[GH-ISSUE #491] 无法在鸿蒙6.0上使用 IPsec/L2TP 链接VPN #460

Closed
opened 2026-03-02 08:19:06 +03:00 by kerem · 2 comments
Owner

Originally created by @601513928 on GitHub (Jan 8, 2026).
Original GitHub issue: https://github.com/hwdsl2/docker-ipsec-vpn-server/issues/491

任务列表

问题描述
使用清楚简明的语言描述这个 bug。

使用鸿蒙 6.0版本手机 链接VPN 无法成功链接,采用模式 IPsec/L2TP
pppd日志卡在这一步,未采用 MS-CHAP-v2
sent [LCP ConfReq id=0x1 <mru 1280> <asyncmap 0x0> <magic 0x176dc56a>]

重现步骤
重现该 bug 的步骤:

  1. 使用鸿蒙6.0系统,其他android,ios手机未尝试。
  2. ...

期待的正确结果
简要地描述你期望的正确结果。

日志
启用日志,检查 VPN 状态,并且添加错误日志以帮助解释该问题(如果适用)。
libreswan-日志:
2026-01-08T07:28:51.658562+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #6: received Delete SA payload via #5
2026-01-08T07:28:51.673434+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #6: deleting IPsec SA (QUICK_R2) aged 630.083859s and NOT sending notification
2026-01-08T07:28:51.673507+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #6: ESP traffic information: in=782B out=1KiB
2026-01-08T07:28:51.673649+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #5: received Delete SA payload: self-deleting ISAKMP State #5
2026-01-08T07:28:51.673667+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #5: deleting ISAKMP SA (MAIN_R3) aged 630.125331s and NOT sending notification
2026-01-08T07:28:51.673707+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197: deleting connection instance with peer 124.77.159.197
2026-01-08T07:28:57.524269+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: responding to Main Mode from unknown peer 124.77.159.197:500
2026-01-08T07:28:57.524304+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: Oakley Transform [3DES_CBC (192), HMAC_SHA1, MODP1024] refused
2026-01-08T07:28:57.524360+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: sent Main Mode R1
2026-01-08T07:28:57.539627+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: sent Main Mode R2
2026-01-08T07:28:57.560755+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: Peer ID is FQDN: '@home1'
2026-01-08T07:28:57.560806+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: switched to "l2tp-psk"[5] 124.77.159.197
2026-01-08T07:28:57.560899+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: ISAKMP SA established {auth=PRESHARED_KEY cipher=AES_CBC_128 integ=HMAC_SHA1 group=MODP1024}
2026-01-08T07:28:57.579757+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: the peer proposed: 102.22.333.42/32/UDP/1701===192.168.2.88/32/UDP/1701
2026-01-08T07:28:57.579791+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: NAT-Traversal: received 2 NAT-OA. Using first; ignoring others
2026-01-08T07:28:57.579963+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: responding to Quick Mode proposal {msgid:5b549291} using ISAKMP SA #7
2026-01-08T07:28:57.579982+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: us: 172.20.0.2/32/UDP/1701===172.20.0.2[102.22.333.42]---172.20.0.1 them: 124.77.159.197[@home1]===124.77.159.197/32/UDP/1701
2026-01-08T07:28:57.580158+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: sent Quick Mode reply, inbound IPsec SA installed, expecting confirmation transport mode {ESPinUDP=>0xc33a4b5e <0xda457c61 xfrm=AES_CBC_256-HMAC_SHA1_96 NATOA=192.168.2.88 NATD=124.77.159.197:3881 DPD=active}
2026-01-08T07:28:57.613870+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: IPsec SA established transport mode {ESPinUDP=>0xc33a4b5e <0xda457c61 xfrm=AES_CBC_256-HMAC_SHA1_96 NATOA=192.168.2.88 NATD=124.77.159.197:3881 DPD=active}
2026-01-08T07:29:54.019161+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: received Delete SA payload via #7
2026-01-08T07:29:54.034058+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: deleting IPsec SA (QUICK_R2) aged 56.454241s and NOT sending notification
2026-01-08T07:29:54.034088+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: ESP traffic information: in=302B out=522B
2026-01-08T07:29:54.034210+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: received Delete SA payload: self-deleting ISAKMP State #7
2026-01-08T07:29:54.034225+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: deleting ISAKMP SA (MAIN_R3) aged 56.509977s and NOT sending notification
2026-01-08T07:29:54.034259+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197: deleting connection instance with peer 124.77.159.197

pppd日志
using channel 2
Using interface ppp1
Connect: ppp1 <-->
Overriding mtu 1500 to 1280
PPPoL2TP options: lnsmode tid 56187 sid 28750 debugmask 0
Overriding mru 1500 to mtu value 1280
sent [LCP ConfReq id=0x1 <mru 1280> <asyncmap 0x0> <magic 0xf180a45e>]
using channel 3
Using interface ppp1
Connect: ppp1 <-->
Overriding mtu 1500 to 1280
PPPoL2TP options: lnsmode tid 43930 sid 8673 debugmask 0
Overriding mru 1500 to mtu value 1280
sent [LCP ConfReq id=0x1 <mru 1280> <asyncmap 0x0> <magic 0x176dc56a>]

服务器信息(请填写以下信息)

  • Docker 主机操作系统: [比如 Ubuntu 24.04] Linux VM-0-2-opencloudos 6.6.117-45.1.oc9.x86_64
  • 服务提供商(如果适用): [比如 GCP, AWS] 腾讯云

客户端信息(请填写以下信息)

  • 设备: [比如 iPhone 12] 华为mate 60 pro
  • 操作系统: [比如 iOS 15] 鸿蒙 6.0
  • VPN 模式: [IPsec/L2TP, IPsec/XAuth ("Cisco IPsec") 或 IKEv2] IPsec/L2TP

其它信息
添加关于该 bug 的其它信息。
单独使用IPsec/XAuth等模式也无法在 鸿蒙6.0上链接

Originally created by @601513928 on GitHub (Jan 8, 2026). Original GitHub issue: https://github.com/hwdsl2/docker-ipsec-vpn-server/issues/491 **任务列表** - [x] 我已阅读 [自述文件](https://github.com/hwdsl2/docker-ipsec-vpn-server/blob/master/README-zh.md) - [x] 我已阅读 [重要提示](https://github.com/hwdsl2/docker-ipsec-vpn-server/blob/master/README-zh.md#重要提示) - [x] 我已按照说明 [配置 VPN 客户端](https://github.com/hwdsl2/docker-ipsec-vpn-server/blob/master/README-zh.md#下一步) - [x] 我检查了 [IKEv1 故障排除](https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/docs/clients-zh.md#ikev1-故障排除),[IKEv2 故障排除](https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/docs/ikev2-howto-zh.md#ikev2-故障排除),[启用日志](https://github.com/hwdsl2/docker-ipsec-vpn-server/blob/master/docs/advanced-usage-zh.md#启用-libreswan-日志) 并查看了 [VPN 状态](https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/docs/clients-zh.md#检查日志及-vpn-状态) - [x] 我搜索了已有的 [Issues](https://github.com/hwdsl2/docker-ipsec-vpn-server/issues?q=is%3Aissue) - [x] 这个 bug 是关于 IPsec VPN 服务器 Docker 镜像,而不是 IPsec VPN 本身 <!--- 如果你发现了 IPsec VPN 的一个可重复的程序漏洞,请在 https://github.com/libreswan/libreswan 提交一个错误报告。VPN 的相关问题可在 [Libreswan](https://lists.libreswan.org) 或 [strongSwan](https://lists.strongswan.org) 用户邮件列表提问,或者搜索比如 [Stack Overflow](https://stackoverflow.com/questions/tagged/vpn) 等网站。 ---> **问题描述** 使用清楚简明的语言描述这个 bug。 使用鸿蒙 6.0版本手机 链接VPN 无法成功链接,采用模式 IPsec/L2TP pppd日志卡在这一步,未采用 MS-CHAP-v2 sent [LCP ConfReq id=0x1 <mru 1280> <asyncmap 0x0> <auth chap MD5> <magic 0x176dc56a>] **重现步骤** 重现该 bug 的步骤: 1. 使用鸿蒙6.0系统,其他android,ios手机未尝试。 2. ... **期待的正确结果** 简要地描述你期望的正确结果。 **日志** [启用日志](https://github.com/hwdsl2/docker-ipsec-vpn-server/blob/master/docs/advanced-usage-zh.md#启用-libreswan-日志),检查 [VPN 状态](https://github.com/hwdsl2/setup-ipsec-vpn/blob/master/docs/clients-zh.md#检查日志及-vpn-状态),并且添加错误日志以帮助解释该问题(如果适用)。 libreswan-日志: 2026-01-08T07:28:51.658562+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #6: received Delete SA payload via #5 2026-01-08T07:28:51.673434+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #6: deleting IPsec SA (QUICK_R2) aged 630.083859s and NOT sending notification 2026-01-08T07:28:51.673507+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #6: ESP traffic information: in=782B out=1KiB 2026-01-08T07:28:51.673649+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #5: received Delete SA payload: self-deleting ISAKMP State #5 2026-01-08T07:28:51.673667+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197 #5: deleting ISAKMP SA (MAIN_R3) aged 630.125331s and NOT sending notification 2026-01-08T07:28:51.673707+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[4] 124.77.159.197: deleting connection instance with peer 124.77.159.197 2026-01-08T07:28:57.524269+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: responding to Main Mode from unknown peer 124.77.159.197:500 2026-01-08T07:28:57.524304+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: Oakley Transform [3DES_CBC (192), HMAC_SHA1, MODP1024] refused 2026-01-08T07:28:57.524360+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: sent Main Mode R1 2026-01-08T07:28:57.539627+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: sent Main Mode R2 2026-01-08T07:28:57.560755+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: Peer ID is FQDN: '@home1' 2026-01-08T07:28:57.560806+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[2] 124.77.159.197 #7: switched to "l2tp-psk"[5] 124.77.159.197 2026-01-08T07:28:57.560899+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: ISAKMP SA established {auth=PRESHARED_KEY cipher=AES_CBC_128 integ=HMAC_SHA1 group=MODP1024} 2026-01-08T07:28:57.579757+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: the peer proposed: 102.22.333.42/32/UDP/1701===192.168.2.88/32/UDP/1701 2026-01-08T07:28:57.579791+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: NAT-Traversal: received 2 NAT-OA. Using first; ignoring others 2026-01-08T07:28:57.579963+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: responding to Quick Mode proposal {msgid:5b549291} using ISAKMP SA #7 2026-01-08T07:28:57.579982+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: us: 172.20.0.2/32/UDP/1701===172.20.0.2[102.22.333.42]---172.20.0.1 them: 124.77.159.197[@home1]===124.77.159.197/32/UDP/1701 2026-01-08T07:28:57.580158+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: sent Quick Mode reply, inbound IPsec SA installed, expecting confirmation transport mode {ESPinUDP=>0xc33a4b5e <0xda457c61 xfrm=AES_CBC_256-HMAC_SHA1_96 NATOA=192.168.2.88 NATD=124.77.159.197:3881 DPD=active} 2026-01-08T07:28:57.613870+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: IPsec SA established transport mode {ESPinUDP=>0xc33a4b5e <0xda457c61 xfrm=AES_CBC_256-HMAC_SHA1_96 NATOA=192.168.2.88 NATD=124.77.159.197:3881 DPD=active} 2026-01-08T07:29:54.019161+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: received Delete SA payload via #7 2026-01-08T07:29:54.034058+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: deleting IPsec SA (QUICK_R2) aged 56.454241s and NOT sending notification 2026-01-08T07:29:54.034088+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #8: ESP traffic information: in=302B out=522B 2026-01-08T07:29:54.034210+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: received Delete SA payload: self-deleting ISAKMP State #7 2026-01-08T07:29:54.034225+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197 #7: deleting ISAKMP SA (MAIN_R3) aged 56.509977s and NOT sending notification 2026-01-08T07:29:54.034259+00:00 b3c54e2ff3b5 pluto[285]: "l2tp-psk"[5] 124.77.159.197: deleting connection instance with peer 124.77.159.197 pppd日志 using channel 2 Using interface ppp1 Connect: ppp1 <--> Overriding mtu 1500 to 1280 PPPoL2TP options: lnsmode tid 56187 sid 28750 debugmask 0 Overriding mru 1500 to mtu value 1280 sent [LCP ConfReq id=0x1 <mru 1280> <asyncmap 0x0> <auth chap MD5> <magic 0xf180a45e>] using channel 3 Using interface ppp1 Connect: ppp1 <--> Overriding mtu 1500 to 1280 PPPoL2TP options: lnsmode tid 43930 sid 8673 debugmask 0 Overriding mru 1500 to mtu value 1280 sent [LCP ConfReq id=0x1 <mru 1280> <asyncmap 0x0> <auth chap MD5> <magic 0x176dc56a>] **服务器信息(请填写以下信息)** - Docker 主机操作系统: [比如 Ubuntu 24.04] Linux VM-0-2-opencloudos 6.6.117-45.1.oc9.x86_64 - 服务提供商(如果适用): [比如 GCP, AWS] 腾讯云 **客户端信息(请填写以下信息)** - 设备: [比如 iPhone 12] 华为mate 60 pro - 操作系统: [比如 iOS 15] 鸿蒙 6.0 - VPN 模式: [IPsec/L2TP, IPsec/XAuth ("Cisco IPsec") 或 IKEv2] IPsec/L2TP **其它信息** 添加关于该 bug 的其它信息。 单独使用IPsec/XAuth等模式也无法在 鸿蒙6.0上链接
kerem closed this issue 2026-03-02 08:19:06 +03:00
Author
Owner

@hwdsl2 commented on GitHub (Jan 9, 2026):

@601513928 你好!从你的日志来看,IPsec SA 可以成功创建,但是 L2TP 连接没有成功,有可能是鸿蒙系统这边的问题。目前本项目暂不支持该客户端,类似的 Issue 请参见这里。你可以尝试一下 IPsec VPN 以外的其他解决方案。

<!-- gh-comment-id:3726693042 --> @hwdsl2 commented on GitHub (Jan 9, 2026): @601513928 你好!从你的日志来看,IPsec SA 可以成功创建,但是 L2TP 连接没有成功,有可能是鸿蒙系统这边的问题。目前本项目暂不支持该客户端,类似的 Issue 请参见[这里](https://github.com/hwdsl2/setup-ipsec-vpn/issues/1546)。你可以尝试一下 IPsec VPN 以外的其他解决方案。
Author
Owner

@601513928 commented on GitHub (Jan 9, 2026):

好的谢谢

修行的路上
@.***

<!-- gh-comment-id:3726709054 --> @601513928 commented on GitHub (Jan 9, 2026): 好的谢谢 修行的路上 ***@***.***
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/docker-ipsec-vpn-server#460
No description provided.