can connect to the VPN using Windows 10.
sy...@google.com <sy...@google.com> #198
Hi,
Can you (jnmklaver or VeryCrazyDog) provide the below additional information to look further on this issue.
1. Bug report of the issue.
2. MTU size.
3. Does the network support v4 only, v6 only, dual?
4. Ip address profile of the vpn server.
5. Did we connect using hostname or ip address.
6. Are they using IKEv2 protocol?
Thanks...
Can you (jnmklaver or VeryCrazyDog) provide the below additional information to look further on this issue.
1. Bug report of the issue.
2. MTU size.
3. Does the network support v4 only, v6 only, dual?
4. Ip address profile of the vpn server.
5. Did we connect using hostname or ip address.
6. Are they using IKEv2 protocol?
Thanks...
ve...@gmail.com <ve...@gmail.com> #199
1. Bug report of the issue.
Sorry I don't understand what information you want on this. Would you please explain it further.
2. MTU size.
The MTU size used in IPSec VPN is 1400.
3. Does the network support v4 only, v6 only, dual?
My Synology rt1900ac support both IPv4 and IPv6 and they are both enabled, but my broadband does not provide any IPv6 IP to my router.
4. Ip address profile of the vpn server.
See attached screenshot.
5. Did we connect using hostname or ip address.
I connect to my VPN from my Nexus 5X using IP address.
6. Are they using IKEv2 protocol?
I don't know as there is no related options in the admin page. But I guess it doesn't.
Sorry I don't understand what information you want on this. Would you please explain it further.
2. MTU size.
The MTU size used in IPSec VPN is 1400.
3. Does the network support v4 only, v6 only, dual?
My Synology rt1900ac support both IPv4 and IPv6 and they are both enabled, but my broadband does not provide any IPv6 IP to my router.
4. Ip address profile of the vpn server.
See attached screenshot.
5. Did we connect using hostname or ip address.
I connect to my VPN from my Nexus 5X using IP address.
6. Are they using IKEv2 protocol?
I don't know as there is no related options in the admin page. But I guess it doesn't.
ni...@gmail.com <ni...@gmail.com> #200
After reading this thread and hours of debug, I confirm that the issue is linked to sha256 implementation on Android. Apparently, Android is using a draft version of sha256 with a bad truncation (96 bits) instead of the default RFC truncation (128 bits).
Find below a description of the sha2-truncbug option on Libreswan
The default ESP hash truncation for sha2_256 is 128 bits. Some IPsec implementations (Linux before 2.6.33, some Cisco (2811?) routers) implement the draft version which stated 96 bits. If a draft implementation communicates with an RFC implementation, both ends will reject encrypted packets from each other.
This option enables using the draft 96 bits version to interop with those implementations. Currently the accepted values are no, (the default) signifying default RFC truncation of 128 bits, or yes, signifying the draft 96 bits truncation.
Another workaround is to switch from sha2_256 to sha2_128 or sha2_512.
Find below a description of the sha2-truncbug option on Libreswan
The default ESP hash truncation for sha2_256 is 128 bits. Some IPsec implementations (Linux before 2.6.33, some Cisco (2811?) routers) implement the draft version which stated 96 bits. If a draft implementation communicates with an RFC implementation, both ends will reject encrypted packets from each other.
This option enables using the draft 96 bits version to interop with those implementations. Currently the accepted values are no, (the default) signifying default RFC truncation of 128 bits, or yes, signifying the draft 96 bits truncation.
Another workaround is to switch from sha2_256 to sha2_128 or sha2_512.
ph...@gmail.com <ph...@gmail.com> #201
Works great for me now, after I removed sha256 from my Clavister VPN configuration.
th...@gmail.com <th...@gmail.com> #202
My Nexus 6p has been upgraded to N and still have problems with l2tp vpn. One works the other one does not. The endpoint that works is a Cisco meraki unit and is using ESP 3DES. The endpoint that does not work is a Windows 2008 (non-r2) server using AES 256. The windows end point works fine prior to android 6.0.1. I would be glad to provide a login for google to test with if needed to resolve this problem. As said earlier, I reported this back on #26 and need to see this fixed.
ab...@gmail.com <ab...@gmail.com> #203
I'm having the same problem using Samsung Galaxy S7 on Android 6.0.1 and July 1, 2016 Security Patch level. The VPN server I'm attempting to connect to is a Sonicwall VPN. IOS devices and Windows devices connect with no issues. Only my android cannot.
de...@gmail.com <de...@gmail.com> #204
Same problem with Honor 8 on Android 6.0 security patch June 1, 2016 connecting to a Sonicwall NSA 220 with last firmware.
Sony Z5 on Android 6.0.1 security patch April 1, 2016 is connecting ok.
Sony Z5 on Android 6.0.1 security patch April 1, 2016 is connecting ok.
ph...@gmail.com <ph...@gmail.com> #205
I can also getting this issue with my nexus 5X and draytek vigor 2860 (which used to work fine on my samsung s4).
I'm using build NRD90R
here is the syslog output from router
2016-09-26 19:36:17 sent MR3, ISAKMP SA established with In/Out Index: 34/0
2016-09-26 19:36:17 Matching General Setup key for dynamic ip client...
2016-09-26 19:36:17 NAT-Traversal: Using RFC 3947, peer is NATed
2016-09-26 19:36:17 Matching General Setup key for dynamic ip client...
2016-09-26 19:36:17 Matching General Setup key for dynamic ip client...
2016-09-26 19:36:17 Responding to Main Mode from
2016-09-26 19:35:45 sent MR3, ISAKMP SA established with In/Out Index: 34/0
2016-09-26 19:35:45 Matching General Setup key for dynamic ip client...
2016-09-26 19:35:45 NAT-Traversal: Using RFC 3947, peer is NATed
2016-09-26 19:35:45 Matching General Setup key for dynamic ip client...
2016-09-26 19:35:45 Matching General Setup key for dynamic ip client...
2016-09-26 19:35:45 Responding to Main Mode from
I'm using build NRD90R
here is the syslog output from router
2016-09-26 19:36:17 sent MR3, ISAKMP SA established with In/Out Index: 34/0
2016-09-26 19:36:17 Matching General Setup key for dynamic ip client...
2016-09-26 19:36:17 NAT-Traversal: Using RFC 3947, peer is NATed
2016-09-26 19:36:17 Matching General Setup key for dynamic ip client...
2016-09-26 19:36:17 Matching General Setup key for dynamic ip client...
2016-09-26 19:36:17 Responding to Main Mode from
2016-09-26 19:35:45 sent MR3, ISAKMP SA established with In/Out Index: 34/0
2016-09-26 19:35:45 Matching General Setup key for dynamic ip client...
2016-09-26 19:35:45 NAT-Traversal: Using RFC 3947, peer is NATed
2016-09-26 19:35:45 Matching General Setup key for dynamic ip client...
2016-09-26 19:35:45 Matching General Setup key for dynamic ip client...
2016-09-26 19:35:45 Responding to Main Mode from
le...@gmail.com <le...@gmail.com> #206
For Synology VPN Center on a DS212j I changed in ipsec.conf the value sha2_truncbug=yes (note the underscore). Moreover, I set on my Android Sony Z5 in the advanced settings of VPN Backwardcompatibility to TRUE. Then it works!
je...@gmail.com <je...@gmail.com> #207
I also have this problem on android galaxy tab a.
On android version 6.0.1 build MMB29M.T555XXU1BPDA
Unable to connect to VPN with IPSEC Xauth PSK.
On android 5.0 everything works fine.
On android version 6.0.1 build MMB29M.T555XXU1BPDA
Unable to connect to VPN with IPSEC Xauth PSK.
On android 5.0 everything works fine.
da...@gmail.com <da...@gmail.com> #208
Same issue with both Samsung Galaxy S6 and Nexus 7 LTE (2013) running 6.0.1 ...
I use that feature when I 'm connected to a public wifi or hotel connection. And even for me it's more than annoying so I can imagine for a "normal" company which NEEDS secured vpn every day ...
I wasted too many time troubleshooting this before finding this thread (opened in last december...)
So please google, do something, we are not talking about basic feature, it's a true need for all normal companies...
I use that feature when I 'm connected to a public wifi or hotel connection. And even for me it's more than annoying so I can imagine for a "normal" company which NEEDS secured vpn every day ...
I wasted too many time troubleshooting this before finding this thread (opened in last december...)
So please google, do something, we are not talking about basic feature, it's a true need for all normal companies...
rd...@gmail.com <rd...@gmail.com> #209
I am still have the same problem on Pixel C and Nexus 6 running 7.0. It doesn't work on any of these devices running 6.0.1: LG G5, Nexus 6, Nexus 7 (2013), Galaxy S7, Gpad 8.3 (CM build), and Galaxy Note 5. We use these for running a business, and cannot afford to now wait until Android 8.0 is released. I had to buy a Oneplus X that is still on 5.1 just as a stop gap just to use VPN.
Can we get an official answer from Google confirming this is a priority and there is a fix that will not require waiting on the next android release (not all devices receive timely OS updates in case that is not obvious)? Otherwise we will have to start the process of switching over 60 devices to iOS.
Can we get an official answer from Google confirming this is a priority and there is a fix that will not require waiting on the next android release (not all devices receive timely OS updates in case that is not obvious)? Otherwise we will have to start the process of switching over 60 devices to iOS.
sy...@google.com <sy...@google.com> #210
For comment #211 , this is priority issue and we are working towards fixing this issue. We are gathering the network info to investigate further on this issue. It will be helpful, if you can provide comment #178 and #200 details for devices Pixel C and Nexus 6 running 7.0.
jo...@gmail.com <jo...@gmail.com> #211
This is still an issue with Samsung Note 4 and Samsung Note 7, also... If others are having this issue you can bypass the Google built in VPN stuff sometimes with a third party app. I was able to use Sonicwall Net Extender to get around this since it still isn't fixed.
mt...@gmail.com <mt...@gmail.com> #212
1. Which Android build are you using? (e.g. NRD90M)?
7.0.0 (NBD90W)
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100 %
4. What steps do others need to take in order to reproduce the issue themselves?
Just try to connect (no other steps required). L2TP/IPSec, server address, login, that's all.
5. Please provide more details on how the network is configured?
Internet - Mikrotik (provide L2TP connection) - wifi connection - Nexus 5X.
Try from Internet and Intranet, same result (failed everytime)
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
I'm able to connect from MacOSX, Linux (ubuntu) and Windows 10. Over Internet and from LAN too (over wifi or cable)..
7. Any other details are greatly appreciated
Just try the hell it by yourself. It's not too hard configure L2TP server. And NEVER will work it for you too.
Tested on many devices from 5.0.1, 6.0, 7.0
7.0.0 (NBD90W)
2. Which device did you use to reproduce this issue (e.g. Nexus 5X)?
Nexus 5X
3. How frequently does this issue occur? (e.g 100% of the time, 10% of the time)
100 %
4. What steps do others need to take in order to reproduce the issue themselves?
Just try to connect (no other steps required). L2TP/IPSec, server address, login, that's all.
5. Please provide more details on how the network is configured?
Internet - Mikrotik (provide L2TP connection) - wifi connection - Nexus 5X.
Try from Internet and Intranet, same result (failed everytime)
6. Can you connect to same network [which is failed with Nexus N device] using some other OS e.g. mac or Linux or windows?
I'm able to connect from MacOSX, Linux (ubuntu) and Windows 10. Over Internet and from LAN too (over wifi or cable)..
7. Any other details are greatly appreciated
Just try the hell it by yourself. It's not too hard configure L2TP server. And NEVER will work it for you too.
Tested on many devices from 5.0.1, 6.0, 7.0
Ye...@btopenworld.com <Ye...@btopenworld.com> #213
This is becoming a joke. It's now over a year. My Android devices have been relegated to home video players. You need VPN to do anything these days over public WIFI. As post 214 says - it's not hard to replicate, 100% of the time it will not work on V6. The fact that google continue to ask for more info is simple timewasting and delaying tactics. I also do not believe it is hard to fix. In my opinion, for some obscure reason, they simply do not want people to use secure communications. Post 211 - start moving to the Apple stuff, it works 100%. I made that decision because we had to have VPN a year ago, and much as I hate Apple, I have to admit I appreciate the fact it always works. Windows works fine too..
ve...@gmail.com <ve...@gmail.com> #214
I hate to say but I agree with #215 that it could be a delaying tactics. Setup VPN server using Linux maybe time consuming (and I gave up at the end because it is too complicated to me), but I don't think it is very difficult to buy a router and enable VPN server. With the environment set, someone can get whatever information they want.
Maybe next time, instead of begging for details, someone may beg us for providing a testing environment, or even beg us for fixing the bug directly in the source code...
Maybe next time, instead of begging for details, someone may beg us for providing a testing environment, or even beg us for fixing the bug directly in the source code...
[Deleted User] <[Deleted User]> #215
SHA1 is the solution!
Dont forget to use both aes-256cbc and aes128cbc (ENCRYPTION)
Dont forget to use both aes-256cbc and aes128cbc (ENCRYPTION)
a....@googlemail.com <a....@googlemail.com> #216
SHA1 dosn't works for me! Nexus 6; Android 6.01; Sonicwall NSA 3600
ja...@gmail.com <ja...@gmail.com> #217
Same issue here.
Oneplus 2, Android 6.0.1 - L2TP/IPsec not connecting to my VPN-router via WiFi or 4G/LTE/3G/2G.
Same settings on an old Samsung (Android 4.4.2 - different service provider) connects just fine (L2TP/IPsec - WiFi and 4G/LTE/etc.).
Could also be a problem with my provider, but I don't think so since the connection also fails when connected to WiFi only.
Please fix ASAP
Oneplus 2, Android 6.0.1 - L2TP/IPsec not connecting to my VPN-router via WiFi or 4G/LTE/3G/2G.
Same settings on an old Samsung (Android 4.4.2 - different service provider) connects just fine (L2TP/IPsec - WiFi and 4G/LTE/etc.).
Could also be a problem with my provider, but I don't think so since the connection also fails when connected to WiFi only.
Please fix ASAP
de...@gmail.com <de...@gmail.com> #218
My samsung galaxy S7 Edge also still failed to connect VPN server both L2TP or PPTP to my synology VPN server, work fine with my iphone.
ab...@gmail.com <ab...@gmail.com> #219
The Security Patch dated September 1, 2016 resolved the VPN issue on my Samsung Galaxy S7, using Android Version 6.0.1
ch...@gmail.com <ch...@gmail.com> #220
Note 5 still not working. Please fix this.
ob...@gmail.com <ob...@gmail.com> #221
To all Synology VPN Server Users:
I fixed it by Activating SHA-256-Compatible Mode(96Bit).
Running Andoid 6.0.
I fixed it by Activating SHA-256-Compatible Mode(96Bit).
Running Andoid 6.0.
a....@googlemail.com <a....@googlemail.com> #222
NOT FIXED IN 10/2016 UPDATE !!! GREAT JOB GOOGLE !!!
ja...@gmail.com <ja...@gmail.com> #223
Updating my routers firmware apparently solved this issue for me...
TP-Link (TL-ER604W).
http://static.tp-link.com/resources/software/TL-ER604W(UN)v1_en_1.1.1_20160622-rel37338_up.zip
According to TP-Link support this is BETA firmware. I haven't seen a change log yet and I don't know how stable this new version is yet.
Yes, I updated before reading the change log. Wouldn't normally do that!!!
TP-Link (TL-ER604W).
According to TP-Link support this is BETA firmware. I haven't seen a change log yet and I don't know how stable this new version is yet.
Yes, I updated before reading the change log. Wouldn't normally do that!!!
de...@protonmail.com <de...@protonmail.com> #224
I didn't change anything in my router configuration but I did decide my phone needed an update and wipe/format/reset. Didn't upgrade any firmware per se, still on 6.0.1, but has now started working seamlessly, so I consider this issue fixed. Thanks.
ho...@hotmail.com <ho...@hotmail.com> #225
#178 "We need inputs from Nexus device users with Android N only."
I hope this comment doesn't mean it will not be fixed for other devices. I have a few months old LG G5 running 6.0.1 with this exact issue, unsuccessful 100% of the time. I need this VPN security to work abroad, you need to support existing devices too.
The same VPN works 100% of the time on my Nexus 4 running 5.1.1 and 100% too on both Windows 7 and Windows 10, there's simply no excuse why Android 6.0.1 cannot support this, especially almost a year after it was reported.
This is a serious security problem, people rely on this, the wait has already been too long. Workarounds using PPTP or downgrading to a draft RFC is not acceptable nor responsible.
I hope this comment doesn't mean it will not be fixed for other devices. I have a few months old LG G5 running 6.0.1 with this exact issue, unsuccessful 100% of the time. I need this VPN security to work abroad, you need to support existing devices too.
The same VPN works 100% of the time on my Nexus 4 running 5.1.1 and 100% too on both Windows 7 and Windows 10, there's simply no excuse why Android 6.0.1 cannot support this, especially almost a year after it was reported.
This is a serious security problem, people rely on this, the wait has already been too long. Workarounds using PPTP or downgrading to a draft RFC is not acceptable nor responsible.
a....@googlemail.com <a....@googlemail.com> #226
This bug already exist 16 months! Could you please fix it !!! Now!!! What are you doing this all day long ???
ka...@gmail.com <ka...@gmail.com> #227
No need for your whining, #228.
Reporting that my VPN is working with no issues.
Device: LG-V10 (LS990) on 6.0 build MRA58K.
VPN is L2TP/IPsec with PSK.
VPN running on a Ubiquiti EdgeRouter Lite.
Reporting that my VPN is working with no issues.
Device: LG-V10 (LS990) on 6.0 build MRA58K.
VPN is L2TP/IPsec with PSK.
VPN running on a Ubiquiti EdgeRouter Lite.
ph...@gmail.com <ph...@gmail.com> #228
google can we please get an update / ETA on this?
Nexus 5X - NRD91D build still not working for me with draytek vigor 2860n router
Nexus 5X - NRD91D build still not working for me with draytek vigor 2860n router
rd...@gmail.com <rd...@gmail.com> #229
Still does not weork on Pixel C running 7.1.1
al...@gmail.com <al...@gmail.com> #230
Please solve this prob with vpn l2tp over ipsec nexus 5, 6.0.1
pa...@myitcv.org.uk <pa...@myitcv.org.uk> #231
Also seeing this issue on Pixel 7.1 (5 October 2016 security patch level)
Comparing the connection logs (strongswan VPN) of Android vs my MacBook Pro, XAuth authentication succeeds, but Android then fails to respond when the server gets to the phase of sending a transaction relating to UNITY_SPLIT_INCLUDE:
generating TRANSACTION response 123456789 [ HASH CPRP(ADDR U_SPLITINC) ]
No response received on the server when Android is connecting... MacBook Pro responds and then continues with further phases.
Comparing the connection logs (strongswan VPN) of Android vs my MacBook Pro, XAuth authentication succeeds, but Android then fails to respond when the server gets to the phase of sending a transaction relating to UNITY_SPLIT_INCLUDE:
generating TRANSACTION response 123456789 [ HASH CPRP(ADDR U_SPLITINC) ]
No response received on the server when Android is connecting... MacBook Pro responds and then continues with further phases.
ra...@gmail.com <ra...@gmail.com> #232
Same isue with LG G3, L2TP/IPsec not working with Android 6.0.1
lo...@google.com <lo...@google.com> #233
As others have noted, the SHA2 parameters used by default in Linux are incompatible with RFC-compliant implementations. This code is in the Linux kernel, not in Android, so the behaviour can vary across different manufacturers and across different devices from the same manufacturer.
Because this is an incompatibility issue, there is no easy solution here other than reconfiguring the server to change the SHA2 parameters (e.g., via "sha2-truncbug=yes") or by disabling SHA2. For example:
- Disabling SHA2 in the Android VPN client will break currently-working setups that use SHA2.
- Changing the default SHA2 parameters on individual devices will make some VPN currently-broken setups start working, but will break some currently-broken setups.
- Adding a setting to change the parameters at runtime is non-trivial due to the way the client is structured.
Eventually, Android will adopt the RFC behaviour, but changing the default in a minor OS update is likely unacceptable because it will break existing setups.
Because this is an incompatibility issue, there is no easy solution here other than reconfiguring the server to change the SHA2 parameters (e.g., via "sha2-truncbug=yes") or by disabling SHA2. For example:
- Disabling SHA2 in the Android VPN client will break currently-working setups that use SHA2.
- Changing the default SHA2 parameters on individual devices will make some VPN currently-broken setups start working, but will break some currently-broken setups.
- Adding a setting to change the parameters at runtime is non-trivial due to the way the client is structured.
Eventually, Android will adopt the RFC behaviour, but changing the default in a minor OS update is likely unacceptable because it will break existing setups.
ma...@gmail.com <ma...@gmail.com> #234
This fixed the on my idea.
Android 6 samsung galaxy s6 latest software update) vpn server on synology diskstation latest version.
Go to your vpn settings on diskstation and tick the following option Tick "Enable SHA2-256 compatible mode (96 bit)"
Hope this helps you.
Android 6 samsung galaxy s6 latest software update) vpn server on synology diskstation latest version.
Go to your vpn settings on diskstation and tick the following option Tick "Enable SHA2-256 compatible mode (96 bit)"
Hope this helps you.
ph...@gmail.com <ph...@gmail.com> #235
Rather than change the default implementation in android. Is it not possible to add a configuration option in the Android implementation to allow compatability with rfc compliant devices?
a....@googlemail.com <a....@googlemail.com> #236
@#235 bullshit! Every firewall / VPN appliance is based on Linux! Think about what you're actually writing about???
lo...@google.com <lo...@google.com> #237
For more context: a change was proposed to upstream Linux in 2012 to change the default, but it was not accepted upstream for backwards compatibility reasons.
http://lists.openwall.net/linux-kernel/2012/03/07/528
http://lists.openwall.net/linux-kernel/2012/03/08/8
je...@gmail.com <je...@gmail.com> #238
I desperately need "IpSec Xauth PSK" to connect to our systems if I'm not at work.
And the update to 6.0.1 broke it on my J5.
@#235 and #238
if it's really the Linux kernel, why did it work in Lollipop and why does it still work with third-party programs like VpnCilla ?
If a third-party program works, it should also be able for the core OS to connect or am I missing something ?
And the update to 6.0.1 broke it on my J5.
@#235 and #238
if it's really the Linux kernel, why did it work in Lollipop and why does it still work with third-party programs like VpnCilla ?
If a third-party program works, it should also be able for the core OS to connect or am I missing something ?
lo...@google.com <lo...@google.com> #239
I think the compatibility problem was created because 6.0.1 enabled SHA2.
jo...@gmail.com <jo...@gmail.com> #240
I programmed my VPN device and Android (Note 4) to use SHA256 and then SHA512 and neither worked. I'm now relying on third party VPN solutions and things are going well with them - not so much Android's built in solution...
a....@googlemail.com <a....@googlemail.com> #241
and if it's really the Linux kernel, why i can estebish a l2tp vpn from and centos 7.3 client to my firewall???
ja...@gmail.com <ja...@gmail.com> #242
Come on guys, the only way I can access my VPN remotely is to turn my HTC 10 into a hotspot and use my IPad to create the VPN tunnel, bit sad for android really!
an...@gmail.com <an...@gmail.com> #243
[Comment deleted]
an...@gmail.com <an...@gmail.com> #244
Switched to Apple with 190 devices... Works like a charm now. 420 will follow. Waiting for a year is not acceptable.
zd...@tdoservices.cz <zd...@tdoservices.cz> #245
Hello Google, who is the responsible manager for the VPN? Please send me the contact email for him/her. Thanks . We need to swith to Apple if there is no solution really fast..
a....@googlemail.com <a....@googlemail.com> #246
I think it's the best to switch to Apple! We are just changing! Google has nothing to offer in the business sector. And we will also spell the Google pro accounts!
fm...@gmail.com <fm...@gmail.com> #247
Hello Google, I can not afford to throw 4 android phones. 6.0 (g4 lg, htc one, honor 7, lg g pad etc.) To buy iphone ..... I necessity to work with vpn. solve the problem soon !!!!!!!! otherwise I will be forced to invest on Iphone and do not use NEVER ANDROID. Thank you
je...@gmail.com <je...@gmail.com> #248
Any news about the solution for this big problem?
an...@gmail.com <an...@gmail.com> #249
[Comment deleted]
an...@gmail.com <an...@gmail.com> #250
Maybe not very helpful if you got more devices, but problem is fixed in cyanogenmod.
Just root your devices. Due to the fact that we switched to apple i know got a bunch of devices to play with.
Just root your devices. Due to the fact that we switched to apple i know got a bunch of devices to play with.
lo...@google.com <lo...@google.com> #251
For those who have this problem, can you test whether it is fixed by:
- Disabling SHA2 in the server config, or:
- Changing the SHA2 truncation in the server using "sha2-truncbug=yes" (or equivalent on other VPN server).
- Disabling SHA2 in the server config, or:
- Changing the SHA2 truncation in the server using "sha2-truncbug=yes" (or equivalent on other VPN server).
sl...@gmail.com <sl...@gmail.com> #252
For me since my VPN server does not run Linux or something based off of
Linux, I had to disable SHA2 entirely and revert back to SHA1 to make it
work.
Reilly
Linux, I had to disable SHA2 entirely and revert back to SHA1 to make it
work.
Reilly
je...@gmail.com <je...@gmail.com> #253
I need to connect to a Lancom 1722 and a Lancom 7111, both don't know anything about SHA2, both worked with ANdroid 5.1 and both stopped to work after update to 6.0.1.
So SHA2 can not be the (only) problem.
Jens
So SHA2 can not be the (only) problem.
Jens
ho...@hotmail.com <ho...@hotmail.com> #254
#253: The fix you suggest lowers the VPN server security, it is not acceptable nor responsible. Enterprises or users shouldn't do this, I wish I could afford switching to Apple as others here already did.
This issue has been the highest ranked critical issue for a few months already, I hope we won't reach its 1st year anniversary:
https://code.google.com/p/android/issues/list?can=2&q=Priority:Critical&sort=-stars
This issue has been the highest ranked critical issue for a few months already, I hope we won't reach its 1st year anniversary:
ri...@richardreiner.com <ri...@richardreiner.com> #255
Re #253: Lorenzo,
Confirmed that setting sha2-truncbug=yes (on libreswan 3.15) enables the Android client to associate correctly with the VPN server and the resulting link is functional.
But of course as others point out this also breaks other flavors of client, so it is not an acceptable solution; while on the other hand the alternate solution of disabling sha2 entirely is not acceptable from a security point of view.
Confirmed that setting sha2-truncbug=yes (on libreswan 3.15) enables the Android client to associate correctly with the VPN server and the resulting link is functional.
But of course as others point out this also breaks other flavors of client, so it is not an acceptable solution; while on the other hand the alternate solution of disabling sha2 entirely is not acceptable from a security point of view.
an...@gmail.com <an...@gmail.com> #256
I can confirm that this is not working. Nexus 5X, Android 7.0.
L2TP/IPSC PSK.
L2TP/IPSC PSK.
jk...@gmail.com <jk...@gmail.com> #257
Google pixel running 7.1 and still does not work. Pretty obvious Google has no plans of fixing the issue. Thanks a lot Google. L2TP/IPSC PSK.
a....@googlemail.com <a....@googlemail.com> #258
GOOGLE??? absolut unprofessionell!!!
pa...@gmail.com <pa...@gmail.com> #259
GOOGLE, please, fix the VPN. I need l2tp/ipsec very much
mi...@gmail.com <mi...@gmail.com> #261
I have two android devices with this same issue. Both are stock android, non-rooted.
Nexus 6 running 7.0
Nexus 9 running 7.1.1
Devices that work without issue are:
Macbook Air running MacOS 10.12.1
Ipad Mini 2 running iOS 10.1.1
Windows 10 v1607 Enterprise Laptop
Windows 7 Laptop with current updates
If i change the "sha2-truncbug=yes" setting on my VPN server device, the two android devices can connect, but the devices that work without issues otherwise cannot, assuming an android device connects first.
The "truncbug" setting reduces both security and compatibility for my environment.
It is not a viable option long-term.
(The setting itself has the word "bug" in it...)
I can provide more details as needed.
Nexus 6 running 7.0
Nexus 9 running 7.1.1
Devices that work without issue are:
Macbook Air running MacOS 10.12.1
Ipad Mini 2 running iOS 10.1.1
Windows 10 v1607 Enterprise Laptop
Windows 7 Laptop with current updates
If i change the "sha2-truncbug=yes" setting on my VPN server device, the two android devices can connect, but the devices that work without issues otherwise cannot, assuming an android device connects first.
The "truncbug" setting reduces both security and compatibility for my environment.
It is not a viable option long-term.
(The setting itself has the word "bug" in it...)
I can provide more details as needed.
ha...@gmail.com <ha...@gmail.com> #262
Not working on Zenfone 3 Android 6.0.1 as well.
je...@gmail.com <je...@gmail.com> #263
We passed the 1 year millstone, is there any update google?
ra...@gmail.com <ra...@gmail.com> #264
I have a Moto Z, same Problem. VPN from Windows or IOS works, so it is definetly a Android problem
a....@googlemail.com <a....@googlemail.com> #265
This problem is definetly fixable, because Samsung has fix the VPN L2TP problem on Galaxy S7!
jk...@gmail.com <jk...@gmail.com> #266
Yeah it just seems like google doesn't care to fix it. Way to care about your customers!!
cl...@gmail.com <cl...@gmail.com> #267
So this is just not going to get fixed I guess? Are there any workarounds?
ry...@gmail.com <ry...@gmail.com> #268
Added the following lines to ipsec.conf:
ike=aes256-sha1,aes128-sha1,3des-sha1
phase2alg=aes256-sha1,aes128-sha1,3des-sha1
Which I believe only allows SHA1 connections, at least thats what I was able to ascertain from searches on the matter. Even with this setting, I still cant connect from my Nexus 6P on 7.1.1 NMF26F.
Does anyone know if those are the correct parameters to disable SHA_2
ike=aes256-sha1,aes128-sha1,3des-sha1
phase2alg=aes256-sha1,aes128-sha1,3des-sha1
Which I believe only allows SHA1 connections, at least thats what I was able to ascertain from searches on the matter. Even with this setting, I still cant connect from my Nexus 6P on 7.1.1 NMF26F.
Does anyone know if those are the correct parameters to disable SHA_2
ma...@gmail.com <ma...@gmail.com> #269
How is a company like google not able to fix this bug within a whole year?
gu...@gmail.com <gu...@gmail.com> #270
Same on honor 7 with EMUI 4.0.1 (6.0) PLK-L01C432B380
ry...@gmail.com <ry...@gmail.com> #271
Does the native client in Android 7.1.1 no longer support SHA1? My openSWAN logs only show the Nexus 6P client requesting SHA2: IPsec SA established tunnel mode {ESP/NAT=>0x0a0345aa <0xb262f671 xfrm=AES_256-HMAC_SHA2_256 NATOA=none NATD=x.y.z.w:36918 DPD=active XAUTHuser=xxxxxx}
Just wondering if anyone was able to get their Android client running 6.0 or later to connect using SHA1 hashing. The only thing that worked for me was to add "SHA2-truncbug-yes" into my ipsec.conf file. Like others have said this breaks compatibility with clients that properly support 128 bit SHA2 hashing and not the draft 96 bit spec that appears to still be used in the native Android client.
In addition, should issues 194269 and 226180 be merged with this issue since they are all essentially the same problem. Also, this report has a critical priority versus small on the other two...
Just wondering if anyone was able to get their Android client running 6.0 or later to connect using SHA1 hashing. The only thing that worked for me was to add "SHA2-truncbug-yes" into my ipsec.conf file. Like others have said this breaks compatibility with clients that properly support 128 bit SHA2 hashing and not the draft 96 bit spec that appears to still be used in the native Android client.
In addition, should issues 194269 and 226180 be merged with this issue since they are all essentially the same problem. Also, this report has a critical priority versus small on the other two...
ry...@gmail.com <ry...@gmail.com> #272
Relevant LibreSWAN bug report: https://bugs.libreswan.org/show_bug.cgi?id=251
The Android IPsec client needs to be updated, this issue report is now over two years old...
The Android IPsec client needs to be updated, this issue report is now over two years old...
an...@gmail.com <an...@gmail.com> #273
Still bad implementation in 7.0....
I'm laughing my ass off...
I'm laughing my ass off...
[Deleted User] <[Deleted User]> #274
Android 7.1, how the hell my L2TP/IPSec works when run natively from Android GUI but not from commandline, it runs "mtpd", "racoon", "pppd" in the background but I cannot collect the paramaters from /proc/<pid>/cmdline, they are stripped so I can run mtpd by myself. Any idea how to get the parameters from the Java frontend ?
I have tried to replace /system/bin/racoon and /system/bin/mtpd with scripts like:
#!/system/bin/sh
echo $@ >> /sdcard/my.log
/system/bin/mtpd.bak $@
But didn't help me to collect parameters.
I think /etc/init/ has some other way to start and pass parameters to those:
bullhead:/etc/init # cat mtpd.rc
service mtpd /system/bin/mtpd
class main
socket mtpd stream 600 system system
user vpn
group vpn net_admin inet net_raw
disabled
oneshot
bullhead:/etc/init # cat racoon.rc
service racoon /system/bin/racoon
class main
socket racoon stream 600 system system
# IKE uses UDP port 500. Racoon will setuid to vpn after binding the port.
group vpn net_admin inet
disabled
oneshot
Please advise, I'm lost on how to start racoon and mtpd to get it running like the Android GUI starts it. This is about parameters/ways of starting just as the connection runs fine when started from GUI.
I have tried to replace /system/bin/racoon and /system/bin/mtpd with scripts like:
#!/system/bin/sh
echo $@ >> /sdcard/my.log
/system/bin/mtpd.bak $@
But didn't help me to collect parameters.
I think /etc/init/ has some other way to start and pass parameters to those:
bullhead:/etc/init # cat mtpd.rc
service mtpd /system/bin/mtpd
class main
socket mtpd stream 600 system system
user vpn
group vpn net_admin inet net_raw
disabled
oneshot
bullhead:/etc/init # cat racoon.rc
service racoon /system/bin/racoon
class main
socket racoon stream 600 system system
# IKE uses UDP port 500. Racoon will setuid to vpn after binding the port.
group vpn net_admin inet
disabled
oneshot
Please advise, I'm lost on how to start racoon and mtpd to get it running like the Android GUI starts it. This is about parameters/ways of starting just as the connection runs fine when started from GUI.
jk...@gmail.com <jk...@gmail.com> #275
So why is it we can't get a response from google on this issue. Is it going to be fixed or not? If so when can we expect the update with the fix? Let us know something!
lo...@google.com <lo...@google.com> #276
We are aware of this issue and are taking steps to address it.
To recap: we believe the root issue here is an interoperability issue between the non-RFC-compilant Android (Linux default) implementation of SHA256 and RFC-compliant VPN servers.
Currently, available workarounds are:
a) Change the server configuration to enable sha2_truncbug.
b) Change the server configuration to disable SHA256 in ESP and use SHA1 instead.
We realize that a) may not be feasible on some servers, and where it is, it may make it impossible to use the same VPN account on both Android and RFC-compliant devices. We also realize that b) decreases security. Therefore, current thinking is to do the following:
1. Enable SHA384 and SHA512 in an N maintenance release. This will provide a way to avoid the interoperability issue without decreasing security, at the cost of some additional overhead. This may still require changes to VPN servers to enable those algorithms, but at least those changes will not reduce security. Note that this will only work if the device kernel (which is not Android code, but device-specific code) supports SHA384 and SHA512 in.
2. On Nexus / Pixel devices, change the default behaviour of the SHA256 implementation to the RFC-compliant behaviour in the next major release of Android. Again, because the issue is in device-specific code, every OEM will have to do this for their own devices.
We could consider doing #2 in a minor update to N instead of in the next major release of Android, but we are concerned that this will break currently-working setups.
Bear in mind that there is nothing that Google or the Android team can do to either a) fix non-Nexus devices (the OEM controls the code and builds) or b) update past releases of Android (since carrier policies don't typically allow this).
Constructive feedback appreciated.
To recap: we believe the root issue here is an interoperability issue between the non-RFC-compilant Android (Linux default) implementation of SHA256 and RFC-compliant VPN servers.
Currently, available workarounds are:
a) Change the server configuration to enable sha2_truncbug.
b) Change the server configuration to disable SHA256 in ESP and use SHA1 instead.
We realize that a) may not be feasible on some servers, and where it is, it may make it impossible to use the same VPN account on both Android and RFC-compliant devices. We also realize that b) decreases security. Therefore, current thinking is to do the following:
1. Enable SHA384 and SHA512 in an N maintenance release. This will provide a way to avoid the interoperability issue without decreasing security, at the cost of some additional overhead. This may still require changes to VPN servers to enable those algorithms, but at least those changes will not reduce security. Note that this will only work if the device kernel (which is not Android code, but device-specific code) supports SHA384 and SHA512 in.
2. On Nexus / Pixel devices, change the default behaviour of the SHA256 implementation to the RFC-compliant behaviour in the next major release of Android. Again, because the issue is in device-specific code, every OEM will have to do this for their own devices.
We could consider doing #2 in a minor update to N instead of in the next major release of Android, but we are concerned that this will break currently-working setups.
Bear in mind that there is nothing that Google or the Android team can do to either a) fix non-Nexus devices (the OEM controls the code and builds) or b) update past releases of Android (since carrier policies don't typically allow this).
Constructive feedback appreciated.
mi...@gmail.com <mi...@gmail.com> #277
Thank you for the response to this.
In a perfect world, I would prefer that all three suggestions are eventually implemented.
>Enable SHA384 and SHA512 in an N maintenance release.
I don't necessarily see the down-side of future-proofing the stock Android LT2P VPN implementation.
>On Nexus / Pixel devices, change the default behaviour of the SHA256 implementation to the
>RFC-compliant behaviour in the next major release of Android.
Once again, I think this is a great idea in the long run, but I fear that my personal Android devices are not/will not be candidates for the next major release of Android. My personal fears aside, I hope and believe that this is the path to take in the long run (since this apparently has been an issue since 6.0.1).
>We could consider doing #2 in a minor update to N instead of in the next major release
>of Android, but we are concerned that this will break currently-working setups.
This addresses my personal device future-compatibility fears, and I think that potentially inconveniencing
third 3rd Party VPN vendors that have written specific code to work around this specific Android behavior by replacing the Android VPN implementation with RFC compliant code will work out for everyone in the end.
I've also opened a ticket with Synology to see what their current/future compatibility plans with SHA384/512 for their L2TP implementation are.
In a perfect world, I would prefer that all three suggestions are eventually implemented.
>Enable SHA384 and SHA512 in an N maintenance release.
I don't necessarily see the down-side of future-proofing the stock Android LT2P VPN implementation.
>On Nexus / Pixel devices, change the default behaviour of the SHA256 implementation to the
>RFC-compliant behaviour in the next major release of Android.
Once again, I think this is a great idea in the long run, but I fear that my personal Android devices are not/will not be candidates for the next major release of Android. My personal fears aside, I hope and believe that this is the path to take in the long run (since this apparently has been an issue since 6.0.1).
>We could consider doing #2 in a minor update to N instead of in the next major release
>of Android, but we are concerned that this will break currently-working setups.
This addresses my personal device future-compatibility fears, and I think that potentially inconveniencing
third 3rd Party VPN vendors that have written specific code to work around this specific Android behavior by replacing the Android VPN implementation with RFC compliant code will work out for everyone in the end.
I've also opened a ticket with Synology to see what their current/future compatibility plans with SHA384/512 for their L2TP implementation are.
ma...@gmail.com <ma...@gmail.com> #278
1. I agree, adding SHA384 and SHA512 would be a great first step. I hope this can be done in the next minor release. I prefer security over performance.
2. For the long term, I think Android should be RFC-compliant. To avoid breaking existing setups, an (advanced) option could be added in the next minor release which can perhaps be removed in a major release. But I can understand that you are reluctant to throw in another knob.
2. For the long term, I think Android should be RFC-compliant. To avoid breaking existing setups, an (advanced) option could be added in the next minor release which can perhaps be removed in a major release. But I can understand that you are reluctant to throw in another knob.
lo...@google.com <lo...@google.com> #279
Update: in the next minor release, on devices that receive it:
1. SHA384 and SHA512 will be advertised and used if the device kernel was compiled with CONFIG_CRYPTO_SHA512. If the kernel does not support it, it will not be advertised. Bear in mind that the kernel differs from device to device and only the device manufacturer can enable the option if it's not already enabled.
2. Nexus and Pixel kernels have CONFIG_CRYPTO_SHA512 enabled and will use them if negotiated.
3. The SHA256 proposal is listed after SHA1, so VPN servers that pick the first acceptable proposal sent by the peer will use (working) SHA1 instead of (possibly non-interoperable) SHA256.
1. SHA384 and SHA512 will be advertised and used if the device kernel was compiled with CONFIG_CRYPTO_SHA512. If the kernel does not support it, it will not be advertised. Bear in mind that the kernel differs from device to device and only the device manufacturer can enable the option if it's not already enabled.
2. Nexus and Pixel kernels have CONFIG_CRYPTO_SHA512 enabled and will use them if negotiated.
3. The SHA256 proposal is listed after SHA1, so VPN servers that pick the first acceptable proposal sent by the peer will use (working) SHA1 instead of (possibly non-interoperable) SHA256.
mi...@gmail.com <mi...@gmail.com> #280
I got a follow up response from Synology and here's their reply regarding their VPN Server Implementation supporting SHA levels higher than 256:
"Our team confirmed that currently the VPN does not support those two SHA levels. They have, however, noted this as a feature request for possible future integration."
This makes me wonder what other VPN vendors/appliances currently support SHA384 or SHA512 in their devices (or have plans to).
>3. The SHA256 proposal is listed after SHA1, so VPN servers that pick the first acceptable proposal >sent by the peer will use (working) SHA1 instead of (possibly non-interoperable) SHA256.
So the plan for the moment is to make no changes to the "possibly non-interoperable" SHA256 implementation in the Android VPN client?
"Our team confirmed that currently the VPN does not support those two SHA levels. They have, however, noted this as a feature request for possible future integration."
This makes me wonder what other VPN vendors/appliances currently support SHA384 or SHA512 in their devices (or have plans to).
>3. The SHA256 proposal is listed after SHA1, so VPN servers that pick the first acceptable proposal >sent by the peer will use (working) SHA1 instead of (possibly non-interoperable) SHA256.
So the plan for the moment is to make no changes to the "possibly non-interoperable" SHA256 implementation in the Android VPN client?
ma...@gmail.com <ma...@gmail.com> #281
Will this be in the upcoming 7.1.2 release?
al...@gmail.com <al...@gmail.com> #282
When comes the minor Release?
al...@gmail.com <al...@gmail.com> #283
One question i have. Why did u made an update that doesn't work? And then u say, sorry for nexus 5 it will be the last update. But you can buy a new google pixel for over 800,-!
al...@gmail.com <al...@gmail.com> #284
Is the release for nexus 5 too? If not, it's no solution for my problem!
Am 26.01.2017 16:58 schrieb <android@googlecode.com>:
Am 26.01.2017 16:58 schrieb <android@googlecode.com>:
or...@gmail.com <or...@gmail.com> #285
When will the next minor release be released?
ma...@gmail.com <ma...@gmail.com> #286
any ETA for the new minor?
an...@gmail.com <an...@gmail.com> #287
Someone @google is laughing his ass off right now...
an...@gmail.com <an...@gmail.com> #288
Sha1 officially shattered.... By yourself (Google). So please stop recommending sha1 Fallback..
https://shattered.it
ho...@gmail.com <ho...@gmail.com> #289
I have the same problem on a Google Pixel running 7.1.1.
jd...@gmail.com <jd...@gmail.com> #290
I had the same issue with my Samsung galaxy s5. I read all comments and there was one person who said it was the power saving mode. This was it!!! I turned off power save and it connected instantly. Thank you!!!!
en...@gmail.com <en...@gmail.com> #291
I am using S7 Edge with Android 7.0 and the VPN still not working with Cisco. Any update?
pt...@gmail.com <pt...@gmail.com> #292
Nexus5X same Problem with 7.1.1 March Update!!!
dj...@gmail.com <dj...@gmail.com> #293
Not working for me on my Sony Xperia Z3 running Android 6.0.1
mi...@gmail.com <mi...@gmail.com> #294
ok. it is not working on s7 edge nougat 7.0
but works like a charm on other s4 lolipop.
can google fix this or are they ignoring us.
but works like a charm on other s4 lolipop.
can google fix this or are they ignoring us.
mt...@gmail.com <mt...@gmail.com> #295
I'm guessing Lorenzo was talking about the 7.1.2 release. At this point, I doubt he was referring to monthly maintenance releases as the next minor release. Has anyone tried 7.1.2 beta to see if there's a resolution?
ja...@gmail.com <ja...@gmail.com> #296
with the incoming laws, the requirement for VPN functionality is becoming even more vital. I have a HTC 10 on Android 7.0. I can only use the outdated PPTP security. L2TP/IPSec PSK is not working for me either.
ja...@jperham.com <ja...@jperham.com> #297
Same issue....
ro...@gmail.com <ro...@gmail.com> #298
I just switched from a Samsung Galaxy J1 (Lollipop) to a Samsung Galaxy J3 (Marshmallow) and now L2TP is no longer working to connect to my home router. I had to start using the less secure PPTP. It looks like I will have to consider going back to a phone with the Android Lollipop to get things working right again.
ma...@gmail.com <ma...@gmail.com> #299
With the update to 7.1.2 on my Nexus 5x from yesterday, I can finally setup a VPN connection to a OpenBSD VPN server using L2TP/psk.
I see that hmac-sha2-512 is being used for authentication.
I see that hmac-sha2-512 is being used for authentication.
pa...@gmail.com <pa...@gmail.com> #300
Thank You Google. It works after update to 7.1.2
me...@gmail.com <me...@gmail.com> #301
Nexus 5X(M8994) Android 7.1.2 March security patch here, still can't connect to my L2TP/IPSec PSK VPN(OpenSwan), I'll try to change the vpn server to accept SHA384 or SHA512
yh...@gmail.com <yh...@gmail.com> #302
I can confirm this issue still exists on my Nougat 7.0 Huawei Honor 8. The exact same L2TP/IPSec VPN setting works fine on iPhone, Windows PCs and MacBook.
d....@gmail.com <d....@gmail.com> #303
I can confirm this on my Samsung S5 with 6.0.1 Android
ym...@gmail.com <ym...@gmail.com> #304
[Comment deleted]
al...@gmail.com <al...@gmail.com> #305
It works again, i don't know why. :)
jk...@gmail.com <jk...@gmail.com> #306
Still not fixed. Same problem, Pixel 7.1.2
ac...@gmail.com <ac...@gmail.com> #307
More than a year and it's still not fixed! Schame over you Google. You schould name your OS playphone like playstore. It's obvioussly not designed for productivity. it's a pity!
st...@gmail.com <st...@gmail.com> #308
any solution for this issue ???
al...@gmail.com <al...@gmail.com> #309
nop :/
lo...@google.com <lo...@google.com> #310
On Pixel (or Nexus device) running 7.1.2, three workarounds are possible:
1. Upgrade to SHA512 or SHA384, if the device supports it.
2. Enable sha_truncbug=yes on the VPN server.
3. Downgrade to SHA1.
1. Upgrade to SHA512 or SHA384, if the device supports it.
2. Enable sha_truncbug=yes on the VPN server.
3. Downgrade to SHA1.
ne...@gmail.com <ne...@gmail.com> #311
i have similar issue mentioned as above. i tested on my android 6 and 7 device and both fail to connect L2TP/IPSEC VPN. As a result, I gave up IKEv1 method (that use on L2TP/IPSEC VPN)
and then i tried to setup IKEv2 VPN setup on strongswan VPN server and then using its own android app (strongswan VPN client) to make connection succcess (seem that native android VPN not support IKEv2 yet). This is solution i find right now more secure on android device and working fine and the performance/stability is quite good too. since IKEv2 is latest VPN connection method. i think this is at least better than nothing. in strongswan VPN server, you can set multiple VPN method, L2TP/IPSEC for iphone/IOS/windows/mac OS and IKEv2 for android.
and then i tried to setup IKEv2 VPN setup on strongswan VPN server and then using its own android app (strongswan VPN client) to make connection succcess (seem that native android VPN not support IKEv2 yet). This is solution i find right now more secure on android device and working fine and the performance/stability is quite good too. since IKEv2 is latest VPN connection method. i think this is at least better than nothing. in strongswan VPN server, you can set multiple VPN method, L2TP/IPSEC for iphone/IOS/windows/mac OS and IKEv2 for android.
kl...@gmail.com <kl...@gmail.com> #312
Using Resurrection Remix v5.8.2 (based on Android v7.1.1, Nougat).
I use OpenVPN Connect app.
It works perfectly after adding the OpenVPN profile file.
You could try it, if it helps.
I use OpenVPN Connect app.
It works perfectly after adding the OpenVPN profile file.
You could try it, if it helps.
al...@gmail.com <al...@gmail.com> #313
@312 We're trying to connect to L2TP server and this does not work actually in Android 6.0 and above.
ma...@gmail.com <ma...@gmail.com> #314
Any update? Still in 7.1
ma...@gmail.com <ma...@gmail.com> #315
Oh nevermind. Gonna wait for 7.2 then. Happy to see that his bug was finally fixed.
gr...@gmail.com <gr...@gmail.com> #316
So there is no solution for us here in china? S7 android 7.0
lo...@google.com <lo...@google.com> #317
Update: starting in Android O, on Google devices (Nexus / Pixel) we have changed the default truncation length for HMAC-SHA256 to the standards-compliant value of 128 bits. This should allow the device to connect to standards-compliant VPN servers using HMAC-SHA256.
Unfortunately this is a device-specific change as the relevant code is in the Linux kernel. So other device manufacturers may or may not pick it up (or may have made the same change already).
Marking this fixed because there is nothing more that the Android team can do here.
Unfortunately this is a device-specific change as the relevant code is in the Linux kernel. So other device manufacturers may or may not pick it up (or may have made the same change already).
Marking this fixed because there is nothing more that the Android team can do here.
mi...@gmail.com <mi...@gmail.com> #318
>Unfortunately this is a device-specific change
So my Nexus 6 and Nexus 9 aren't so good no more?
So my Nexus 6 and Nexus 9 aren't so good no more?
du...@gmail.com <du...@gmail.com> #319
I have the same issue with my Samsung Galaxy S6 with PPTP and L2TP... Stopped working after 6.x upgrade ans still not working in 7.0 upgrade. I am the CIO of the company. We have 1200 Android phones. We will change to iPhones if not fixed in 2017.
8f...@gmail.com <8f...@gmail.com> #320
They, google, have painted themselves into a corner and there's no way out
without getting messy -- and publically so. It's seems the only
face-saving opportunity to "fix" it will be on a MAJOR release boundary
(i.e 7.2 or 8.0.0) with a backwards compatibility forfeiture notice. They
didn't catch it at 7.0.0; therefore, there's no assurance --expectation--
that they'll man-up and make it right at any upcoming boundary.
You can try LINEAGE-OS 14.1 project ROMs. If it's not already fixed, then a
donation and a directed request might just get it over the line as it's a
straight forward fix technically -- recompile with the correct SSL library
and flags.
On 23 May 2017 at 09:04, <buganizer-system@google.com> wrote:
without getting messy -- and publically so. It's seems the only
face-saving opportunity to "fix" it will be on a MAJOR release boundary
(i.e 7.2 or 8.0.0) with a backwards compatibility forfeiture notice. They
didn't catch it at 7.0.0; therefore, there's no assurance --expectation--
that they'll man-up and make it right at any upcoming boundary.
You can try LINEAGE-OS 14.1 project ROMs. If it's not already fixed, then a
donation and a directed request might just get it over the line as it's a
straight forward fix technically -- recompile with the correct SSL library
and flags.
On 23 May 2017 at 09:04, <buganizer-system@google.com> wrote:
su...@gmail.com <su...@gmail.com> #321
confirm asus z010d android 6.0.1 firmware ww_13.8.26.92_20170425 l2tp psk still not work
vi...@gmail.com <vi...@gmail.com> #323
newly bought a Samsung Galaxy S8, PPTP works fine but L2TP/IPSec never connects
it's working on my iphone 7plus and Surface Pro
Can't believe the bug existed for over 18 months and still can't get fixed!!
it's working on my iphone 7plus and Surface Pro
Can't believe the bug existed for over 18 months and still can't get fixed!!
co...@gmail.com <co...@gmail.com> #324
L2TP vpn works fine with softether vpn and Android 7, native client. You have to select a common cipher on your VPN server that can be used by you phone. search google for (android 7 ssl cipher) and add the highest level of encryption supported by the server and android. It works flawlessly fast as hell and perfectly secure. If it doesn't work for you the the VPN server your trying to use doesn't support the android cipher suite. This is not an android issue.
ta...@gmail.com <ta...@gmail.com> #325
so my l2tp server configuration did not change at all since posting comment #184
but today i've flashed my moto g3 (osprey) with lineageOS (lineage-14.1-20170713 which is android 7.1.2) and VPN works flawlessly right now.
but today i've flashed my moto g3 (osprey) with lineageOS (lineage-14.1-20170713 which is android 7.1.2) and VPN works flawlessly right now.
ar...@gmail.com <ar...@gmail.com> #326
OnePlus 5 Android 7.1.1 with L2TP / IPSec PSK from Draytek Vigor 2860 - DOESN'T WORK !! this thread is going for 2 years now, when are you going to fix it ?!
jk...@gmail.com <jk...@gmail.com> #327
just installed Android 8.0.0 and still will not connect with my vpn l2tp/ipsec. I thought they said it would be fixed in the next update? What happen?
pa...@gmail.com <pa...@gmail.com> #328
Same with me, Pixel XL running Android 8.0 and this will still not connect to a Draytek L2TP/IPSec PSK VPN. This problem is still here even in Oreo.
jo...@googlemail.com <jo...@googlemail.com> #329
ke...@gmail.com <ke...@gmail.com> #330
This is an issue on an LG V20, android 7.0. The LG is unable to connect to a fortigate vpn server using IPSec PSK. Another android device, Samsung Galaxy Grand Prime running android 5.1.1, is able to connect to the same server using the exact same client configuration. The issue exists over 4g LTE and wifi. The symptom is that the vpn states "connecting..." for about 30 seconds, then states "unsuccesful".
jk...@gmail.com <jk...@gmail.com> #331
Just received a new update and still no fix for the VPN. This is absolutely ridiculous.
jk...@gmail.com <jk...@gmail.com> #332
If this is not fixed when the pixel 2 comes out , I'm switching to the iPhone. At least their phone does what they say it can.
co...@gmail.com <co...@gmail.com> #333
You all need to stop whining! It works perfectly! It's not an android issue, it's not your phone, it's the fact that you are trying to connect to a VPN with outdated and cracked ciphers. I use VPN on my s8 every day to connect to my softether server and it's super fast and error free. You know why, I'll tell you..... IT USES CURRENT CIPHER SUITES!
If it doesn't connect to your bullshit 5.99 a month totally unsafe playstore vpn service it's because the service is outdated and super insecure. I'm only going to say this once every free VPN and proxy/VPN service on the play store has been broken. Your want to torrent go to Starbucks, you want secure, build your own VPN server. It's Sooooooo not hard.
If it doesn't connect to your bullshit 5.99 a month totally unsafe playstore vpn service it's because the service is outdated and super insecure. I'm only going to say this once every free VPN and proxy/VPN service on the play store has been broken. Your want to torrent go to Starbucks, you want secure, build your own VPN server. It's Sooooooo not hard.
co...@gmail.com <co...@gmail.com> #334
@ #comment329 both of these sites have current supported cipher suits.. Personally i'd stick with one of the TLS_ECDHE_ECDSA_WITH_AES_256 or higher. usually you would put them in descending order and android would pick the strongest available cipher but the built in client isn't that smart. so when you build soft ether server select the TLS_ECDHE_ECDSA cipher you want and test it. just remember the high the cipher strength the faster you drain your battery in the fewer connections the server will handle, I'm running 36 sessions (pc,tablet, and galaxy phones) right now. I'm still waiting on a softether android client so I can tunnel over dns and bypass the gogo firewalls on the planes.
https://developer.android.com/reference/javax/net/ssl/SSLSocket.html
https://www.ssllabs.com/ssltest/viewClient.html?name=Android&version=7.0&key=139
mi...@gmail.com <mi...@gmail.com> #335
So hey,
Android 7.1.2 did fix the initial VPN issue for me: it could connect to my home VPN without reconfiguration of the VPN appliance.
I'm currently using the Google Oreo build on my Nexus6P, and my results are as follows:
My win10, Ipad and macbook air can all connect/disconnect (repeatedly) to the same L2TP VPN server, no problem.
However... Once I make a connection with my Android device (once again, with no change to my VPN appliance configuration)...
my win10 and Apple devices can no longer connect to the VPN until the VPN service on the appliance is restarted.
(In this state, the android client can disconnect/reconnect without issue.)
Android: (OPR6.170623.019, Sep 2017)
Win10: 10.0.15063
Ipad: iOS 11
MBA: 10.12.6
Android 7.1.2 did fix the initial VPN issue for me: it could connect to my home VPN without reconfiguration of the VPN appliance.
I'm currently using the Google Oreo build on my Nexus6P, and my results are as follows:
My win10, Ipad and macbook air can all connect/disconnect (repeatedly) to the same L2TP VPN server, no problem.
However... Once I make a connection with my Android device (once again, with no change to my VPN appliance configuration)...
my win10 and Apple devices can no longer connect to the VPN until the VPN service on the appliance is restarted.
(In this state, the android client can disconnect/reconnect without issue.)
Android: (OPR6.170623.019, Sep 2017)
Win10: 10.0.15063
Ipad: iOS 11
MBA: 10.12.6
mi...@gmail.com <mi...@gmail.com> #336
turns out, all this works fine if/when my android device is connected external from my NAT.
[Deleted User] <[Deleted User]> #337
The issue is still unresolved on my phone.
Client: Nexus 5X with Android 8.0
Server: Windows 2012
I don't know how to change the IPSec settings on my server, any advise?
Client: Nexus 5X with Android 8.0
Server: Windows 2012
I don't know how to change the IPSec settings on my server, any advise?
jt...@outlook.com <jt...@outlook.com> #338
This issue is also still unresolved for me. Blackberry KeyOne running 7.1.1 -- Server Cisco RV042 PPTP server (as well as server2012/2016 servers)
pi...@gmail.com <pi...@gmail.com> #339
I confirm this issue still exists on my Nougat 7.0 Huawei Mate 9 (and 8) The exact same L2TP/IPSec VPN setting works fine on iPhone, Windows PCs.
na...@uw.edu <na...@uw.edu> #340
We were able to get a LibreSwan L2TP/IPSec VPN to work with everything we have tested so far including Chromebook OS and Windows 10 which normally break if you enable the sha2_truncbug. Basically we added kept adding to the phase2alg list protocols that other SHA2-256 capable devices prefer over SHA2-256 to prevent them from hitting the draft implementation. Ideally I want to find a protocol that Android 6 & 7 will prefer so that I can eventually turn off the sha2_truncbug flag but so far I haven't been successful. Only helpful if you are running your own VPN server of course.
Our setup is CentOS 7 & LibreSwan 3.20 and we added the two following lines to our /etc/ipsec.d/l2tp.conf file:
phase2alg=aes_gcm_c-128-null,aes_gcm_c-192-null,aes_ccm_c-256-null,aes_gcm_c-256-null,3des-sha1,aes-sha1,aes-sha2,aes256-sha2_512
sha2_truncbug=yes
Our setup is CentOS 7 & LibreSwan 3.20 and we added the two following lines to our /etc/ipsec.d/l2tp.conf file:
phase2alg=aes_gcm_c-128-null,aes_gcm_c-192-null,aes_ccm_c-256-null,aes_gcm_c-256-null,3des-sha1,aes-sha1,aes-sha2,aes256-sha2_512
sha2_truncbug=yes
an...@gmail.com <an...@gmail.com> #341
working with android in business is like buying an ice in hell...
it's possible, but you will regret it very fast....
still not working.
it's possible, but you will regret it very fast....
still not working.
an...@gmail.com <an...@gmail.com> #342
Still not working in Android 8.0.0
l2tp works only non permanent....
at least they have round app icons now.... rofl
l2tp works only non permanent....
at least they have round app icons now.... rofl
qu...@gmail.com <qu...@gmail.com> #343
Still have problems on 2 Galaxy Tab A with Android 6.0.1 and 7.0 .. Any fix ?
Is there an app which can let you set up a L2TP/IPSec PSK config and connect ?
Is there an app which can let you set up a L2TP/IPSec PSK config and connect ?
so...@gmail.com <so...@gmail.com> #344
LG G5 Verizon variant, Android 7.0. Set up basic vpn with IPSpec PSK, connected, always on,key symbol are lit in status bar, however, no internet access with 4G or wi-fi, until I disconnect vpn!! Any thoughts anyone??
re...@allard.it <re...@allard.it> #345
I have the same kind of bug on the Motorola moto X4 with 7.1.1
sl...@gmail.com <sl...@gmail.com> #346
This issue is marked as "Fixed". Is there a plan to ever release the fix??? This issue is 2 years old and the solution is apparently still not available to public.
ro...@roderickmizzi.com <ro...@roderickmizzi.com> #347
Could you please fix this issue?? 😡
ev...@gmail.com <ev...@gmail.com> #348
Moto G4 Plus, Android 7
After the successful connection of the smartphone over the set to mikrotik l2tp/ipsec after a while the smartphone hangs tightly, and it helps only hardreset. Tested on different mikrotik routers and different ip-addresses of vpn-gateways, always the same problem with the complete hang of the smartphone after a successful connection on l2tp / ipsec
After the successful connection of the smartphone over the set to mikrotik l2tp/ipsec after a while the smartphone hangs tightly, and it helps only hardreset. Tested on different mikrotik routers and different ip-addresses of vpn-gateways, always the same problem with the complete hang of the smartphone after a successful connection on l2tp / ipsec
no...@gmail.com <no...@gmail.com> #349
Verizon Droid Turbo 6.0.1 has this issue too. Mac and Windows computers are able to connect to the L2TP server, in additional to iPhones as old as 2011. Marked as fix but will not be released apparently...
li...@chelworth.org.uk <li...@chelworth.org.uk> #350
I came here to see an update on the progress of this issue, which is my understanding of what a tracker is, but apart from the first few entries there is nothing in 2 years from the devs.
Would they please give us some update as to whether this is being looked at, where tehy are at with their problem determination and what chance there is of seeing some progress on this. While it may not be every user's requirement to use standard protocols as I guess more users are private and hence think of VPN as one of the VPN services plus dedicated app to access, there are a significant proportion of business users and it seems somewhat disrespectful to not fix anything and not provide a status update. Certainly, while I much prefer Android over IOS this function is important to me and I'm sick to death of taking a small windows tablet with me whenever I need to rely on connecting back to my office. Next phone can't be Android based if this isn't fixed.
2 years to fix a P1 issue??
Would they please give us some update as to whether this is being looked at, where tehy are at with their problem determination and what chance there is of seeing some progress on this. While it may not be every user's requirement to use standard protocols as I guess more users are private and hence think of VPN as one of the VPN services plus dedicated app to access, there are a significant proportion of business users and it seems somewhat disrespectful to not fix anything and not provide a status update. Certainly, while I much prefer Android over IOS this function is important to me and I'm sick to death of taking a small windows tablet with me whenever I need to rely on connecting back to my office. Next phone can't be Android based if this isn't fixed.
2 years to fix a P1 issue??
[Deleted User] <[Deleted User]> #351
I have the same kind of bug on One + 7.1.1
[Deleted User] <[Deleted User]> #352
I fixed it! chang 3line in /etc/ipsec.conf
docker exec vpn sed -i 's/ike=/ike=aes256-sha2_256,/g' /etc/ipsec.conf
docker exec vpn sed -i 's/phase2alg=/phase2alg=aes256-sha2_256,/' /etc/ipsec.conf
docker exec vpn sed -i '26 i\ sha2-truncbug=yes' /etc/ipsec.conf
docker exec vpn service ipsec restart
Quote:
In your ipsec.conf file you should add three additions,
add ,aes256-sha2_256 to both ike= and phase2alg=
Then add a newline with sha2-truncbug=yes
reload ipsec
You should now be able to connect to your VPN
docker exec vpn sed -i 's/ike=/ike=aes256-sha2_256,/g' /etc/ipsec.conf
docker exec vpn sed -i 's/phase2alg=/phase2alg=aes256-sha2_256,/' /etc/ipsec.conf
docker exec vpn sed -i '26 i\ sha2-truncbug=yes' /etc/ipsec.conf
docker exec vpn service ipsec restart
Quote:
In your ipsec.conf file you should add three additions,
add ,aes256-sha2_256 to both ike= and phase2alg=
Then add a newline with sha2-truncbug=yes
reload ipsec
You should now be able to connect to your VPN
[Deleted User] <[Deleted User]> #353
if you use huawei, you all add aes256-sha2_512
#fix android bug, test no oneplus and huawei
docker exec vpn sed -i 's/ike=/ike=aes256-sha2_256,aes256-sha2_512,/g' /etc/ipsec.conf
docker exec vpn sed -i 's/phase2alg=/phase2alg=aes256-sha2_256,aes256-sha2_512,/' /etc/ipsec.conf
docker exec vpn sed -i '26 i\ sha2-truncbug=yes' /etc/ipsec.conf
docker exec vpn service ipsec restart
#fix android bug, test no oneplus and huawei
docker exec vpn sed -i 's/ike=/ike=aes256-sha2_256,aes256-sha2_512,/g' /etc/ipsec.conf
docker exec vpn sed -i 's/phase2alg=/phase2alg=aes256-sha2_256,aes256-sha2_512,/' /etc/ipsec.conf
docker exec vpn sed -i '26 i\ sha2-truncbug=yes' /etc/ipsec.conf
docker exec vpn service ipsec restart
lo...@google.com <lo...@google.com> #354
For the benefit of those reading only the most recent comments: please refer to comments #279, #310, and #317 on this bug. There is nothing more the Android team can do here; only the device manufacturers can fix the kernels on their devices.
Of course, devices that do not get, or no longer get software updates cannot be fixed.
See comment #276 for possible server-side workarounds.
Of course, devices that do not get, or no longer get software updates cannot be fixed.
See
ni...@gmail.com <ni...@gmail.com> #355
What about comments #327 and #328 reporting it is not fixed on pixel devices with Oreo updated??
de...@gmail.com <de...@gmail.com> #356
I am still experiencing this issue on a Pixel 1 on the latest firmware. This is ridiculous, Google won't fix the issue even on their own devices.
de...@gmail.com <de...@gmail.com> #357
I forgot to mention, this isn't an issue with the VPN server in any way. I am trying to connect to an $80k Cisco Meraki security appliance in the officially documented way. This has nothing to do with server incompatibilities and is entirely the fault of Google for not updating their client.
lo...@gmail.com <lo...@gmail.com> #358
I have the same issue on a Pixel XL 2 connecting to TP-Link Enterprise VPN. Running Android 8.1.0, all other clients connect fine, Android won't.
lo...@google.com <lo...@google.com> #359
For those seeing this on Google devices running 8.1, please provide a
bugreport and a packet capture (e.g., tcpdump) taken either on the phone
(requires a userdebug build), on an intermediate router, or on the VPN
server.
bugreport and a packet capture (e.g., tcpdump) taken either on the phone
(requires a userdebug build), on an intermediate router, or on the VPN
server.
br...@staff.broadbandsolutions.com.au <br...@staff.broadbandsolutions.com.au> #360
Same issue with Samsung Galaxy S8 Plus
ti...@gmail.com <ti...@gmail.com> #361
I can connect to L2TP with Android 7, but my friend using Samsung note 5 cannot, we dial to a same VPN server.
ja...@gmail.com <ja...@gmail.com> #362
The Huawei P10 Pro with Android Oreo (8.0) does not work via a built-in vpn client to L2tp / Ipsec vpn server
xx...@gmail.com <xx...@gmail.com> #363
I have an Asus Zenpad z8s. Mine gets connected via l2tp but after a few secs/mins the tab freezes then auto restarts. Could this be the same issue? or could this have a connection with everyone complaining above?
cy...@gmail.com <cy...@gmail.com> #364
I'm using Pixel1 have the same problem. It's 2018 now, but this problem remain unsolved.
lo...@google.com <lo...@google.com> #365
Enkyo: if you'd like this bug to be fixed, you can help by following the instructions in comment #359 .
ma...@gmail.com <ma...@gmail.com> #366
Not sure why this is still marked Obsolete, as it's definitely still ongoing on the latest builds and the claim that there's nothing Google can do is outright false. There seem to be a few different issues at play, since I saw https://issuetracker.google.com/issues/37074640#comment276 discussing encryption schemes (and recommending downgrading to SHA1?!? Shame) At least for my setup (Pixel 2 XL on Fi, same Meraki hardware as #357) it seems to be because the ppp0 tunnel interface comes up with the wrong MTU for the underlying transport. The LTE network interface is already 1400, so there's no room for the VPN header, packets between 1360? and 1400 bytes are blackholed rather than receiving an ICMP 'Fragmentation needed, DF bit set' flag from the local stack. TCP sessions may or may not work depending on whether MSS and/or PMTUD are configured correctly on all equipment in between, but for UDP protocols, including Google's own gQUIC, there's no such mechanism to detect/correct for packets being too large to be delivered and the connection stalls.
Short version - 'ifconfig ppp0 mtu 1360' fixes it temporarily, but the change is lost or reboot or interface change like roaming from wifi to LTE
Short version - 'ifconfig ppp0 mtu 1360' fixes it temporarily, but the change is lost or reboot or interface change like roaming from wifi to LTE
ma...@gmail.com <ma...@gmail.com> #367
Minor correction to the above, PMTUD *should* help for UDP as well, but seems to be disabled by default....no idea why that's the case
ma...@gmail.com <ma...@gmail.com> #368
And one final update after I had a chance to fine tune, 1360 was an arbitrary choice, hence the '?' earlier. I was able to use some pings with the -s -M flags to dial it in, the appropriate maximum MTU (at least for my network, but it is Fi so that should count for something) is 1388
aa...@gmail.com <aa...@gmail.com> #369
Optional
pa...@gmail.com <pa...@gmail.com> #370
Hitting this bug in 2020 on Android Pie... I see it's marked 'obsolete' but ... really ?
is tehre a workaround or a related bug or something I miss ?
is tehre a workaround or a related bug or something I miss ?
Description
No issues with certain other (e.g. Cisco) VPN technologies.
Other devices are able to connect to the same VPN servers I am testing.
Servers are based on openswan/xl2tpd.
Sample logcats attached:
fail.txt:
Logcat from a FAILED attempt with a Nexus 6 running stock 6.0.1 MMB29K
success.txt:
Logcat from a SUCCESSFUL attempt with a Nexus 10 running Cyanogenmod 5.1.1 LVY48F 9094b31763.