Vpn l2tp problem - networkmanager-l2tp networkmanager-strongswan (NetworkManager xl2tpd death_handler: Fatal signal 15 received)

Hi guys, I have a huge problem as I have to try to connect in vpn to work and I don’t want to install windows !!
Can you help me? I’ve tried them all …

Thanks!

ott 05 10:58:26 NetworkManager[7158]: <info>  [1633424306.6658] audit: op="statistics" interface="wlp5s0" ifindex=3 args="2000" pid=1123 uid=1000 result="success"
ott 05 10:58:30 NetworkManager[7158]: <info>  [1633424310.4804] audit: op="connection-activate" uuid="7250b4eb-345a-432c-b8df-16c326231ad5" name="VPN RESI 201" pid=1123 uid=1000 result="success"
ott 05 10:58:30 NetworkManager[7158]: <info>  [1633424310.4842] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: Started the VPN service, PID 7318
ott 05 10:58:30 NetworkManager[7158]: <info>  [1633424310.4901] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: Saw the service appear; activating connection
ott 05 10:58:30 NetworkManager[7158]: <info>  [1633424310.4966] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: VPN connection: (ConnectInteractive) reply received
ott 05 10:58:30 nm-l2tp-service[7318]: Check port 1701
ott 05 10:58:30 NetworkManager[7331]: Stopping strongSwan IPsec failed: starter is not running
ott 05 10:58:32 NetworkManager[7328]: Starting strongSwan 5.9.3 IPsec [starter]...
ott 05 10:58:32 NetworkManager[7328]: Loading config setup
ott 05 10:58:32 NetworkManager[7328]: Loading conn '7250b4eb-345a-432c-b8df-16c326231ad5'
ott 05 10:58:32 ipsec_starter[7328]: Starting strongSwan 5.9.3 IPsec [starter]...
ott 05 10:58:32 ipsec_starter[7328]: Loading config setup
ott 05 10:58:32 ipsec_starter[7328]: Loading conn '7250b4eb-345a-432c-b8df-16c326231ad5'
ott 05 10:58:32 ipsec_starter[7339]: Attempting to start charon...
ott 05 10:58:32 charon[7341]: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.3, Linux 5.13.19-2-MANJARO, x86_64)
ott 05 10:58:32 charon[7341]: 00[CFG] PKCS11 module '<name>' lacks library path
ott 05 10:58:32 charon[7341]: 00[LIB] plugin 'mysql' failed to load: libmariadb.so.3: cannot open shared object file: No such file or directory
ott 05 10:58:32 charon[7341]: 00[CFG] attr-sql plugin: database URI not set
ott 05 10:58:32 charon[7341]: 00[NET] using forecast interface wlp5s0
ott 05 10:58:32 charon[7341]: 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
ott 05 10:58:32 charon[7341]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
ott 05 10:58:32 charon[7341]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
ott 05 10:58:32 charon[7341]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
ott 05 10:58:32 charon[7341]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
ott 05 10:58:32 charon[7341]: 00[CFG] loading crls from '/etc/ipsec.d/crls'
ott 05 10:58:32 charon[7341]: 00[CFG] loading secrets from '/etc/ipsec.secrets'
ott 05 10:58:32 charon[7341]: 00[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
ott 05 10:58:32 charon[7341]: 00[CFG]   loaded IKE secret for %any
ott 05 10:58:32 charon[7341]: 00[CFG] sql plugin: database URI not set
ott 05 10:58:32 charon[7341]: 00[CFG] opening triplet file /etc/ipsec.d/triplets.dat failed: No such file or directory
ott 05 10:58:32 charon[7341]: 00[CFG] loaded 0 RADIUS server configurations
ott 05 10:58:32 charon[7341]: 00[CFG] HA config misses local/remote address
ott 05 10:58:32 charon[7341]: 00[CFG] no script for ext-auth script defined, disabled
ott 05 10:58:32 charon[7341]: 00[LIB] loaded plugins: charon ldap pkcs11 aesni aes des rc2 sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp curve25519 agent chapoly xcbc cmac hmac ntru drbg newhope bliss curl sqlite attr kernel-netlink resolve socket-default bypass-lan connmark forecast farp stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp radattr unity counters
ott 05 10:58:32 charon[7341]: 00[LIB] dropped capabilities, running as uid 0, gid 0
ott 05 10:58:32 charon[7341]: 00[JOB] spawning 16 worker threads
ott 05 10:58:32 ipsec_starter[7339]: charon (7341) started after 20 ms
ott 05 10:58:32 charon[7341]: 08[CFG] received stroke: add connection '7250b4eb-345a-432c-b8df-16c326231ad5'
ott 05 10:58:32 charon[7341]: 08[CFG] added configuration '7250b4eb-345a-432c-b8df-16c326231ad5'
ott 05 10:58:32 charon[7341]: 06[IKE] installed bypass policy for 192.168.178.0/24
ott 05 10:58:32 charon[7341]: 06[IKE] installed bypass policy for ::1/128
ott 05 10:58:32 charon[7341]: 06[IKE] installed bypass policy for fe80::/64
ott 05 10:58:33 charon[7341]: 13[CFG] rereading secrets
ott 05 10:58:33 charon[7341]: 13[CFG] loading secrets from '/etc/ipsec.secrets'
ott 05 10:58:33 charon[7341]: 13[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
ott 05 10:58:33 charon[7341]: 13[CFG]   loaded IKE secret for %any
ott 05 10:58:33 charon[7341]: 01[CFG] received stroke: initiate '7250b4eb-345a-432c-b8df-16c326231ad5'
ott 05 10:58:33 charon[7341]: 04[IKE] initiating Main Mode IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1] to 93.146.250.201
ott 05 10:58:33 charon[7341]: 04[IKE] initiating Main Mode IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1] to 93.146.250.201
ott 05 10:58:33 charon[7341]: 04[ENC] generating ID_PROT request 0 [ SA V V V V V ]
ott 05 10:58:33 charon[7341]: 04[NET] sending packet: from 192.168.178.81[500] to 93.146.250.201[500] (532 bytes)
ott 05 10:58:33 charon[7341]: 08[NET] received packet: from 93.146.250.201[500] to 192.168.178.81[500] (128 bytes)
ott 05 10:58:33 charon[7341]: 08[ENC] parsed ID_PROT response 0 [ SA V V ]
ott 05 10:58:33 charon[7341]: 08[IKE] received NAT-T (RFC 3947) vendor ID
ott 05 10:58:33 charon[7341]: 08[IKE] received FRAGMENTATION vendor ID
ott 05 10:58:33 charon[7341]: 08[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
ott 05 10:58:33 charon[7341]: 08[ENC] generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
ott 05 10:58:33 charon[7341]: 08[NET] sending packet: from 192.168.178.81[500] to 93.146.250.201[500] (244 bytes)
ott 05 10:58:33 charon[7341]: 07[NET] received packet: from 93.146.250.201[500] to 192.168.178.81[500] (304 bytes)
ott 05 10:58:33 charon[7341]: 07[ENC] parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
ott 05 10:58:33 charon[7341]: 07[IKE] received Cisco Unity vendor ID
ott 05 10:58:33 charon[7341]: 07[IKE] received XAuth vendor ID
ott 05 10:58:33 charon[7341]: 07[ENC] received unknown vendor ID: 3a:b9:56:aa:57:98:09:bf:68:1d:0b:67:e7:08:40:a7
ott 05 10:58:33 charon[7341]: 07[ENC] received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00
ott 05 10:58:33 charon[7341]: 07[IKE] local host is behind NAT, sending keep alives
ott 05 10:58:33 charon[7341]: 07[ENC] generating ID_PROT request 0 [ ID HASH ]
ott 05 10:58:33 charon[7341]: 07[NET] sending packet: from 192.168.178.81[4500] to 93.146.250.201[4500] (76 bytes)
ott 05 10:58:33 charon[7341]: 09[NET] received packet: from 93.146.250.201[4500] to 192.168.178.81[4500] (76 bytes)
ott 05 10:58:33 charon[7341]: 09[ENC] parsed ID_PROT response 0 [ ID HASH ]
ott 05 10:58:33 charon[7341]: 09[IKE] IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1] established between 192.168.178.81[192.168.178.81]...93.146.250.201[93.146.250.201]
ott 05 10:58:33 charon[7341]: 09[IKE] IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1] established between 192.168.178.81[192.168.178.81]...93.146.250.201[93.146.250.201]
ott 05 10:58:33 charon[7341]: 09[IKE] scheduling reauthentication in 9875s
ott 05 10:58:33 charon[7341]: 09[IKE] maximum IKE_SA lifetime 10415s
ott 05 10:58:33 charon[7341]: 09[ENC] generating QUICK_MODE request 3585993419 [ HASH SA No ID ID NAT-OA NAT-OA ]
ott 05 10:58:33 charon[7341]: 09[NET] sending packet: from 192.168.178.81[4500] to 93.146.250.201[4500] (252 bytes)
ott 05 10:58:33 charon[7341]: 06[NET] received packet: from 93.146.250.201[4500] to 192.168.178.81[4500] (204 bytes)
ott 05 10:58:33 charon[7341]: 06[ENC] parsed QUICK_MODE response 3585993419 [ HASH SA No ID ID N((24576)) NAT-OA NAT-OA ]
ott 05 10:58:33 charon[7341]: 06[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
ott 05 10:58:33 charon[7341]: 06[IKE] no acceptable traffic selectors found
ott 05 10:58:33 charon[7341]: 06[ENC] generating INFORMATIONAL_V1 request 3379670460 [ HASH N(NO_PROP) ]
ott 05 10:58:33 NetworkManager[7368]: initiating Main Mode IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1] to 93.146.250.201
ott 05 10:58:33 NetworkManager[7368]: generating ID_PROT request 0 [ SA V V V V V ]
ott 05 10:58:33 NetworkManager[7368]: sending packet: from 192.168.178.81[500] to 93.146.250.201[500] (532 bytes)
ott 05 10:58:33 NetworkManager[7368]: received packet: from 93.146.250.201[500] to 192.168.178.81[500] (128 bytes)
ott 05 10:58:33 NetworkManager[7368]: parsed ID_PROT response 0 [ SA V V ]
ott 05 10:58:33 NetworkManager[7368]: received NAT-T (RFC 3947) vendor ID
ott 05 10:58:33 NetworkManager[7368]: received FRAGMENTATION vendor ID
ott 05 10:58:33 NetworkManager[7368]: selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
ott 05 10:58:33 NetworkManager[7368]: generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
ott 05 10:58:33 NetworkManager[7368]: sending packet: from 192.168.178.81[500] to 93.146.250.201[500] (244 bytes)
ott 05 10:58:33 NetworkManager[7368]: received packet: from 93.146.250.201[500] to 192.168.178.81[500] (304 bytes)
ott 05 10:58:33 NetworkManager[7368]: parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
ott 05 10:58:33 NetworkManager[7368]: received Cisco Unity vendor ID
ott 05 10:58:33 NetworkManager[7368]: received XAuth vendor ID
ott 05 10:58:33 NetworkManager[7368]: received unknown vendor ID: 3a:b9:56:aa:57:98:09:bf:68:1d:0b:67:e7:08:40:a7
ott 05 10:58:33 NetworkManager[7368]: received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00
ott 05 10:58:33 NetworkManager[7368]: local host is behind NAT, sending keep alives
ott 05 10:58:33 NetworkManager[7368]: generating ID_PROT request 0 [ ID HASH ]
ott 05 10:58:33 NetworkManager[7368]: sending packet: from 192.168.178.81[4500] to 93.146.250.201[4500] (76 bytes)
ott 05 10:58:33 NetworkManager[7368]: received packet: from 93.146.250.201[4500] to 192.168.178.81[4500] (76 bytes)
ott 05 10:58:33 NetworkManager[7368]: parsed ID_PROT response 0 [ ID HASH ]
ott 05 10:58:33 NetworkManager[7368]: IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1] established between 192.168.178.81[192.168.178.81]...93.146.250.201[93.146.250.201]
ott 05 10:58:33 NetworkManager[7368]: scheduling reauthentication in 9875s
ott 05 10:58:33 NetworkManager[7368]: maximum IKE_SA lifetime 10415s
ott 05 10:58:33 NetworkManager[7368]: generating QUICK_MODE request 3585993419 [ HASH SA No ID ID NAT-OA NAT-OA ]
ott 05 10:58:33 NetworkManager[7368]: sending packet: from 192.168.178.81[4500] to 93.146.250.201[4500] (252 bytes)
ott 05 10:58:33 NetworkManager[7368]: received packet: from 93.146.250.201[4500] to 192.168.178.81[4500] (204 bytes)
ott 05 10:58:33 NetworkManager[7368]: parsed QUICK_MODE response 3585993419 [ HASH SA No ID ID N((24576)) NAT-OA NAT-OA ]
ott 05 10:58:33 NetworkManager[7368]: selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
ott 05 10:58:33 NetworkManager[7368]: no acceptable traffic selectors found
ott 05 10:58:33 NetworkManager[7368]: establishing connection '7250b4eb-345a-432c-b8df-16c326231ad5' failed
ott 05 10:58:33 charon[7341]: 06[NET] sending packet: from 192.168.178.81[4500] to 93.146.250.201[4500] (76 bytes)
ott 05 10:58:34 nm-l2tp-service[7318]: xl2tpd started with pid 7374
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: Not looking for kernel SAref support.
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: Using l2tp kernel support.
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: xl2tpd version xl2tpd-1.3.16 started on manjaro PID:7374
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: Forked by Scott Balmos and David Stipp, (C) 2001
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: Inherited by Jeff McAdams, (C) 2002
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: Forked again by Xelerance (www.xelerance.com) (C) 2006-2016
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: Listening on IP address 0.0.0.0, port 1701
ott 05 10:58:34 NetworkManager[7374]: xl2tpd[7374]: Connecting to host 93.146.250.201, port 1701
ott 05 10:58:34 NetworkManager[7158]: <info>  [1633424314.1363] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: VPN plugin: state changed: starting (3)
ott 05 10:58:41 charon[7341]: 08[NET] received packet: from 93.146.250.201[4500] to 192.168.178.81[4500] (204 bytes)
ott 05 10:58:41 charon[7341]: 08[IKE] received retransmit of response with ID 3585993419, but next request already sent
ott 05 10:58:48 NetworkManager[7374]: xl2tpd[7374]: death_handler: Fatal signal 15 received
ott 05 10:58:48 NetworkManager[7374]: xl2tpd[7374]: Connection 0 closed to 93.146.250.201, port 1701 (Server closing)
ott 05 10:58:48 NetworkManager[7158]: <warn>  [1633424328.1487] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: VPN plugin: failed: connect-failed (1)
ott 05 10:58:48 NetworkManager[7158]: <warn>  [1633424328.1489] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: VPN plugin: failed: connect-failed (1)
ott 05 10:58:48 NetworkManager[7158]: <info>  [1633424328.1489] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: VPN plugin: state changed: stopping (5)
ott 05 10:58:48 NetworkManager[7378]: Stopping strongSwan IPsec...
ott 05 10:58:48 charon[7341]: 00[DMN] SIGINT received, shutting down
ott 05 10:58:48 charon[7341]: 00[IKE] deleting IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1] between 192.168.178.81[192.168.178.81]...93.146.250.201[93.146.250.201]
ott 05 10:58:48 charon[7341]: 00[IKE] deleting IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1] between 192.168.178.81[192.168.178.81]...93.146.250.201[93.146.250.201]
ott 05 10:58:48 charon[7341]: 00[IKE] sending DELETE for IKE_SA 7250b4eb-345a-432c-b8df-16c326231ad5[1]
ott 05 10:58:48 charon[7341]: 00[ENC] generating INFORMATIONAL_V1 request 764550843 [ HASH D ]
ott 05 10:58:48 charon[7341]: 00[NET] sending packet: from 192.168.178.81[4500] to 93.146.250.201[4500] (92 bytes)
ott 05 10:58:48 charon[7341]: 00[IKE] uninstalling bypass policy for 192.168.178.0/24
ott 05 10:58:48 charon[7341]: 00[IKE] uninstalling bypass policy for ::1/128
ott 05 10:58:48 charon[7341]: 00[IKE] uninstalling bypass policy for fe80::/64
ott 05 10:58:48 ipsec_starter[7339]: child 7341 (charon) has quit (exit code 0)
ott 05 10:58:48 ipsec_starter[7339]: 
ott 05 10:58:48 ipsec_starter[7339]: charon stopped after 200 ms
ott 05 10:58:48 ipsec_starter[7339]: ipsec starter stopped
ott 05 10:58:48 nm-l2tp-service[7318]: ipsec shut down
ott 05 10:58:48 NetworkManager[7158]: <info>  [1633424328.3806] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: VPN plugin: state changed: stopped (6)
ott 05 10:58:48 NetworkManager[7158]: <info>  [1633424328.3874] vpn-connection[0x556f734182e0,7250b4eb-345a-432c-b8df-16c326231ad5,"VPN RESI 201",0]: VPN service disappeared
ott 05 10:58:52 NetworkManager[7158]: <info>  [1633424332.5642] audit: op="statistics" interface="wlp5s0" ifindex=3 args="0" pid=1123 uid=1000 result="success"

What have you tried exactly?

Are you sure you set all settings correctly, like username, password, authentication scheme?

Hi,

yes i think the configurations and credentials are right … i installed libreswan instead of strongwan, but i had other problems and i reinstalled strongswan. Now I have a different problem than before:

ott 05 18:10:15 NetworkManager[1651]: <info>  [1633450215.0602] audit: op="statistics" interface="wlp5s0" ifindex=3 args="2000" pid=995 uid=1000 result="success"
ott 05 18:10:19 NetworkManager[1651]: <info>  [1633450219.5762] audit: op="statistics" interface="wlp5s0" ifindex=3 args="0" pid=995 uid=1000 result="success"
ott 05 18:10:22 NetworkManager[1651]: <info>  [1633450222.1611] audit: op="connection-update" uuid="d6301f78-9792-4528-867d-715f97a8a8bf" name="RESI_201" args="vpn.data" pid=1878 uid=1000 result="success"
ott 05 18:10:25 NetworkManager[1651]: <info>  [1633450225.2963] audit: op="connection-update" uuid="d6301f78-9792-4528-867d-715f97a8a8bf" name="RESI_201" args="vpn.data" pid=1878 uid=1000 result="success"
ott 05 18:10:31 NetworkManager[1651]: <info>  [1633450231.4176] audit: op="connection-update" uuid="d6301f78-9792-4528-867d-715f97a8a8bf" name="RESI_201" pid=1878 uid=1000 result="success"
ott 05 18:10:44 NetworkManager[1651]: <info>  [1633450244.7264] audit: op="statistics" interface="wlp5s0" ifindex=3 args="2000" pid=995 uid=1000 result="success"
ott 05 18:10:46 NetworkManager[1651]: <info>  [1633450246.2715] audit: op="connection-activate" uuid="d6301f78-9792-4528-867d-715f97a8a8bf" name="RESI_201" pid=995 uid=1000 result="success"
ott 05 18:10:46 NetworkManager[1651]: <info>  [1633450246.2732] vpn-connection[0x564964e5c2d0,d6301f78-9792-4528-867d-715f97a8a8bf,"RESI_201",0]: Started the VPN service, PID 1897
ott 05 18:10:46 NetworkManager[1651]: <info>  [1633450246.2784] vpn-connection[0x564964e5c2d0,d6301f78-9792-4528-867d-715f97a8a8bf,"RESI_201",0]: Saw the service appear; activating connection
ott 05 18:10:46 NetworkManager[1651]: <info>  [1633450246.2853] vpn-connection[0x564964e5c2d0,d6301f78-9792-4528-867d-715f97a8a8bf,"RESI_201",0]: VPN connection: (ConnectInteractive) reply received
ott 05 18:10:46 nm-l2tp-service[1897]: Check port 1701
ott 05 18:10:46 NetworkManager[1912]: Stopping strongSwan IPsec...
ott 05 18:10:47 NetworkManager[1651]: <info>  [1633450247.1774] audit: op="statistics" interface="wlp5s0" ifindex=3 args="0" pid=995 uid=1000 result="success"
ott 05 18:10:48 NetworkManager[1909]: Starting strongSwan 5.9.3 IPsec [starter]...
ott 05 18:10:48 NetworkManager[1909]: Loading config setup
ott 05 18:10:48 NetworkManager[1909]: Loading conn 'd6301f78-9792-4528-867d-715f97a8a8bf'
ott 05 18:10:48 ipsec_starter[1909]: Starting strongSwan 5.9.3 IPsec [starter]...
ott 05 18:10:48 ipsec_starter[1909]: Loading config setup
ott 05 18:10:48 ipsec_starter[1909]: Loading conn 'd6301f78-9792-4528-867d-715f97a8a8bf'
ott 05 18:10:48 ipsec_starter[1923]: Attempting to start charon...
ott 05 18:10:48 charon[1924]: 00[DMN] Starting IKE charon daemon (strongSwan 5.9.3, Linux 5.13.19-2-MANJARO, x86_64)
ott 05 18:10:48 charon[1924]: 00[CFG] PKCS11 module '<name>' lacks library path
ott 05 18:10:48 charon[1924]: 00[LIB] plugin 'mysql' failed to load: libmariadb.so.3: cannot open shared object file: No such file or directory
ott 05 18:10:48 charon[1924]: 00[CFG] attr-sql plugin: database URI not set
ott 05 18:10:48 charon[1924]: 00[NET] using forecast interface wlp5s0
ott 05 18:10:48 charon[1924]: 00[CFG] joining forecast multicast groups: 224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250
ott 05 18:10:48 charon[1924]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
ott 05 18:10:48 charon[1924]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
ott 05 18:10:48 charon[1924]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
ott 05 18:10:48 charon[1924]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
ott 05 18:10:48 charon[1924]: 00[CFG] loading crls from '/etc/ipsec.d/crls'
ott 05 18:10:48 charon[1924]: 00[CFG] loading secrets from '/etc/ipsec.secrets'
ott 05 18:10:48 charon[1924]: 00[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
ott 05 18:10:48 charon[1924]: 00[CFG]   loaded IKE secret for %any
ott 05 18:10:48 charon[1924]: 00[CFG] sql plugin: database URI not set
ott 05 18:10:48 charon[1924]: 00[CFG] opening triplet file /etc/ipsec.d/triplets.dat failed: No such file or directory
ott 05 18:10:48 charon[1924]: 00[CFG] loaded 0 RADIUS server configurations
ott 05 18:10:48 charon[1924]: 00[CFG] HA config misses local/remote address
ott 05 18:10:48 charon[1924]: 00[CFG] no script for ext-auth script defined, disabled
ott 05 18:10:48 charon[1924]: 00[LIB] loaded plugins: charon ldap pkcs11 aesni aes des rc2 sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp curve25519 agent chapoly xcbc cmac hmac ntru drbg newhope bliss curl sqlite attr kernel-netlink resolve socket-default bypass-lan connmark forecast farp stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap xauth-pam xauth-noauth dhcp radattr unity counters
ott 05 18:10:48 charon[1924]: 00[LIB] dropped capabilities, running as uid 0, gid 0
ott 05 18:10:48 charon[1924]: 00[JOB] spawning 16 worker threads
ott 05 18:10:48 charon[1924]: 05[IKE] installed bypass policy for 192.168.178.0/24
ott 05 18:10:48 charon[1924]: 05[IKE] installed bypass policy for ::1/128
ott 05 18:10:48 charon[1924]: 05[IKE] installed bypass policy for fe80::/64
ott 05 18:10:48 ipsec_starter[1923]: charon (1924) started after 20 ms
ott 05 18:10:48 charon[1924]: 09[CFG] received stroke: add connection 'd6301f78-9792-4528-867d-715f97a8a8bf'
ott 05 18:10:48 charon[1924]: 09[CFG] added configuration 'd6301f78-9792-4528-867d-715f97a8a8bf'
ott 05 18:10:49 charon[1924]: 11[CFG] rereading secrets
ott 05 18:10:49 charon[1924]: 11[CFG] loading secrets from '/etc/ipsec.secrets'
ott 05 18:10:49 charon[1924]: 11[CFG] loading secrets from '/etc/ipsec.d/ipsec.nm-l2tp.secrets'
ott 05 18:10:49 charon[1924]: 11[CFG]   loaded IKE secret for %any
ott 05 18:10:49 charon[1924]: 13[CFG] received stroke: initiate 'd6301f78-9792-4528-867d-715f97a8a8bf'
ott 05 18:10:49 charon[1924]: 15[IKE] initiating Main Mode IKE_SA d6301f78-9792-4528-867d-715f97a8a8bf[1] to 63.146.250.201
ott 05 18:10:49 charon[1924]: 15[IKE] initiating Main Mode IKE_SA d6301f78-9792-4528-867d-715f97a8a8bf[1] to 63.146.250.201
ott 05 18:10:49 charon[1924]: 15[ENC] generating ID_PROT request 0 [ SA V V V V V ]
ott 05 18:10:49 charon[1924]: 15[NET] sending packet: from 192.168.178.81[500] to 63.146.250.201[500] (532 bytes)
ott 05 18:10:53 charon[1924]: 05[IKE] sending retransmit 1 of request message ID 0, seq 1
ott 05 18:10:53 charon[1924]: 05[NET] sending packet: from 192.168.178.81[500] to 63.146.250.201[500] (532 bytes)
ott 05 18:10:59 NetworkManager[1962]: Stopping strongSwan IPsec...
ott 05 18:10:59 charon[1924]: 00[DMN] SIGINT received, shutting down
ott 05 18:10:59 charon[1924]: 00[IKE] destroying IKE_SA in state CONNECTING without notification
ott 05 18:10:59 NetworkManager[1951]: initiating Main Mode IKE_SA d6301f78-9792-4528-867d-715f97a8a8bf[1] to 63.146.250.201
ott 05 18:10:59 NetworkManager[1951]: generating ID_PROT request 0 [ SA V V V V V ]
ott 05 18:10:59 NetworkManager[1951]: sending packet: from 192.168.178.81[500] to 63.146.250.201[500] (532 bytes)
ott 05 18:10:59 NetworkManager[1951]: sending retransmit 1 of request message ID 0, seq 1
ott 05 18:10:59 NetworkManager[1951]: sending packet: from 192.168.178.81[500] to 63.146.250.201[500] (532 bytes)
ott 05 18:10:59 NetworkManager[1951]: destroying IKE_SA in state CONNECTING without notification
ott 05 18:10:59 NetworkManager[1951]: establishing connection 'd6301f78-9792-4528-867d-715f97a8a8bf' failed
ott 05 18:10:59 charon[1924]: 00[IKE] uninstalling bypass policy for 192.168.178.0/24
ott 05 18:10:59 charon[1924]: 00[IKE] uninstalling bypass policy for ::1/128
ott 05 18:10:59 charon[1924]: 00[IKE] uninstalling bypass policy for fe80::/64
ott 05 18:10:59 ipsec_starter[1923]: child 1924 (charon) has quit (exit code 0)
ott 05 18:10:59 ipsec_starter[1923]: 
ott 05 18:10:59 ipsec_starter[1923]: charon stopped after 200 ms
ott 05 18:10:59 ipsec_starter[1923]: ipsec starter stopped
ott 05 18:10:59 nm-l2tp-service[1897]: g_dbus_method_invocation_take_error: assertion 'error != NULL' failed
ott 05 18:10:59 NetworkManager[1651]: <info>  [1633450259.5490] vpn-connection[0x564964e5c2d0,d6301f78-9792-4528-867d-715f97a8a8bf,"RESI_201",0]: VPN plugin: state changed: stopped (6)
ott 05 18:10:59 NetworkManager[1651]: <info>  [1633450259.5499] vpn-connection[0x564964e5c2d0,d6301f78-9792-4528-867d-715f97a8a8bf,"RESI_201",0]: VPN service disappeared
ott 05 18:10:59 NetworkManager[1651]: <warn>  [1633450259.5500] vpn-connection[0x564964e5c2d0,d6301f78-9792-4528-867d-715f97a8a8bf,"RESI_201",0]: VPN connection: failed to connect: 'Message recipient disconnected from message bus without replying'

Could you try on the terminal rather than though NetworkManager?

I don’t know the commands…

I have other log …

sudo /usr/lib/NetworkManager/nm-l2tp-service --debug                                                                                                                                                                     INT ✘ 
nm-l2tp[5818] <debug> nm-l2tp-service (version 1.8.6) starting...
nm-l2tp[5818] <debug>  uses default --bus-name "org.freedesktop.NetworkManager.l2tp"
nm-l2tp[5818] <info>  ipsec enable flag: yes
** Message: 21:12:09.422: Check port 1701
connection
        id : 'PIPPO'
        permissions : ['user:k***:']
        type : 'vpn'
        uuid : '6bc47099-fae6-4651-b43b-3072f99c54b2'

vpn
        data : {'gateway': '**.146.250.201', 'ipsec-enabled': 'yes', 'ipsec-psk': '****2016!', 'password-flags': '1', 'user': 'g***'}
        secrets : {'password': '****!2021!'}
        service-type : 'org.freedesktop.NetworkManager.l2tp'
        user-name : '***'

ipv4
        address-data : []
        dns : []
        dns-search : []
        method : 'auto'
        route-data : []

ipv6
        address-data : []
        dns : []
        dns-search : []
        method : 'auto'
        route-data : []

proxy

nm-l2tp[5818] <info>  starting ipsec
Stopping strongSwan IPsec failed: starter is not running
Starting strongSwan 5.9.3 IPsec [starter]...
Loading config setup
Loading conn '6bc47099-fae6-4651-b43b-3072f99c54b2'
nm-l2tp[5818] <info>  Spawned ipsec up script with PID 5865.
initiating Main Mode IKE_SA 6bc47099-fae6-4651-b43b-3072f99c54b2[1] to 63.146.250.201
generating ID_PROT request 0 [ SA V V V V V ]
sending packet: from 192.168.178.81[500] to **.146.250.201[500] (532 bytes)
sending retransmit 1 of request message ID 0, seq 1
sending packet: from 192.168.178.81[500] to **.146.250.201[500] (532 bytes)
nm-l2tp[5818] <warn>  Timeout trying to establish IPsec connection
nm-l2tp[5818] <info>  Terminating ipsec script with PID 5865.
Stopping strongSwan IPsec...
destroying IKE_SA in state CONNECTING without notification
establishing connection '6bc47099-fae6-4651-b43b-3072f99c54b2' failed
nm-l2tp[5818] <warn>  Could not establish IPsec tunnel.

(nm-l2tp-service:5818): GLib-GIO-CRITICAL **: 21:12:22.643: g_dbus_method_invocation_take_error: assertion 'error != NULL' failed

Regarding the “no acceptable traffic selectors found” error, you could try the workaround in:

The IPsec connection failed and xl2tpd shouldn’t have even been run, but for whatever reason strongswan returned a false positive to NetoworkManager-l2tp that the connection was successful and xl2tpd was run.

in the first log you are trying to connect to a VPN server with IP address of 93.146.250.201, in the second you appear to be trying to connect to a VPN server which is down and/or unresponsive with an IP address of 63.146.250.201

Does anyone have an updated guide on how to configure an ipsec vpn with shared key on manjaro via NetworkManager?

I have these data:

vpn server address
username
password
shared key
vpn server authentication methods: CHAP and MSCHAPv2

It should be fairly straight forward mapping from what you provided to what is in NetworkManager-l2tp. I’ve written in bold what it is in NetworkManager-l2tp :

  • vpn server address : Gateway.
  • username
  • password
  • shared key : Pre-shared Key (PSK).
  • vpn server authentication methods: CHAP and MSCHAPv2

Normally entering just the above works for the majority of L2TP/IPsec servers out there. But as there are dozens of L2TP/IPsec implementations out there, there can be compatibility issues.

In the first log output, you seem to be trying to connect to a Cisco ASA VPN server, which only a very small minority of L2TP manjaro users would be trying to connect to. I mentioned a workaround by disabling Strongswan’s Cisco Unity plug-in. If you are having more issues, providing the log output would make things easier to help.