Авторизация

Проблемы с подключением

Подробнее
5 дн. 20 ч. назад - 5 дн. 20 ч. назад #1 от vovankin2
vovankin2 создал тему: Проблемы с подключением
Есть следующие проблемы с подключением:
В планах было с ПК череp putty подключаться к устройствам в домашней сети, по следующей схеме: На смартфоне (андройд v14) создаю точку доступа для того, что бы ПК (Windows 10) раздавать интернет и следом смартфоном подключаюсь к туннелю VPNKI.

Что получается по итогу:
1. У ПК есть выход в интернет (через смартфон), но при этом не пингуется ваш шлюз 172.16.0.1. Устройства в домашней сети не на связи.
2. У смартфона при соединении с туннелем, пропадает интернет, пока не отключишь vpn. Шлюз 172.16.0.1 пингуется. Устройства в домашней сети на связи.

Еще проблемы:
1. Приложение StrongSwan на смартфон ставил, настройки прописывал по инструкции. Авторизация чз ikev2.vpnki.ru не проходит. 
2. Через оператора Мегафон туннель (стандартными настройками андройд) соединяется, через домашнего провайдера (стационарная связь) туннель не строится.

Прошу консультации - куда копать?
Последнее редактирование: 5 дн. 20 ч. назад пользователем vovankin2.

Пожалуйста Войти или Регистрация, чтобы присоединиться к беседе.

Подробнее
5 дн. 19 ч. назад #2 от admin
admin ответил в теме Проблемы с подключением
Добрый день, я не до конца понял вашу схему, но то, что понял наталкивает на мысли о том, что вы возможно ожидаете получить не то, что будет работать.
Если вы хотите построить туннель со смартфона и, раздав Интернет, использовать единый туннель для всех устройств, то это не получится, так как ваш смартфон (не знаю насчет Андроид 14, но более рание версии точно) не является маршрутизатором. Режим раздачи сети там вроде именуются tethering и это не маршрутизация. Туннелем может пользоваться только сам смартфон.
Теперь по поводу потери Интернет при подключенном туннеле. А о каком протоколе подключения со смартфона идет речь?

если все заработало, то, пожалуйста, donate сюда - yoomoney.ru/to/410014618210530

Пожалуйста Войти или Регистрация, чтобы присоединиться к беседе.

Подробнее
4 дн. 22 ч. назад #3 от vovankin2
vovankin2 ответил в теме Проблемы с подключением
Вопрос: О каком протоколе соединения идёт речь?
Ответ: если вы говорите про протокол авторизации то у меня телефоне есть только разновидности IKEv2/IPSEC, в моем случае MSCHAPv2.

Или может быть кроме настройки впн соединения (указать сервер, логин, пароль) нужно ещё какие-то настройки делать?

Пожалуйста Войти или Регистрация, чтобы присоединиться к беседе.

Подробнее
4 дн. 21 ч. назад - 4 дн. 21 ч. назад #4 от admin
admin ответил в теме Проблемы с подключением
Если речь про штатный клиент VPN в Android то у него нет (ну или я не нашел) возможности отказаться от маршрутизации дефолта в туннель. Что там в "Расширенных" или "дополнительных" настройках ни указывай все равно весь трафик пытается идти в туннель и поэтому Интернет пропадает. Попробуйте погуглить что нибудь про split tunneling android ipsec, но я не нашел.
Если нужен именно IPsec, то используйте клиента StrongSwan - в нем можно задать маршруты на клиенте вручную. А что у вас с ним не так? Все должно работать. Нужен лог

если все заработало, то, пожалуйста, donate сюда - yoomoney.ru/to/410014618210530
Последнее редактирование: 4 дн. 21 ч. назад пользователем admin.

Пожалуйста Войти или Регистрация, чтобы присоединиться к беседе.

Подробнее
4 дн. 20 ч. назад #5 от vovankin2
vovankin2 ответил в теме Проблемы с подключением
Прикладываю лог.
Jun 26 15:38:55 00[DMN] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Jun 26 15:38:55 00[DMN] Starting IKE service (strongSwan 6.0.1rc1, Android 14 - UP1A.231005.007.S928BXXS3AXFC/2024-07-01, SM-S928B - samsung/e3qxxx/samsung, Linux 6.1.25-android14-11-28243294-abS928BXXS3AXFC, aarch64, org.strongswan.android)
Jun 26 15:38:55 00[LIB] providers loaded by OpenSSL: default legacy
Jun 26 15:38:56 00[LIB] loaded plugins: androidbridge charon android-log socket-default openssl nonce pkcs1 pem x509 xcbc kdf revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
Jun 26 15:38:56 00[JOB] spawning 16 worker threads
Jun 26 15:38:56 10[IKE] initiating IKE_SA android[4] to 84.201.157.25
Jun 26 15:38:56 10[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Jun 26 15:38:56 10[NET] sending packet: from 10.185.15.254[43594] to 84.201.157.25[500] (948 bytes)
Jun 26 15:38:56 11[NET] received packet: from 84.201.157.25[500] to 10.185.15.254[43594] (272 bytes)
Jun 26 15:38:56 11[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
Jun 26 15:38:56 11[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
Jun 26 15:38:56 11[IKE] local host is behind NAT, sending keep alives
Jun 26 15:38:56 11[IKE] remote host is behind NAT
Jun 26 15:38:56 11[CFG] loaded crl issued by 'C=US, O=Internet Security Research Group, CN=ISRG Root X1'
Jun 26 15:38:56 11[CFG] loaded crl issued by 'C=US, O=Let's Encrypt, CN=R11'
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Certainly, CN=Certainly Root R1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Internet Security Research Group, CN=ISRG Root X1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Internet Security Research Group, CN=ISRG Root X2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert, Inc., CN=DigiCert TLS ECC P384 Root G5"
Jun 26 15:38:56 11[IKE] sending cert request for "C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=CommScope, CN=CommScope Public Trust ECC Root-01"
Jun 26 15:38:56 11[IKE] sending cert request for "CN=Atos TrustedRoot Root CA ECC TLS 2021, O=Atos, C=DE"
Jun 26 15:38:56 11[IKE] sending cert request for "C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Google Trust Services LLC, CN=GTS Root R3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "CN=Atos TrustedRoot Root CA RSA TLS 2021, O=Atos, C=DE"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Starfield Technologies, Inc., OU=Starfield Class 2 Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Illinois, L=Chicago, O=Trustwave Holdings, Inc., CN=Trustwave Global ECC P384 Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Google Trust Services LLC, CN=GTS Root R2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=TW, O=Chunghwa Telecom Co., Ltd., OU=ePKI Root Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=TW, O=Chunghwa Telecom Co., Ltd., CN=HiPKI Root CA - G1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=RO, O=certSIGN, OU=certSIGN ROOT CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015"
Jun 26 15:38:56 11[IKE] sending cert request for "C=FR, O=Dhimyotis, CN=Certigna"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Illinois, L=Chicago, O=Trustwave Holdings, Inc., CN=Trustwave Global ECC P256 Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=CommScope, CN=CommScope Public Trust RSA Root-02"
Jun 26 15:38:56 11[IKE] sending cert request for "C=HK, ST=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Certainly, CN=Certainly Root E1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Amazon, CN=Amazon Root CA 1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=SSL Corporation, CN=SSL.com TLS RSA Root CA 2022"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Google Trust Services LLC, CN=GTS Root R4"
Jun 26 15:38:56 11[IKE] sending cert request for "C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020"
Jun 26 15:38:56 11[IKE] sending cert request for "C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=GUANG DONG CERTIFICATE AUTHORITY CO.,LTD., CN=GDCA TrustAUTH R5 ROOT"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=TrustAsia Technologies, Inc., CN=TrustAsia Global Root CA G4"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=SecureTrust Corporation, CN=SecureTrust CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES"
Jun 26 15:38:56 11[IKE] sending cert request for "C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=iTrusChina Co.,Ltd., CN=vTrus ECC Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=AffirmTrust, CN=AffirmTrust Commercial"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Google Trust Services LLC, CN=GTS Root R1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Services Root Certificate Authority - G2"
Jun 26 15:38:56 11[IKE] sending cert request for "serialNumber=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009"
Jun 26 15:38:56 11[IKE] sending cert request for "C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC"
Jun 26 15:38:56 11[IKE] sending cert request for "OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign"
Jun 26 15:38:56 11[IKE] sending cert request for "C=HU, L=Budapest, O=Microsec Ltd., 55:04:61=VATHU-23584497, CN=e-Szigno Root CA 2017"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Entrust, Inc., OU=www.entrust.net/CPS is incorporated by reference, OU=(c) 2006 Entrust, Inc., CN=Entrust Root Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=CommScope, CN=CommScope Public Trust ECC Root-02"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, OU=(c) 2015 Entrust, Inc. - for authorized use only, CN=Entrust Root Certification Authority - G4"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=CommScope, CN=CommScope Public Trust RSA Root-01"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=TrustAsia Technologies, Inc., CN=TrustAsia Global Root CA G3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root R46"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=ES, O=IZENPE S.A., CN=Izenpe.com"
Jun 26 15:38:56 11[IKE] sending cert request for "CN=Atos TrustedRoot 2011, O=Atos, C=DE"
Jun 26 15:38:56 11[IKE] sending cert request for "C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM"
Jun 26 15:38:56 11[IKE] sending cert request for "C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services"
Jun 26 15:38:56 11[IKE] sending cert request for "C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=HU, L=Budapest, O=NetLock Kft., OU=Tan??s??tv??nykiad??k (Certification Services), CN=NetLock Arany (Class Gold) F??tan??s??tv??ny"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root E46"
Jun 26 15:38:56 11[IKE] sending cert request for "C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Amazon, CN=Amazon Root CA 2"
Jun 26 15:38:56 11[IKE] sending cert request for "OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign"
Jun 26 15:38:56 11[IKE] sending cert request for "C=JP, O=SECOM Trust Systems CO.,LTD., CN=Security Communication RootCA3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=iTrusChina Co.,Ltd., CN=vTrus Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=DigiCert, Inc., CN=DigiCert TLS RSA4096 Root G5"
Jun 26 15:38:56 11[IKE] sending cert request for "C=JP, O=Japan Certification Services, Inc., CN=SecureSign RootCA11"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=UniTrust, CN=UCA Extended Validation Root"
Jun 26 15:38:56 11[IKE] sending cert request for "C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=SecureTrust Corporation, CN=Secure Global CA"
Jun 26 15:38:56 11[IKE] sending cert request for "O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048)"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, OU=(c) 2009 Entrust, Inc. - for authorized use only, CN=Entrust Root Certification Authority - G2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=JP, O=SECOM Trust Systems CO.,LTD., OU=Security Communication RootCA2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC"
Jun 26 15:38:56 11[IKE] sending cert request for "C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=AffirmTrust, CN=AffirmTrust Premium"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46"
Jun 26 15:38:56 11[IKE] sending cert request for "O=TeliaSonera, CN=TeliaSonera Root CA v1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC"
Jun 26 15:38:56 11[IKE] sending cert request for "C=ES, O=FNMT-RCM, OU=Ceres, 55:04:61=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Amazon, CN=Amazon Root CA 4"
Jun 26 15:38:56 11[IKE] sending cert request for "OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign"
Jun 26 15:38:56 11[IKE] sending cert request for "C=JP, O=SECOM Trust Systems CO.,LTD., CN=Security Communication ECC RootCA1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, OU=(c) 2012 Entrust, Inc. - for authorized use only, CN=Entrust Root Certification Authority - EC1"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009"
Jun 26 15:38:56 11[IKE] sending cert request for "C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=Amazon, CN=Amazon Root CA 3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=UniTrust, CN=UCA Global G2 Root"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, ST=Illinois, L=Chicago, O=Trustwave Holdings, Inc., CN=Trustwave Global Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT"
Jun 26 15:38:56 11[IKE] sending cert request for "C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA"
Jun 26 15:38:56 11[IKE] sending cert request for "C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=SSL Corporation, CN=SSL.com TLS ECC Root CA 2022"
Jun 26 15:38:56 11[IKE] sending cert request for "C=US, O=AffirmTrust, CN=AffirmTrust Networking"
Jun 26 15:38:56 11[IKE] establishing CHILD_SA android{4}
Jun 26 15:38:56 11[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Jun 26 15:38:56 11[ENC] splitting IKE message (3344 bytes) into 3 fragments
Jun 26 15:38:56 11[ENC] generating IKE_AUTH request 1 [ EF(1/3) ]
Jun 26 15:38:56 11[ENC] generating IKE_AUTH request 1 [ EF(2/3) ]
Jun 26 15:38:56 11[ENC] generating IKE_AUTH request 1 [ EF(3/3) ]
Jun 26 15:38:56 11[NET] sending packet: from 10.185.15.254[35457] to 84.201.157.25[4500] (1364 bytes)
Jun 26 15:38:56 11[NET] sending packet: from 10.185.15.254[35457] to 84.201.157.25[4500] (1364 bytes)
Jun 26 15:38:56 11[NET] sending packet: from 10.185.15.254[35457] to 84.201.157.25[4500] (756 bytes)
Jun 26 15:38:56 05[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (532 bytes)
Jun 26 15:38:56 05[ENC] parsed IKE_AUTH response 1 [ EF(1/7) ]
Jun 26 15:38:56 05[ENC] received fragment #1 of 7, waiting for complete IKE message
Jun 26 15:38:56 07[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (532 bytes)
Jun 26 15:38:56 07[ENC] parsed IKE_AUTH response 1 [ EF(2/7) ]
Jun 26 15:38:56 07[ENC] received fragment #2 of 7, waiting for complete IKE message
Jun 26 15:38:56 06[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (532 bytes)
Jun 26 15:38:56 06[ENC] parsed IKE_AUTH response 1 [ EF(3/7) ]
Jun 26 15:38:56 06[ENC] received fragment #3 of 7, waiting for complete IKE message
Jun 26 15:38:56 17[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (532 bytes)
Jun 26 15:38:56 17[ENC] parsed IKE_AUTH response 1 [ EF(4/7) ]
Jun 26 15:38:56 17[ENC] received fragment #4 of 7, waiting for complete IKE message
Jun 26 15:38:56 15[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (532 bytes)
Jun 26 15:38:56 15[ENC] parsed IKE_AUTH response 1 [ EF(5/7) ]
Jun 26 15:38:56 15[ENC] received fragment #5 of 7, waiting for complete IKE message
Jun 26 15:38:56 10[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (532 bytes)
Jun 26 15:38:56 10[ENC] parsed IKE_AUTH response 1 [ EF(6/7) ]
Jun 26 15:38:56 10[ENC] received fragment #6 of 7, waiting for complete IKE message
Jun 26 15:38:56 14[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (180 bytes)
Jun 26 15:38:56 14[ENC] parsed IKE_AUTH response 1 [ EF(7/7) ]
Jun 26 15:38:56 14[ENC] received fragment #7 of 7, reassembled fragmented IKE message (2960 bytes)
Jun 26 15:38:56 14[ENC] parsed IKE_AUTH response 1 [ IDr CERT CERT AUTH EAP/REQ/ID ]
Jun 26 15:38:56 14[IKE] received end entity cert "CN=ikev2.vpnki.ru"
Jun 26 15:38:56 14[IKE] received issuer cert "C=US, O=Let's Encrypt, CN=R11"
Jun 26 15:38:56 14[CFG] using certificate "CN=ikev2.vpnki.ru"
Jun 26 15:38:56 14[CFG] using untrusted intermediate certificate "C=US, O=Let's Encrypt, CN=R11"
Jun 26 15:38:56 14[CFG] using trusted ca certificate "C=US, O=Internet Security Research Group, CN=ISRG Root X1"
Jun 26 15:38:56 14[CFG] reached self-signed root ca with a path length of 1
Jun 26 15:38:56 14[CFG] checking certificate status of "CN=ikev2.vpnki.ru"
Jun 26 15:38:56 14[CFG] using certificate "C=US, O=Let's Encrypt, CN=R11"
Jun 26 15:38:56 14[CFG] using trusted ca certificate "C=US, O=Internet Security Research Group, CN=ISRG Root X1"
Jun 26 15:38:56 14[CFG] reached self-signed root ca with a path length of 0
Jun 26 15:38:56 14[CFG] crl correctly signed by "C=US, O=Let's Encrypt, CN=R11"
Jun 26 15:38:56 14[CFG] crl is valid: until Jul 03 12:50:13 2025
Jun 26 15:38:56 14[CFG] using cached crl
Jun 26 15:38:56 14[CFG] certificate status is good
Jun 26 15:38:56 14[CFG] checking certificate status of "C=US, O=Let's Encrypt, CN=R11"
Jun 26 15:38:56 14[CFG] using trusted certificate "C=US, O=Internet Security Research Group, CN=ISRG Root X1"
Jun 26 15:38:56 14[CFG] crl correctly signed by "C=US, O=Internet Security Research Group, CN=ISRG Root X1"
Jun 26 15:38:56 14[CFG] crl is valid: until Nov 11 04:59:59 2025
Jun 26 15:38:56 14[CFG] using cached crl
Jun 26 15:38:56 14[CFG] certificate status is good
Jun 26 15:38:56 14[IKE] authentication of 'ikev2.vpnki.ru' with RSA_EMSA_PKCS1_SHA2_256 successful
Jun 26 15:38:56 14[IKE] server requested EAP_IDENTITY (id 0x00), sending 'user7783'
Jun 26 15:38:56 14[ENC] generating IKE_AUTH request 2 [ EAP/RES/ID ]
Jun 26 15:38:56 14[NET] sending packet: from 10.185.15.254[35457] to 84.201.157.25[4500] (96 bytes)
Jun 26 15:38:56 11[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (96 bytes)
Jun 26 15:38:56 11[ENC] parsed IKE_AUTH response 2 [ EAP/REQ/MD5 ]
Jun 26 15:38:56 11[IKE] server requested EAP_MD5 authentication (id 0x01)
Jun 26 15:38:56 11[ENC] generating IKE_AUTH request 3 [ EAP/RES/MD5 ]
Jun 26 15:38:56 11[NET] sending packet: from 10.185.15.254[35457] to 84.201.157.25[4500] (96 bytes)
Jun 26 15:38:57 13[NET] received packet: from 84.201.157.25[4500] to 10.185.15.254[35457] (80 bytes)
Jun 26 15:38:57 13[ENC] parsed IKE_AUTH response 3 [ EAP/FAIL ]
Jun 26 15:38:57 13[IKE] received EAP_FAILURE, EAP authentication failed
Jun 26 15:38:57 13[ENC] generating INFORMATIONAL request 4 [ N(AUTH_FAILED) ]
Jun 26 15:38:57 13[NET] sending packet: from 10.185.15.254[35457] to 84.201.157.25[4500] (80 bytes)

Пожалуйста Войти или Регистрация, чтобы присоединиться к беседе.

Подробнее
4 дн. 19 ч. назад #6 от admin
admin ответил в теме Проблемы с подключением
Jun 26 15:38:57 13[IKE] received EAP_FAILURE, EAP authentication failed
здесь кажется что ошибка в логине или пароле. Если в это время другое устройство не использовало этот логин и вы уверены в пароле, то
попробуйте ради теста все же поменять пароль у туннеля 7783 на какой-нибудь простой (типа 12345) и попробуйте подключиться еще раз.
Только при смене пароля в личном кабинете не торопитесь и на всякий случай в итоге перегрузите страницу с туннелями, чтобы убедиться, что пароль изменен

если все заработало, то, пожалуйста, donate сюда - yoomoney.ru/to/410014618210530

Пожалуйста Войти или Регистрация, чтобы присоединиться к беседе.

Время создания страницы: 0.126 секунд