I decided to give yast2-vpn
a test-ride.
I configured the VPN Gateway using the " Provide access to Android, iOS, MacOS X clients" option and created a test user with PSK and password:
When I attempt to connect, left side (MacOS) logging tells me this:
Sun May 11 22:01:28 2025 : publish_entry SCDSet() failed: Success!
Sun May 11 22:01:28 2025 : publish_entry SCDSet() failed: Success!
Sun May 11 22:01:28 2025 : l2tp_get_router_address
Sun May 11 22:01:28 2025 : l2tp_get_router_address 192.168.0.1 from dict 1
Sun May 11 22:01:28 2025 : L2TP connecting to server '192.168.0.24' (192.168.0.24)...
Sun May 11 22:01:28 2025 : IPSec connection started
Sun May 11 22:01:28 2025 : IPSec phase 1 client started
Sun May 11 22:01:28 2025 : IPSec phase 1 server replied
Sun May 11 22:01:58 2025 : IPSec connection failed
Right side (OpenSuse) tells me this:
2025-05-12T02:01:28.914196-03:00 apple-srv charon: 11[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (788 bytes)
2025-05-12T02:01:28.914313-03:00 apple-srv charon: 11[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
2025-05-12T02:01:28.914382-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-12T02:01:28.914442-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-12T02:01:28.914471-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-12T02:01:28.914494-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-12T02:01:28.914518-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-12T02:01:28.914544-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
2025-05-12T02:01:28.914568-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2025-05-12T02:01:28.914591-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2025-05-12T02:01:28.914616-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2025-05-12T02:01:28.914639-03:00 apple-srv ipsec[17951]: 11[IKE] received FRAGMENTATION vendor ID
2025-05-12T02:01:28.914662-03:00 apple-srv ipsec[17951]: 11[IKE] received DPD vendor ID
2025-05-12T02:01:28.914686-03:00 apple-srv ipsec[17951]: 11[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-12T02:01:28.914710-03:00 apple-srv ipsec[17951]: 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2025-05-12T02:01:28.914735-03:00 apple-srv ipsec[17951]: 11[ENC] generating ID_PROT response 0 [ SA V V V V ]
2025-05-12T02:01:28.914758-03:00 apple-srv ipsec[17951]: 11[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (160 bytes)
2025-05-12T02:01:28.914782-03:00 apple-srv ipsec[17951]: 12[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (380 bytes)
2025-05-12T02:01:28.914807-03:00 apple-srv ipsec[17951]: 12[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.914830-03:00 apple-srv ipsec[17951]: 12[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.914855-03:00 apple-srv ipsec[17951]: 12[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (396 bytes)
2025-05-12T02:01:28.914878-03:00 apple-srv ipsec[17951]: 09[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (108 bytes)
2025-05-12T02:01:28.914902-03:00 apple-srv ipsec[17951]: 09[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
2025-05-12T02:01:28.914926-03:00 apple-srv ipsec[17951]: 09[CFG] looking for pre-shared key peer configs matching 192.168.0.24...192.168.0.68[192.168.0.68]
2025-05-12T02:01:28.914950-03:00 apple-srv ipsec[17951]: 09[IKE] found 1 matching config, but none allows pre-shared key authentication using Main Mode
2025-05-12T02:01:28.914975-03:00 apple-srv ipsec[17951]: 09[ENC] generating INFORMATIONAL_V1 request 2553770615 [ HASH N(AUTH_FAILED) ]
2025-05-12T02:01:28.915004-03:00 apple-srv ipsec[17951]: 09[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (108 bytes)
2025-05-12T02:01:28.915029-03:00 apple-srv ipsec[17951]: 01[KNL] interface xfrmi-test-1847 activated
2025-05-12T02:01:28.915052-03:00 apple-srv ipsec[17951]: 05[KNL] interface xfrmi-test-1847 deactivated
2025-05-12T02:01:28.915076-03:00 apple-srv ipsec[17951]: 08[KNL] interface xfrmi-test-1847 deleted
2025-05-12T02:01:28.915100-03:00 apple-srv ipsec[17951]: 11[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (788 bytes)
2025-05-12T02:01:28.915124-03:00 apple-srv ipsec[17951]: 11[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
2025-05-12T02:01:28.915147-03:00 apple-srv ipsec[17951]: 11[IKE] received NAT-T (RFC 3947) vendor ID
2025-05-12T02:01:28.915170-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-12T02:01:28.915202-03:00 apple-srv charon: 11[IKE] received NAT-T (RFC 3947) vendor ID
2025-05-12T02:01:28.915238-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-12T02:01:28.915266-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-12T02:01:28.915290-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-12T02:01:28.915314-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-12T02:01:28.915337-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
2025-05-12T02:01:28.915360-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2025-05-12T02:01:28.915384-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2025-05-12T02:01:28.915412-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2025-05-12T02:01:28.915436-03:00 apple-srv ipsec[17951]: 11[IKE] received FRAGMENTATION vendor ID
2025-05-12T02:01:28.915459-03:00 apple-srv ipsec[17951]: 11[IKE] received DPD vendor ID
2025-05-12T02:01:28.915483-03:00 apple-srv ipsec[17951]: 11[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-12T02:01:28.915510-03:00 apple-srv ipsec[17951]: 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2025-05-12T02:01:28.915534-03:00 apple-srv ipsec[17951]: 11[ENC] generating ID_PROT response 0 [ SA V V V V ]
2025-05-12T02:01:28.915558-03:00 apple-srv ipsec[17951]: 11[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (160 bytes)
2025-05-12T02:01:28.915581-03:00 apple-srv ipsec[17951]: 12[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (380 bytes)
2025-05-12T02:01:28.915605-03:00 apple-srv ipsec[17951]: 12[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.915632-03:00 apple-srv ipsec[17951]: 12[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.915658-03:00 apple-srv ipsec[17951]: 12[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (396 bytes)
2025-05-12T02:01:28.915682-03:00 apple-srv ipsec[17951]: 09[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (108 bytes)
2025-05-12T02:01:28.915705-03:00 apple-srv ipsec[17951]: 09[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
2025-05-12T02:01:28.915728-03:00 apple-srv ipsec[17951]: 09[CFG] looking for pre-shared key peer configs matching 192.168.0.24...192.168.0.68[192.168.0.68]
2025-05-12T02:01:28.915752-03:00 apple-srv ipsec[17951]: 09[IKE] found 1 matching config, but none allows pre-shared key authentication using Main Mode
2025-05-12T02:01:28.915775-03:00 apple-srv ipsec[17951]: 09[ENC] generating INFORMATIONAL_V1 request 947803515 [ HASH N(AUTH_FAILED) ]
2025-05-12T02:01:28.915799-03:00 apple-srv ipsec[17951]: 09[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (108 bytes)
2025-05-12T02:01:28.915823-03:00 apple-srv ipsec[17951]: 11[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (788 bytes)
2025-05-12T02:01:28.915846-03:00 apple-srv ipsec[17951]: 11[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
2025-05-12T02:01:28.915870-03:00 apple-srv ipsec[17951]: 11[IKE] received NAT-T (RFC 3947) vendor ID
2025-05-12T02:01:28.915894-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-12T02:01:28.915921-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-12T02:01:28.915946-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-12T02:01:28.915970-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-12T02:01:28.915993-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-12T02:01:28.916023-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-12T02:01:28.916063-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-12T02:01:28.916096-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-12T02:01:28.916128-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-12T02:01:28.916159-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-12T02:01:28.916191-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
2025-05-12T02:01:28.916228-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2025-05-12T02:01:28.916265-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2025-05-12T02:01:28.916297-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2025-05-12T02:01:28.916328-03:00 apple-srv charon: 11[IKE] received FRAGMENTATION vendor ID
2025-05-12T02:01:28.916359-03:00 apple-srv charon: 11[IKE] received DPD vendor ID
2025-05-12T02:01:28.916390-03:00 apple-srv charon: 11[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-12T02:01:28.916421-03:00 apple-srv charon: 11[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-12T02:01:28.916453-03:00 apple-srv charon: 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2025-05-12T02:01:28.916485-03:00 apple-srv charon: 11[ENC] generating ID_PROT response 0 [ SA V V V V ]
2025-05-12T02:01:28.916518-03:00 apple-srv charon: 11[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (160 bytes)
2025-05-12T02:01:28.947299-03:00 apple-srv charon: 12[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (380 bytes)
2025-05-12T02:01:28.947385-03:00 apple-srv charon: 12[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.960190-03:00 apple-srv charon: 12[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.960277-03:00 apple-srv charon: 12[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (396 bytes)
2025-05-12T02:01:29.012397-03:00 apple-srv charon: 09[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (108 bytes)
2025-05-12T02:01:29.012473-03:00 apple-srv charon: 09[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
2025-05-12T02:01:29.012508-03:00 apple-srv charon: 09[CFG] looking for pre-shared key peer configs matching 192.168.0.24...192.168.0.68[192.168.0.68]
2025-05-12T02:01:29.012542-03:00 apple-srv charon: 09[IKE] found 1 matching config, but none allows pre-shared key authentication using Main Mode
2025-05-12T02:01:29.012585-03:00 apple-srv charon: 09[ENC] generating INFORMATIONAL_V1 request 890575881 [ HASH N(AUTH_FAILED) ]
2025-05-12T02:01:29.012619-03:00 apple-srv charon: 09[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (108 bytes)
I’m at my wit’s end. I googled to no avail but none of the options worked (enable aggressivity, etc etc).
Does anyone know what’s the backend for the Yast module for the VPN? I just wanted a quick way to create VPN users. Thanks in advance!