Comment #4 on issue 22386 by benc...@chromium.org: L2TP/IPsec VPN fails to
connect to Check Point VPN server
http://code.google.com/p/chromium-os/issues/detail?id=22386
Fixed in ToT.
Comment #5 on issue 22386 by benc...@chromium.org: L2TP/IPsec VPN fails to
connect to Check Point VPN server
http://code.google.com/p/chromium-os/issues/detail?id=22386
(No comment was entered for this change.)
Commit: e80851fda152737008c679f9ce50dad4ffbce2c4
Email: ben...@chromium.org
vpn-manager: Not to refuse PAP authentication by default.
This CL changes the default value of the refuse_pap flag from true to
false in L2tpManager, which makes xl2tpd not to refuse PAP
authentication by default.
BUG=chromium-os:22386
TEST=Verified the following:
1. Connected successfully to Check Point VPN server (with a patched
version of xl2tpd to remove some AVPs in L2TP control packets).
2. Connected successfully to Windows 2008 RRAS server, Cisco ASA 5505
and StrongSWAN VPN server with L2TP/IPsec pre-shared key to make sure
the existing VPN support still works fine.
3. Ran network_VPN autotest test suite.
Change-Id: I1dd1149d693c8f206dfd8e75f599543c8b4623f8
Reviewed-on: https://gerrit.chromium.org/gerrit/11100
Reviewed-by: Ken Mixter <kmi...@chromium.org>
Tested-by: Ben Chan <ben...@chromium.org>
M l2tp_manager.cc
M l2tp_manager_test.cc
Commit: ee19cc5fa88c3e5ddfe46863090c12567838d7b4
Email: ben...@chromium.org
Patch xl2tpd-1.3.0 to exclude certain AVPs from L2TP control packets.
Certain AVPs (see RFC 2661 for details) included in L2TP control packets
by xl2tpd seem to be rejected by some VPN servers such as Check Point
VPN. Those AVPs are either optional or not used in our use cases. This
CL patches xl2tpd-1.3.0 to work around the issue by excluding those AVPs
from L2TP control packets.
BUG=chromium-os:22386
TEST=Verified the following:
1. Connected successfully to Check Point VPN server.
2. Connected successfully to Windows 2008 RRAS server, Cisco ASA 5505
and StrongSWAN VPN server with L2TP/IPsec pre-shared key to make sure
the existing VPN support still works fine.
3. network_VPN autotest test suite passed.
Change-Id: I44a28cc956c3a55a49f5a3df2b0bcf73c4a8bf28
Reviewed-on: https://gerrit.chromium.org/gerrit/11102
Reviewed-by: Ken Mixter <kmi...@chromium.org>
Tested-by: Ben Chan <ben...@chromium.org>
A net-dialup/xl2tpd/files/xl2tpd-1.3.0-avp-workaround.patch
A net-dialup/xl2tpd/xl2tpd-1.3.0-r1.ebuild
M net-dialup/xl2tpd/xl2tpd-1.3.0.ebuild
M profiles/targets/chromeos/package.keywords
Commit: f85276e8e7a096661965641165835d9c645f576a
Email: ben...@chromium.org
net-dialup/xl2tpd: import xl2tpd 1.3.0 from upstream Gentoo
This CL is identical to that one committed to third_party/portage-stable
a while ago (http://gerrit.chromium.org/gerrit/8176) but copied to
third_party/chromiumos-overlay so that we can apply local patches.
BUG=chromium-os:22386
TEST=emerge xl2tpd-1.3.0 for x86-generic and arm-generic
Change-Id: I17015b549001b751871342ffc48798f6aa24694a
Reviewed-on: https://gerrit.chromium.org/gerrit/11101
Reviewed-by: Ken Mixter <kmi...@chromium.org>
Tested-by: Ben Chan <ben...@chromium.org>
A net-dialup/xl2tpd/files/xl2tpd-1.3.0-LDFLAGS.patch
A net-dialup/xl2tpd/files/xl2tpd-dnsretry.patch
A net-dialup/xl2tpd/xl2tpd-1.3.0.ebuild
Comment #12 on issue 22386 by benc...@chromium.org: L2TP/IPsec VPN fails to
connect to Check Point VPN server
http://code.google.com/p/chromium-os/issues/detail?id=22386
Merged into R16 branch
Comment #13 on issue 22386 by deep...@chromium.org: L2TP/IPsec VPN fails to
connect to Check Point VPN server
http://code.google.com/p/chromium-os/issues/detail?id=22386
Verified in 1193.49.0 with 16.0.912.36 (r109393).