Package: network-manager-openconnect
Version: 1.2.2-1
Severity: normal

I have set up a openconnect vpn in network manager but it is failing.  When I
try the vpn connection directly using openconnect from the command line it
works.  It looks like there is a problem with network-manager-openconnect.

When I run openconnect from the command line, this is what I get:

# openconnect -c /home/brente/.cisco/certificates/client/brente.pem -k
/home/brente/.cisco/certificates//client/private/brente.key --csd-user brente
--csd-wrapper /usr/share/ibm-config-NetworkManager-openconnect/ohsd.py --no-
xmlpost sasvpn.pok.ibm.com

GET https://sasvpn.pok.ibm.com/
Attempting to connect to server 129.33.253.74:443
Using client certificate 'BRENT S. ELMER'
SSL negotiation with sasvpn.pok.ibm.com
Connected to HTTPS on sasvpn.pok.ibm.com
Got HTTP response: HTTP/1.0 302 Temporary moved
GET https://sasvpn06.pok.ibm.com/
Attempting to connect to server 129.33.253.80:443
SSL negotiation with sasvpn06.pok.ibm.com
Connected to HTTPS on sasvpn06.pok.ibm.com
Got HTTP response: HTTP/1.0 302 Temporary moved
GET https://sasvpn06.pok.ibm.com/+webvpn+/index.html
SSL negotiation with sasvpn06.pok.ibm.com
Connected to HTTPS on sasvpn06.pok.ibm.com
GET https://sasvpn06.pok.ibm.com/CACHE/sdesktop/install/binaries/sfinst
SSL negotiation with sasvpn06.pok.ibm.com
Connected to HTTPS on sasvpn06.pok.ibm.com
GET https://sasvpn06.pok.ibm.com/+CSCOE+/sdesktop/wait.html
Refreshing +CSCOE+/sdesktop/wait.html after 1 second...
Open Honor System Desktop: gateway ACCEPTED our response
GET https://sasvpn06.pok.ibm.com/+CSCOE+/sdesktop/wait.html
SSL negotiation with sasvpn06.pok.ibm.com
Connected to HTTPS on sasvpn06.pok.ibm.com
Got HTTP response: HTTP/1.1 302 Moved Temporarily
GET https://sasvpn06.pok.ibm.com/+webvpn+/index.html
SSL negotiation with sasvpn06.pok.ibm.com
Connected to HTTPS on sasvpn06.pok.ibm.com
Got CONNECT response: HTTP/1.1 200 OK
CSTP connected. DPD 30, Keepalive 20
Connected tun0 as 9.85.165.126, using SSL + lzs
Established DTLS connection (using GnuTLS). Ciphersuite
(DTLS0.9)-(RSA)-(AES-256-CBC)-(SHA1).

When I run nmcli from the command line, using the connection set up in
networkmanager, this is what I get:

$ nmcli c up 'IBM Secure Access Service'
A password is required to connect to 'IBM Secure Access Service'.
Warning: password for 'vpn.secrets.gateway' not given in 'passwd-file' and
nmcli cannot ask without '--ask' option.
Error: Connection activation failed: no valid VPN secrets.

I should not have to use --ask because I am using a certificate instead.
Anyhow, this is what I get when I add --ask:

$ nmcli --ask c up 'IBM Secure Access Service'
POST https://sasvpn.pok.ibm.com/
Attempting to connect to server 129.33.253.74:443
SSL negotiation with sasvpn.pok.ibm.com
Connected to HTTPS on sasvpn.pok.ibm.com
Got HTTP response: HTTP/1.0 302 Temporary moved
POST https://sasvpn02.pok.ibm.com/
Attempting to connect to server 129.33.253.76:443
SSL negotiation with sasvpn02.pok.ibm.com
Connected to HTTPS on sasvpn02.pok.ibm.com
Server requested SSL client certificate; none was configured
POST https://sasvpn02.pok.ibm.com/
XML response has no "auth" node
GET https://sasvpn.pok.ibm.com/
Attempting to connect to server 129.33.253.74:443
SSL negotiation with sasvpn.pok.ibm.com
Connected to HTTPS on sasvpn.pok.ibm.com
Got HTTP response: HTTP/1.0 302 Temporary moved
GET https://sasvpn02.pok.ibm.com/
Attempting to connect to server 129.33.253.76:443
SSL negotiation with sasvpn02.pok.ibm.com
Connected to HTTPS on sasvpn02.pok.ibm.com
Got HTTP response: HTTP/1.0 302 Temporary moved
GET https://sasvpn02.pok.ibm.com/+webvpn+/index.html
SSL negotiation with sasvpn02.pok.ibm.com
Connected to HTTPS on sasvpn02.pok.ibm.com
GET https://sasvpn02.pok.ibm.com/CACHE/sdesktop/install/binaries/sfinst
Error: Server asked us to download and run a 'Cisco Secure Desktop' trojan.
This facility is disabled by default for security reasons, so you may wish to
enable it.
Failed to obtain WebVPN cookie
Error: openconnect failed with status 1
A password is required to connect to 'IBM Secure Access Service'.
Gateway (vpn.secrets.gateway):
A password is required to connect to 'IBM Secure Access Service'.
Cookie (vpn.secrets.cookie):
A password is required to connect to 'IBM Secure Access Service'.
Gateway certificate hash (vpn.secrets.gwcert):
Error: Connection activation failed: no valid VPN secrets.


Here is the contents of  /etc/NetworkManager/system-connections/IBM Secure
Access Service

[connection]
id=IBM Secure Access Service
uuid=2355cea5-f08a-46fc-9901-58f95414711c
type=vpn
autoconnect=false
permissions=
secondaries=

[vpn]
authtype=cert
autoconnect-flags=0
cacert=/usr/share/ibm-config-NetworkManager-openconnect/ibm-vpn-ca-bundle.pem
certsigs-flags=0
cookie-flags=2
csd_wrapper=/usr/share/ibm-config-NetworkManager-openconnect/ohsd.py
enable_csd_trojan=yes
gateway=sasvpn.pok.ibm.com
gateway-flags=2
gwcert-flags=2
lasthost-flags=0
pem_passphrase_fsid=no
stoken_source=disabled
usercert=/home/brente/.cisco/certificates/client/brente.pem
userkey=/home/brente/.cisco/certificates/client/private/brente.key
xmlconfig-flags=0
service-type=org.freedesktop.NetworkManager.openconnect

[ipv4]
dns-search=s81c.com;ibm.com;
method=auto
never-default=true

[ipv6]
addr-gen-mode=eui64
dns-search=
ip6-privacy=0
method=auto

It doesn't look like networkmanager is even trying to use the certificate.



-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.7.5.161003 (SMP w/8 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)

Versions of packages network-manager-openconnect depends on:
ii  adduser          3.115
ii  libc6            2.24-5
ii  libglib2.0-0     2.50.1-1
ii  libnm0           1.4.2-2
ii  network-manager  1.4.2-2
ii  openconnect      7.06-2+b2

network-manager-openconnect recommends no packages.

network-manager-openconnect suggests no packages.

-- no debconf information

Reply via email to