Rule #1 - Be Patient - Rule #2 - Don't ask when, if you don't contribute - Rule #3 - You have coding skills - LinuxMCE's small brother is available: http://www.agocontrol.com
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Feb 9 21:29:04 dcerouter pluto: packet from 192.168.80.182:60500: initial Main Mode message received on 192.168.80.1:500 but no connection has been authorized with policy=PSK
Is there somebody that can confirm changing this line is a working solution?
Basically guys, what is it going to take, to have VPN work out of the box for the most common platforms? I typically don't have to go into advanced in each of the VPN clients and set things like this.
# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.secrets.proto,v 22.214.171.124 2005/09/28 13:59:14 paul Exp $
# This file holds shared secrets or RSA private keys for inter-Pluto
# authentication. See ipsec_pluto(8) manpage, and HTML documentation.
# RSA private key for this host, authenticating it to any other host
# which knows the public part. Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "ipsec showhostkey".
x.x.x.x %any: PSK "outside"
ipsec saref = no
ip range = 192.168.80.200-192.168.80.210
local ip = 192.168.80.1
require chap = yes
refuse pap = yes
require authentication = yes
name = LinuxMCE_VPN_Server
ppp debug = yes
pppoptfile = /etc/ppp/options.xl2tpd
length bit = yes
# Secrets for authenticating l2tp tunnels
* * outside
# Secrets for authentication using CHAP
outside * outside *
edit diskless create tbz, check where the apt-get update line is, and at the end type || :
and re-run it.
LC_ALL=C chroot $TEMP_DIR apt-get -y -qq update || :[/s]
sudo -i /usr/pluto/bin/Diskless_CreateTBZ.sh