Technical Forum
Ask questions. Discover Answers.
cancel
Showing results for 
Search instead for 
Did you mean: 
Custom Alert Banner

Problem with connecting using f5 vpn on Ubuntu/Linux; stuck on "Connecting..."

KarimElsayad247
Altostratus
Altostratus

This issue happens only on the machine I'm using, I treid the same account on multiple other machines, on the same network and other networks. The gist of it is that f5vpn gets stuck in the connecting phase and doesn't modify my routes table or hosts file, as it should.

The server is started successfully and establishes a connection on port 44444, but that's where it stops. 

 

Did anyone face a similar issue? I have the log files (vpn.log, svpn.log, syslog, etc..) if anyone is interested to take a look. I tried creating a support case, but I only had the "NginX" product family displayed. I would really appreciate any help.

18 REPLIES 18

Lucas_Thompson
F5 Employee
F5 Employee

Do you see any obvious errors in the log files?

What do you see in svpn.log when you compare a working system to your not working system? Presumably the logs must be different between the two. The difference should help narrow down what the issue might be.

You might also review Ubuntu's AppArmor settings or temporarily disable it, as these might block networking changes that the f5vpn process is trying to perform:

https://help.ubuntu.com/community/AppArmor

 

Hi Lucas! thanks for the reply 

I'll start with the syslog

```


Feb 23 13:40:58 karim-G5-5500 dbus-daemon[3876]: [session uid=1000 pid=3876] Activating service name='com.f5.f5vpn' requested by ':1.366' (uid=1000 pid=160791 comm="gio open f5-vpn://<COMPANY_DOMAIN>?server=<COMPANY_DOMAIN>" label="unconfined")
Feb 23 13:40:58 karim-G5-5500 f5vpn: [160796] log level has been changed to 63
Feb 23 13:40:58 karim-G5-5500 f5vpn: [160796] Location: /opt/f5/vpn/f5vpn
Feb 23 13:40:58 karim-G5-5500 f5vpn: [160796] Version: 7220.2022.0308.1
Feb 23 13:40:58 karim-G5-5500 f5vpn: [160796] Locale: en_US.UTF-8
Feb 23 13:40:58 karim-G5-5500 f5vpn: [160796] Qt version: 5.5.1
Feb 23 13:40:58 karim-G5-5500 f5vpn: [160796] current log level = 63
Feb 23 13:40:58 karim-G5-5500 dbus-daemon[3876]: [session uid=1000 pid=3876] Successfully activated service 'com.f5.f5vpn'
Feb 23 13:40:58 karim-G5-5500 com.f5.f5vpn[160796]: QObject::connect: Cannot connect (null)::stateChanged(QNetworkSession::State) to QNetworkReplyHttpImpl::_q_networkSessionStateChanged(QNetworkSession::State)
Feb 23 13:40:58 karim-G5-5500 com.f5.f5vpn[160796]: QObject::connect: No such signal f5::qt::HttpNetworkManager::RequestFinished(Err::HttpNetworkManager error, QString message)
Feb 23 13:40:59 karim-G5-5500 com.f5.f5vpn[160796]: QObject::connect: Cannot connect (null)::stateChanged(QNetworkSession::State) to QNetworkReplyHttpImpl::_q_networkSessionStateChanged(QNetworkSession::State)
Feb 23 13:41:03 karim-G5-5500 com.f5.f5vpn[160796]: message repeated 16 times: [ QObject::connect: Cannot connect (null)::stateChanged(QNetworkSession::State) to QNetworkReplyHttpImpl::_q_networkSessionStateChanged(QNetworkSession::State)]
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6037] manager: (tun0): new Tun device (/org/freedesktop/NetworkManager/Devices/47)
Feb 23 13:41:07 karim-G5-5500 systemd-udevd[160820]: ethtool: autonegotiation is unset or enabled, the speed and duplex are not writable.
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6141] device (tun0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external')
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6173] device (tun0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external')
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6181] device (tun0): Activation: starting connection 'tun0' (fe4d9575-a5d4-4de5-b67f-db9547379532)
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6184] device (tun0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external')
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6189] device (tun0): state change: prepare -> config (reason 'none', sys-iface-state: 'external')
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6192] device (tun0): state change: config -> ip-config (reason 'none', sys-iface-state: 'external')
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6195] device (tun0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external')
Feb 23 13:41:07 karim-G5-5500 dbus-daemon[1398]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.13' (uid=0 pid=1399 comm="/usr/sbin/NetworkManager --no-daemon " label="unconfined")
Feb 23 13:41:07 karim-G5-5500 systemd[1]: Starting Network Manager Script Dispatcher Service...
Feb 23 13:41:07 karim-G5-5500 dbus-daemon[1398]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Feb 23 13:41:07 karim-G5-5500 systemd[1]: Started Network Manager Script Dispatcher Service.
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6400] device (tun0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external')
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6402] device (tun0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external')
Feb 23 13:41:07 karim-G5-5500 NetworkManager[1399]: <info> [1677152467.6413] device (tun0): Activation: successful, device activated.
Feb 23 13:41:18 karim-G5-5500 systemd[1]: NetworkManager-dispatcher.service: Succeeded.

```

The only difference with a working system is that last line, for a working system, it prints

```

NetworkManager-dispatcher.service: Disables successfully.

```



As for vpn.log:



```

2023-02-23,13:40:58:745, 160796,160796,, 0,,,,
2023-02-23,13:40:58:745, 160796,160796,, 0,,,, =====================================
2023-02-23,13:40:58:745, 160796,160796,, 0,,,, Location: /opt/f5/vpn/f5vpn
2023-02-23,13:40:58:745, 160796,160796,, 0,,,, Version: 7220.2022.0308.1
2023-02-23,13:40:58:745, 160796,160796,, 0,,,, Locale: en_US.UTF-8
2023-02-23,13:40:58:745, 160796,160796,, 0,,,, Qt version: 5.5.1
2023-02-23,13:40:58:745, 160796,160796,, 0,,,, =====================================
2023-02-23,13:40:58:745, 160796,160796,, 0,,,,
2023-02-23,13:40:58:745, 160796,160796,, 48,,,, current log level = 63
2023-02-23,13:40:58:754, 160796,160796,, 48, /Helpers.h, 117, void f5::qt::setupLogs(const string&, const string&), QT - OpenSSL supported: true. Lib in use: OpenSSL 1.0.2za 24 Aug 2021. Build: OpenSSL 1.0.0-fips 29 Mar 2010
2023-02-23,13:40:58:754, 160796,160796,, 48, /Helpers.h, 118, void f5::qt::setupLogs(const string&, const string&), F5 - OpenSSL build version: OpenSSL 1.0.2za 24 Aug 2021
2023-02-23,13:40:58:771, 160796,160796,, 48, /LinuxService.h, 45, void f5::qt::DBusInterface::Open(QStringList, QMap<QString, QVariant>), D-Bus Open() method called
2023-02-23,13:40:58:772, 160796,160796,, 48, /SessionManager.cpp, 198, boost::optional<QString> f5::qt::SessionManager::StartNASession(const QUrl&), otc is non empty, 0cf74555
2023-02-23,13:40:58:775, 160796,160796,, 48, /HttpNetworkManager.cpp, 205, void f5::qt::HttpNetworkManager::HttpGet(const QUrl&, uint32_t), starting GET request to, https://<COMPANY_DOMAIN>/vdesk/get_sessid_for_token.php3
2023-02-23,13:40:59:225, 160796,160796,, 48, /HttpNetworkManager.cpp, 396, void f5::qt::HttpNetworkManager::RequestFinished(), Request finished (err code, HTTP code), 0, 200
2023-02-23,13:40:59:225, 160796,160796,, 48, /SessionManager.cpp, 78, bool f5::qt::retrieveSidFromOtc(const QUrl&, const CString&, CString&), session id(5df83964) for otc(0cf74555)
2023-02-23,13:40:59:226, 160796,160796,, 48, /SessionManager.cpp, 200, boost::optional<QString> f5::qt::SessionManager::StartNASession(const QUrl&), exchanged session id is, 5df83964
2023-02-23,13:40:59:227, 160796,160796,, 48, /HttpNetworkManager.cpp, 205, void f5::qt::HttpNetworkManager::HttpGet(const QUrl&, uint32_t), starting GET request to, https://<COMPANY_DOMAIN>/my.report.na
2023-02-23,13:40:59:919, 160796,160796,, 48, /HttpNetworkManager.cpp, 396, void f5::qt::HttpNetworkManager::RequestFinished(), Request finished (err code, HTTP code), 0, 200
2023-02-23,13:40:59:920, 160796,160796,, 48, /Session.cpp, 118, void f5::qt::Session::ProfileDownload(), Profile download starting, https://<COMPANY_DOMAIN>/pre/config.php?version=2.0
2023-02-23,13:40:59:921, 160796,160796,, 48, /HttpNetworkManager.cpp, 205, void f5::qt::HttpNetworkManager::HttpGet(const QUrl&, uint32_t), starting GET request to, https://<COMPANY_DOMAIN>/pre/config.php?version=2.0
2023-02-23,13:40:59:921, 160796,160796,, 48, /SessionManager.cpp, 268, bool f5::qt::SessionManager::CreateAndLaunchSessionInternal(const QUrl&), ----Session 5df83964 starts----
2023-02-23,13:41:00:545, 160796,160796,, 48, /HttpNetworkManager.cpp, 396, void f5::qt::HttpNetworkManager::RequestFinished(), Request finished (err code, HTTP code), 0, 200
2023-02-23,13:41:00:546, 160796,160796,, 48, /UnixAutoUpdater.cpp, 185, bool f5::qt::UnixAutoUpdater<T>::ShouldUpdateSelf() [with T = f5::qt::MacPackage], Version: our,their,min, 7220.2022.308.1, 7220.2022.308.1,
2023-02-23,13:41:00:546, 160796,160796,, 48, /UnixAutoUpdater.cpp, 188, bool f5::qt::UnixAutoUpdater<T>::ShouldUpdateSelf() [with T = f5::qt::MacPackage], Application is up-to-date
2023-02-23,13:41:00:546, 160796,160796,, 48, /Session.cpp, 73, void f5::qt::Session::AutoUpdateSuccess(), Application is up-to-date
2023-02-23,13:41:00:605, 160796,160796,, 48, /MainWindow.cpp, 57, f5::qt::MainWindow::MainWindow(QWidget*, Qt::WindowFlags), Notification-area instantiated
2023-02-23,13:41:03:609, 160796,160796,, 48, /BrowserController.cpp, 432, void f5::qt::BrowserController::onPageLoaded(bool), Successfilly loaded page https://<COMPANY_DOMAIN>/vdesk/resource_template
2023-02-23,13:41:03:610, 160796,160796,, 48, /BrowserController.cpp, 423, void f5::qt::BrowserController::downloadNAConfig(), Downloading NA config: https://<COMPANY_DOMAIN>/vdesk/vpn/connect.php3?resourcename=/Common/<VPN_GROUP>&outform=xml&client_version=1.1
2023-02-23,13:41:03:610, 160796,160796,, 48, /HttpNetworkManager.cpp, 205, void f5::qt::HttpNetworkManager::HttpGet(const QUrl&, uint32_t), starting GET request to, https://<COMPANY_DOMAIN>/vdesk/vpn/connect.php3?resourcename=/Common/<VPN_GROUP>&outform=xml&client_version=1.1
2023-02-23,13:41:04:131, 160796,160796,, 48, /HttpNetworkManager.cpp, 396, void f5::qt::HttpNetworkManager::RequestFinished(), Request finished (err code, HTTP code), 0, 200
2023-02-23,13:41:06:167, 160796,160796,, 48, /BrowserController.cpp, 579, void f5::qt::BrowserController::onTunnelConnecting(QString, int), Tunnel /Common/<VPN_GROUP>(2) connecting...
```

As you can see, it stops at "connecting...", while on a system where it works, it connects right away and displays "Tunnel /Common/<VPN_GROUP>(2) connected" after that line.
 
I'll split this reply due to message size contraints

As for /var/log/svpn.log

```
2023-02-23,13:41:04:158, 160816,160816,svpn, 0,,,, =====================================
2023-02-23,13:41:04:158, 160816,160816,svpn, 0,,,, Location: /opt/f5/vpn/svpn
2023-02-23,13:41:04:158, 160816,160816,svpn, 0,,,, Version: "7220.2022.0308.1"
2023-02-23,13:41:04:158, 160816,160816,svpn, 0,,,, Locale: C
2023-02-23,13:41:04:158, 160816,160816,svpn, 0,,,, =====================================
2023-02-23,13:41:04:158, 160816,160816,svpn, 0,,,,
2023-02-23,13:41:04:158, 160816,160816,svpn, 48,,,, current log level = 63
2023-02-23,13:41:04:158, 160816,160816,svpn, 1, , 132, ------------------,
2023-02-23,13:41:04:158, 160816,160816,svpn, 1, , 133, [main], getuid, 1000
2023-02-23,13:41:04:158, 160816,160816,svpn, 1, , 134, [main], getgid, 1000
2023-02-23,13:41:04:158, 160816,160816,svpn, 1, , 135, [main], geteuid, 0
2023-02-23,13:41:04:158, 160816,160816,svpn, 1, , 136, [main], getegid, 1000
2023-02-23,13:41:04:158, 160816,160816,svpn, 1, , 137, [main], HOME, /home/karim
2023-02-23,13:41:04:158, 160816,160816,svpn, 48, , 139, [main], version, 7220.2022.0308.1
2023-02-23,13:41:04:158, 160816,160816,svpn, 1, , 141, ------------------,
2023-02-23,13:41:04:158, 160816,160816,svpn, 1, , 148, [main], Current sigprocmask: 0x14a3dec0
2023-02-23,13:41:04:158, 160816,160816,svpn, 48, , 46, ReadProperties() Select retruns the pipe data size : , 3915,
2023-02-23,13:41:04:158, 160816,160816,svpn, 48, , 51, ReadProperties() Pipe Read lopp ,
2023-02-23,13:41:04:158, 160816,160816,svpn, 48, , 55, ReadProperties() read() , 3915, <VERY LONG LINE>
2023-02-23,13:41:04:158, 160816,160816,svpn, 48, , 62, ReadProperties() reading pipe : , 3915, <VERY LONG LINE IDENTICAL TO ONE ABOVE>
2023-02-23,13:41:04:158, 160816,160816,svpn, 48, , 72, ReadProperties() after reading the data from pipe : , 3915, <VERY LONG LINE IDENTICAL TO ONE ABOVE>
2023-02-23,13:41:04:158, 160816,160816,svpn, 48, , 83, ReadProperties() Data send by Edge Client over pipe : , <VERY LONG LINE IDENTICAL TO ONE ABOVE>
2023-02-23,13:41:04:160, 160816,160816,svpn, 48, , 99, ReadProperties(), ,
2023-02-23,13:41:04:160, 160816,160816,svpn, 48, , 99, ReadProperties(), q0, 3C786D6C617474723E3D


...
// many lines filled with what seems like randome nubers after like so:
// I removed them from the log to fit them in a single message, the number
// here is an example
2023-02-23,13:41:04:163, 160816,160816,svpn, 48, , 99, ReadProperties(), q34, 697679696EDA67DA9E6D7796F976D97E697A6F97E6697A6D96A0F

2023-02-23,13:41:04:163, 160816,160816,svpn, 48, , 99, ReadProperties(), q77, 3D
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), <xmlattr>, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), session_id, 5df83964, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_sidhash, 5df83964, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_z, /Common/<VPN_GROUP>, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_name, /Common/<VPN_GROUP>, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), host0, 127.0.0.1, 127
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), port0, 44444, 44444
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_type, VPN, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_connect, auto, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), tunnel_protocol0, https, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), idle_session_timeout, 5400, 5400
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), firepassserver0, /Common/<VPN_GROUP>, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ipv4_0, 1, 1
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ipv6_0, 0, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), tunnel_dtls, 0, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), dns0, 192.168.168.49 1.1.1.1, 192
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), dns6_0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), wins0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), dnssuffix0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), dnsregisterconnection0, 2, 2
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), dnsusednssuffixforregistration0, 2, 2
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), splittunneling0, 1, 1
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), lan0, 192.168.2.7/255.255.255.255 192.168.2.12/255.255.255.255 192.168.168.0/255.255.255.0 192.168.80.18/255.255.255.255 192.168.60.31/255.255.255.255 192.168.155.21/255.255.255.255 192.168.2.23/255.255.255.255 192.168.30.20/255.255.255.255 192.168.155.50/255.255.255.255, 192
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), lan6_0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), excludesubnets0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), excludesubnets6_0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), dns_split0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), excludedomainnames0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), allowlocalsubnetaccess0, 0, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), allowlocaldnsserversaccess0, 0, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), allowlocaldhcpaccess0, 1, 1
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), add2hosts0, <SUB_DOMAIN>.<COMPANY_NAME>.<TLD>|192.168.2.23|<SUB_DOMAIN>.<COMPANY_NAME>.<TLD>|192.168.2.23|<SUB_DOMAIN>.<COMPANY_NAME>.<TLD>|192.168.30.20|<SUB_DOMAIN>.<COMPANY_NAME>.<TLD>|192.168.80.18, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_donotwarnuser, no, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), clientformicrosoftnetworks0, 1, 1
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), fileandprintersharingformicrosoftnetworks0, 2, 2
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), enforcednsorder0, ON, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_disableclientcerts, no, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), dontreportpolicy0, TRUE, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), processtimeout0, -1, -1
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), hdlc_framing, no, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), autoreconnectifdropped0, yes, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), tcp_reconnect_timeout0, 900000, 900000
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), tcp_reconnect_delay0, 200, 200
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), trafficcontrol0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_powermanagement, 0, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), displayedbandwidth0, 100000000, 100000000
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_connect_msg0, NO, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_networktunnelenabled, yes, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_optimizedappsenabled, no, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), minimize_after_connect0, YES, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_ctrlchannelenabled, 1, 1
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ur_isessionenabled, 1, 1
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_connect_msg_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_connect_fallback_msg_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_routing_changes_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_process_check_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_registry_check_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_config_error_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_os_patch_check_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_ie_patch_check_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), display_pf_check_txt0, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), tunnel_host0, <COMPANY_DOMAIN>, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), tunnel_port0, 443, 443
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), browser_pid, 160796, 160796
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), version, 2.9, 2
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), , , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), client_pid, 160796, 160796
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), HOST, <COMPANY_DOMAIN>, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), PORT, 443, 443
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), UseDefaultGateway, OFF, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), AllowLocalSubnetAccess, 0, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), AllowLocalDHCPAccess, 1, 1
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), AllowLocalDNSServersAccess, 0, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), LAN, 192.168.2.7/255.255.255.255 192.168.2.12/255.255.255.255 192.168.168.0/255.255.255.0 192.168.80.18/255.255.255.255 192.168.60.31/255.255.255.255 192.168.155.21/255.255.255.255 192.168.2.23/255.255.255.255 192.168.30.20/255.255.255.255 192.168.155.50/255.255.255.255, 192
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), ExcludeSubnets, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), EnforceRouteTable, , 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 1, , 320, SSLVpn::SetProperties(), txqueuelength, 100, 100
2023-02-23,13:41:04:166, 160816,160817,svpn, 48, , 1369, SSLVpn::svpn(), Open(), setuid, 1000, 0
2023-02-23,13:41:04:166, 160816,160817,svpn, 48, , 662, CString ResolveHostNameGetFirstIp(const CString&), Resolved '<COMPANY_DOMAIN>' to <COMPANY_IP>
2023-02-23,13:41:04:166, 160816,160817,svpn, 48, , 716, void SSLVpn::ConfigureTunnelChannel(), U_TUNNEL_HOST=<COMPANY_DOMAIN>
2023-02-23,13:41:04:166, 160816,160817,svpn, 48, , 11, UTunChannel::UTunChannel(), Initializing...
2023-02-23,13:41:04:166, 160816,160817,svpn, 48, , 42, UTunChannel::CloneDevice(), Opening utun device
2023-02-23,13:41:04:167, 160816,160817,svpn, 48, , 296, UTunChannel::IsDeviceAvailable(), Device is available
2023-02-23,13:41:04:167, 160816,160817,svpn, 48, , 751, SSLVpn::ConfigureTunnelChannel(), Tun device will be used
2023-02-23,13:41:04:167, 160816,160817,svpn, 48, /UChannelChain.cpp, 55, , enter, 0x80f: U_ENABLE_SOCKET_CHANNEL U_ENABLE_SSL_CHANNEL U_ENABLE_PROXY_CHANNEL U_ENABLE_HTTP_CHANNEL U_ENABLE_PPP_EMULATION_CHANNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 48,,,, USSLChannel::USSLChannel:RAND_status(1)
2023-02-23,13:41:04:167, 160816,160817,svpn, 48, /UF5FramePacketizerChannel.cpp, 293, UF5FramePacketizerChannel::setProperties(), fast framing will be used
2023-02-23,13:41:04:167, 160816,160817,svpn, 48, /UHTTPChannel.cpp, 593, UHTTPChannel::setProperties(), m_bFastPPPMode, true
2023-02-23,13:41:04:167, 160816,160817,svpn, 48, /UHTTPChannel.cpp, 597, UHTTPChannel::setProperties(), m_bUseISession, false
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, --------- Initial State --------
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, Address Netif
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 127.0.0.1/8 lo( 1)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 192.168.1.10/24 wlp5s0( 3)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 192.168.122.1/24 virbr0( 4)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.19.0.1/16 br-63dcbff36084( 6)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.20.0.1/16 br-74660eaa12c1( 7)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.18.0.1/16 br-9ebcc5f112e6( 😎
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.22.0.1/16 br-9fdcc1944e6d( 9)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.23.0.1/16 br-3e8ed22008b1(10)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.21.0.1/16 br-4c314f5c6ea9(11)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.25.0.1/16 br-5202490322d8(12)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.17.0.1/16 docker0(13)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, ::1/128 lo( 1)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::ed58:cb1a:4464:9231/64 wlp5s0( 3)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::42:e7ff:fe94:e6/64 br-63dcbff36084( 6)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::42:e2ff:fed4:1fd9/64 br-74660eaa12c1( 7)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::42:95ff:fe06:54cd/64 br-9ebcc5f112e6( 😎
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::5c94:c1ff:feec:be64/64 veth5ae8a4c(15)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::a44a:ffff:fe33:1781/64 veth0d86702(17)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::38c1:2dff:fef1:f19c/64 veth30a69c9(19)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::2c13:38ff:fe1d:1e67/64 vethe81d240(21)
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, Destination Gateway Flags Netif Expire Proto Preferred Source Address
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 0.0.0.0/0 192.168.1.1 UG wlp5s0(3) 0 RTPROT_DHCP
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 169.254.0.0/16 link#4 U virbr0(4) 0 RTPROT_BOOT
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.17.0.0/16 link#13 U docker0(13) 0 RTPROT_KERNEL 172.17.0.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.18.0.0/16 link#8 U br-9ebcc5f112e6(8) 0 RTPROT_KERNEL 172.18.0.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.19.0.0/16 link#6 U br-63dcbff36084(6) 0 RTPROT_KERNEL 172.19.0.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.20.0.0/16 link#7 U br-74660eaa12c1(7) 0 RTPROT_KERNEL 172.20.0.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.21.0.0/16 link#11 U br-4c314f5c6ea9(11) 0 RTPROT_KERNEL 172.21.0.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.22.0.0/16 link#9 U br-9fdcc1944e6d(9) 0 RTPROT_KERNEL 172.22.0.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.23.0.0/16 link#10 U br-3e8ed22008b1(10) 0 RTPROT_KERNEL 172.23.0.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 172.25.0.0/16 link#12 U br-5202490322d8(12) 0 RTPROT_KERNEL 172.25.0.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 192.168.1.0/24 link#3 U wlp5s0(3) 0 RTPROT_KERNEL 192.168.1.10
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, 192.168.122.0/24 link#4 U virbr0(4) 0 RTPROT_KERNEL 192.168.122.1
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, ::1/128 link#1 U lo(1) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::/64 link#8 U br-9ebcc5f112e6(8) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::/64 link#15 U veth5ae8a4c(15) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::/64 link#17 U veth0d86702(17) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::/64 link#6 U br-63dcbff36084(6) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::/64 link#19 U veth30a69c9(19) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::/64 link#21 U vethe81d240(21) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::/64 link#7 U br-74660eaa12c1(7) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, fe80::/64 link#3 U wlp5s0(3) 0 RTPROT_KERNEL
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, ::/0 fe80::a5a:11ff:fe42:d3b0 UG wlp5s0(3) 0 RTPROT_RA
2023-02-23,13:41:04:167, 160816,160817,svpn, 0,,,, --------- End --------

2023-02-23,13:41:06:167, 160816,160817,svpn, 48, , 1505, SSLVpn::svpn(), We're connecting...
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, , 1508, SSLVpn::svpn(), ServerReachable! Let's connect!
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, , 1171, SSLVpn::ConnectChannels(), -------------------------------------
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, , 1186, SSLVpn::ConnectChannels(), -------------------------------------
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, , 1187, SSLVpn::ConnectChannels(), Let's try to connect Tunnel Channel
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, , 662, CString ResolveHostNameGetFirstIp(const CString&), Resolved '<COMPANY_DOMAIN>' to '<COPMANY_IP>'
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, , 803, CLinuxRouteTable::GetBestRoute2, <COMPANY_IP>
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, , 642, SHORT GetMTUForPPP(CLinuxRouteTable&, const CString&, bool), Best route to APM (<COMPANY_IP>): <COMPANY_IP>/32 192.168.1.1 U wlp5s0(3) 0 RTPROT_UNSPEC 192.168.1.10
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, , 647, SHORT GetMTUForPPP(CLinuxRouteTable&, const CString&, bool), Physical interface MTU=1500, desired tunnelMRU=1384
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, /UHTTPChannel.cpp, 703, UHTTPChannel::setProperties(), m_bFastPPPMode, true
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 118, UF5PPPEmulationChannel::Open(), enter
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 35, CLinuxEventHandler::HandleEvent(), enter, 15
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, /EventHandlerImplBase.h, 239, , Unknown event, EVENT_TYPE_FP_SESSION_GET_CURRENT, 0
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 68, CLinuxEventHandler::HandleEvent(), exit with, 3
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 35, CLinuxEventHandler::HandleEvent(), enter, 22
2023-02-23,13:41:06:168, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 68, CLinuxEventHandler::HandleEvent(), exit with, 0
2023-02-23,13:41:06:319, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 35, CLinuxEventHandler::HandleEvent(), enter, 23
2023-02-23,13:41:06:320, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 68, CLinuxEventHandler::HandleEvent(), exit with, 0
2023-02-23,13:41:06:320, 160816,160817,svpn, 48, /USSLChannel.cpp, 342, , socket receive timeout set (seconds), 30
2023-02-23,13:41:06:320, 160816,160817,svpn, 48,,,, USSLChannel::Open() - select return 1
2023-02-23,13:41:06:320, 160816,160817,svpn, 48, /UHTTPChannel.cpp, 305, UHTTPChannel::beginConnection(), hdlc_framing=no
2023-02-23,13:41:06:575, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 35, CLinuxEventHandler::HandleEvent(), enter, 1
2023-02-23,13:41:06:575, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 43, CLinuxEventHandler::HandleEvent(), EVENT_TYPE_SELECT_CLIENT_CERT
2023-02-23,13:41:06:575, 160816,160817,svpn, 1, /LinuxEventHandler.cpp, 1009, LinuxEventHandler::verifyServerCert(), Not launched from CLI ignoring cert check
2023-02-23,13:41:06:575, 160816,160817,svpn, 48, /LinuxEventHandler.cpp, 68, CLinuxEventHandler::HandleEvent(), exit with, 3
2023-02-23,13:41:06:981, 160816,160817,svpn, 48, /UHTTPChannel.cpp, 423, UHTTPChannel::beginConnection(), find header pos, 95
2023-02-23,13:41:06:982, 160816,160817,svpn, 48, /UHTTPChannel.cpp, 467, UHTTPChannel::beginConnection(), server returned HTTP code, 200
2023-02-23,13:41:06:982, 160816,160817,svpn, 1, /USSLChannel.cpp, 484, USSLChannel::Open(), U_TUNNEL_TRANSPORT_SECURITY_EXCH_ALGO, ECDH
2023-02-23,13:41:06:982, 160816,160817,svpn, 1, /USSLChannel.cpp, 489, USSLChannel::Open(), U_TUNNEL_TRANSPORT_SECURITY_CIPHER_ALGO, AESGCM(128)
2023-02-23,13:41:06:982, 160816,160817,svpn, 1, /USSLChannel.cpp, 494, USSLChannel::Open(), U_TUNNEL_TRANSPORT_SECURITY_HASH_ALGO, AEAD
2023-02-23,13:41:06:982, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 857, UF5PPPEmulationChannel::ChangePhase, Current link phase is Dead, switching to Establish
2023-02-23,13:41:07:186, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 1077, UF5PPPEmulationChannel::DispatchAction(), LCP up
2023-02-23,13:41:07:186, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 1086, UF5PPPEmulationChannel::DispatchAction(), Negotiated remote MRU: 1251
2023-02-23,13:41:07:187, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 1104, UF5PPPEmulationChannel::DispatchAction(), Negotiated local MRU: 1251
2023-02-23,13:41:07:187, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 857, UF5PPPEmulationChannel::ChangePhase, Current link phase is Establish, switching to Authenticate
2023-02-23,13:41:07:187, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 857, UF5PPPEmulationChannel::ChangePhase, Current link phase is Authenticate, switching to Network
2023-02-23,13:41:07:394, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 1726, UF5PPPEmulationChannel::ProcessControlMessage(), Unknown protocol, 32855
2023-02-23,13:41:07:394, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 1734, UF5PPPEmulationChannel::ProcessControlMessage(), Sending Protocol-Reject
2023-02-23,13:41:07:596, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 1113, UF5PPPEmulationChannel::DispatchAction(), IPCP up
2023-02-23,13:41:07:596, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 1125, DispatchAction, Local address: 192.168.3.127
2023-02-23,13:41:07:596, 160816,160817,svpn, 48, /UF5PPPEmulationChannel.cpp, 1126, DispatchAction, Remote address: 1.1.1.1
2023-02-23,13:41:07:596, 160816,160817,svpn, 1, /USSLChannel.cpp, 484, USSLChannel::Open(), U_TUNNEL_TRANSPORT_SECURITY_EXCH_ALGO, ECDH
2023-02-23,13:41:07:596, 160816,160817,svpn, 1, /USSLChannel.cpp, 489, USSLChannel::Open(), U_TUNNEL_TRANSPORT_SECURITY_CIPHER_ALGO, AESGCM(128)
2023-02-23,13:41:07:596, 160816,160817,svpn, 1, /USSLChannel.cpp, 494, USSLChannel::Open(), U_TUNNEL_TRANSPORT_SECURITY_HASH_ALGO, AEAD
2023-02-23,13:41:07:596, 160816,160817,svpn, 48, , 841, SSLVpn::OpenTunnelChannel(), Proxy,
2023-02-23,13:41:07:596, 160816,160817,svpn, 48, , 857, SSLVpn::OpenTunnelChannel(), IP addresses: , 192.168.3.127, 1.1.1.1
2023-02-23,13:41:07:596, 160816,160817,svpn, 48, , 868, SSLVpn::OpenTunnelChannel(), IPv6 addresses: , ,
2023-02-23,13:41:07:596, 160816,160817,svpn, 48, , 1193, SSLVpn::ConnectChannels(), -------------------------------------
2023-02-23,13:41:07:597, 160816,160817,svpn, 48, , 1194, SSLVpn::ConnectChannels(), Let's try to connect PPPD Channel
2023-02-23,13:41:07:597, 160816,160817,svpn, 48, , 803, CLinuxRouteTable::GetBestRoute2, 255.255.255.255
2023-02-23,13:41:07:597, 160816,160817,svpn, 48, , 268, CLinuxRouteTable::GetIfaceAddr2, IFace, 3
2023-02-23,13:41:07:597, 160816,160817,svpn, 48, , 268, CLinuxRouteTable::GetIfaceAddr2, IFace, 3
2023-02-23,13:41:07:597, 160816,160817,svpn, 48, , 288, UTunChannel::setProperties(), IP, mtu, 192.168.3.127, 1.1.1.1, 1251
2023-02-23,13:41:07:597, 160816,160817,svpn, 48, , 109, UTunChannel::Open(), Opening utun interface
2023-02-23,13:41:07:597, 160816,160817,svpn, 48, , 42, UTunChannel::CloneDevice(), Opening utun device
2023-02-23,13:41:07:598, 160816,160817,svpn, 48, , 178, UTunChannel::Open(), Device opened, tun0, 41
2023-02-23,13:41:07:602, 160816,160817,svpn, 48, , 1228, SSLVpn::ConnectChannels(), communication channels opened
2023-02-23,13:41:09:170, 160816,160817,svpn, 48, , 268, CLinuxRouteTable::GetIfaceAddr2, IFace, 41
2023-02-23,13:41:09:618, 160816,160817,svpn, 48, , 803, CLinuxRouteTable::GetBestRoute2, 1.1.1.1
2023-02-23,13:41:09:618, 160816,160817,svpn, 48, , 268, CLinuxRouteTable::GetIfaceAddr2, IFace, 41
2023-02-23,13:41:10:170, 160816,160817,svpn, 48, , 803, CLinuxRouteTable::GetBestRoute2, 1.1.1.1

...
more than 3700 lines of same thing
...

2023-02-23,14:08:54:351, 160816,160817,svpn, 48, , 268, CLinuxRouteTable::GetIfaceAddr2, IFace, 41
2023-02-23,14:08:55:351, 160816,160817,svpn, 48, , 803, CLinuxRouteTable::GetBestRoute2, 1.1.1.1
2023-02-23,14:08:55:351, 160816,160817,svpn, 48, , 268, CLinuxRouteTable::GetIfaceAddr2, IFace, 41
```
 For all these logs, I've replaced sensitive info such as specific ips, company domains and subdomains, and vpn group with generic tokens.



Something worth noting is that I could patch the hosts file manually, add manually add some routes to my ip table pointing at vpn (at tun0 address) and I would connect to those specific domain names, however I wouldn't be able to receive callbacks from them, and f5vpn would still display connecting state.

Here is a pastbin contaning my previously posted replies, since this forum unfortunately does not support txt files.

https://pastebin.com/6a8mK085

KarimElsayad247
Altostratus
Altostratus

Oh, and I forgot to mention, I couldn't track down any obvious errors in the log files. Messages just stop.

 

Update: I checked AppArmour out, tried disabling and tried putting the NetworkManager profile in complain mode, but nothing changed. Same exact result as above.

Lucas_Thompson
F5 Employee
F5 Employee

Hmm. From those logs, it seems like it's actually connected. From the syslog you pasted though, there do seem to be a few errors from QT. The client uses QT to write the messages into the client GUI. Perhaps you could try to reinstall it, and dbus-daemon.

Is this something that you think we could reproduce in a lab on a fresh ubuntu system, or is it something that seems tied to this client PC specifically?

I can't think of anyway to reproduce it. I probably somehow modified something on my system, because it works on every other device I tried. In fact, it event works inside a docker container running on my system. I just found out this weird thing:

- If I attach the container to host network, f5vpn won't connect

- If I DON'T attach the container to host network, f5vpn WILL connect

So, in the case where it connects from within the container, I again modified the routes table to point the specific ips configured by f5vpn to the container itself, but even though my traffic goes through and I can actually reach those few websites, I still can't receive callbacks from a particular remote server like I can if I connected. 

Does f5vpn/Big IP somehow check if the source ip is something it has registered? I don't have any idea what happens on the provider side.  

I can't think of any solution short of nuking my ubunut and re-installing it. I haven't tried reinstalling dbus, I'm afraid of breaking something else in my system, since it seems like a sensitive service.

As for Qt, I haven't tried reinstalling it yet, but the few errors it prints are identical to those printed in systems where it worked. 

Oh, and apologies, I forgot to mention that I'm running vpn version 7220.2022.0308.1, thought it seems like the most recent version anyway. 

 

Are there any configuration, software versions, firewall rules, etc... you wish to take a look at?

Oh, and f5vpn brings its own Qt libraries along as it seems. They are stored in /opt/f5/vpn/lib

 

$ ls /opt/f5/vpn/lib
libcrypto.so.1.0.0 libicui18n.so.55 libQt5Core.so.5 libQt5Gui.so.5 libQt5OpenGL.so.5 libQt5Sql.so.5 libQt5WebKitWidgets.so.5 libQt5XcbQpa.so.5
libicudata.so.55 libicuuc.so.55 libQt5DBus.so.5 libQt5Network.so.5 libQt5PrintSupport.so.5 libQt5WebKit.so.5 libQt5Widgets.so.5 libssl.so.1.0.0

 

I wonder if this does have to do with routing, and maybe once the VPN is connected it interrupts the routing table: Can you try to create another VPN resource on the BIG-IP server that is set for split-tunnel but use a different small IP address range, like 10.0.0.0/24 and a lease-pool within that network. Maybe the connection will behave differently on a different routing subnet and/or not a full-routing tunnel.

Unfortunately the Big IP server is managed by another company, we are only granted access to the vpn to access their resources. f5vpn is started from the browser, and the log in workflow is protected by 2FA. 

Just as a reminder, my account works on other similar machines on the same netwroks. I just thought about contacting one of their network adminstrators, do you think their server might be refusing to accept my machine? is there such a thing in Big IP, where a server refuses/drops/ignores attempted client connection because of some configuration client side?

spallaire
Nimbostratus
Nimbostratus

I have the same problem since upgrading my Ubuntu Distro. And like you, works in containers hosted by the problematic machine.

My problem disappeared after I installed Ubuntu 22. I don't know whether it went away because I upgraded our because I wiped my device, giving it a fresh start.

Nice to know, I might try a fresh instal then.

Tried multiple "solution" found accross the web with no chance.
Made a fresh install of 23.04 and started working as before.

Unfortunately I have no good guess of what it was, better chance to the next one.

Lucho
Nimbostratus
Nimbostratus

Same problem here with "5.15.0-78-generic #85~20.04.1-Ubuntu SMP Mon Jul 17 09:42:39 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux", it's start failing.

Some different details is that i have to eth ifaces in my desktop in different net segments, at first attemps it's seems to be resolved, disabling one of them, but now is always failing with the same logging info, the network is connected but can't finish de routing keeping in bucle with

"2023-07-31, 0:43:22:944, 43256,43257,svpn, 48, , 803, CLinuxRouteTable::GetBestRoute2, 1.1.1.1
2023-07-31, 0:43:22:944, 43256,43257,svpn, 48, , 268, CLinuxRouteTable::GetIfaceAddr2, IFace, 29"

After some research i workarounded using openconnect client, extrating session id from the initial request after logon in navigator and connected.

echo MRHSession=0123456789abcdef0123456789abc | sudo openconnect --protocol=f5 --cookie-on-stdin SERVERNAME

Please fix the root error.