{"id":3557,"date":"2013-01-23T12:22:47","date_gmt":"2013-01-23T04:22:47","guid":{"rendered":"http:\/\/blog.dword1511.info\/?p=3557"},"modified":"2013-01-23T12:22:47","modified_gmt":"2013-01-23T04:22:47","slug":"%e4%bf%ae%e7%90%86-android-ics-%e4%b8%8a%e9%82%a3%e4%b8%aa%e6%8a%bd%e9%a3%8e%e6%ad%a2%e4%b8%8d%e4%bd%8f%e7%9a%84-l2tpipsec-%e5%ae%a2%e6%88%b7%e7%ab%af","status":"publish","type":"post","link":"http:\/\/blog.dword1511.info\/?p=3557","title":{"rendered":"\u4fee\u7406 Android ICS \u4e0a\u90a3\u4e2a\u62bd\u98ce\u6b62\u4e0d\u4f4f\u7684 L2TP\/IPSec \u5ba2\u6237\u7aef"},"content":{"rendered":"<p>\u5728\u8fd9\u53f0\u670d\u52a1\u5668\u88ab\u5899\u7684\u90a3\u4e24\u5929\u91cc\uff0c\u6211\u5c1d\u8bd5\u4e86\u8ba9\u624b\u673a\u8fde\u63a5\u5907\u673a\u4e0a\u7684 IPSec L2TP \uff0c\u4f46\u662f\u5374\u53d1\u73b0\u65e0\u8bba\u5982\u4f55\u8fde\u4e0d\u4e0a\u3002\u672c\u6765\u4ee5\u4e3a\u662f\u7f51\u7edc\u95ee\u9898\uff0c\u7ed3\u679c\u5374\u53d1\u73b0 iPad \u53ef\u4ee5\u5f88\u8f7b\u677e\u5730\u8fde\u4e0a\u3002\u56de\u5934\u4e00\u770b\u670d\u52a1\u5668\u7aef\u7684\u65e5\u5fd7\uff0c\u679c\u7136\u53d1\u73b0\u4e86\u4e00\u4e9b\u95ee\u9898\u3002<\/p>\n<p><!--more--><\/p>\n<p>\u76f8\u5173\u65e5\u5fd7\u5982\u4e0b\uff1a<\/p>\n<pre>packet from 123.123.123.123:12345: received Vendor ID payload [RFC 3947] method set to=109 \r\npacket from 123.123.123.123:12345: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109\r\npacket from 123.123.123.123:12345: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109\r\npacket from 123.123.123.123:12345: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]\r\npacket from 123.123.123.123:12345: ignoring Vendor ID payload [FRAGMENTATION 80000000]\r\npacket from 123.123.123.123:12345: received Vendor ID payload [Dead Peer Detection]\r\n\"L2TP-PSK-NAT\"[37] 123.123.123.123 #55: responding to Main Mode from unknown peer 123.123.123.123\r\n\"L2TP-PSK-NAT\"[37] 123.123.123.123 #55: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1\r\n\"L2TP-PSK-NAT\"[37] 123.123.123.123 #55: STATE_MAIN_R1: sent MR1, expecting MI2\r\n\"L2TP-PSK-NAT\"[37] 123.123.123.123 #55: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): both are NATed\r\n\"L2TP-PSK-NAT\"[37] 123.123.123.123 #55: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2\r\n\"L2TP-PSK-NAT\"[37] 123.123.123.123 #55: STATE_MAIN_R2: sent MR2, expecting MI3\r\n\"L2TP-PSK-NAT\"[37] 123.123.123.123 #55: Main mode peer ID is ID_IPV4_ADDR: '10.140.89.199'\r\n\"L2TP-PSK-NAT\"[37] 123.123.123.123 #55: switched from \"L2TP-PSK-NAT\" to \"L2TP-PSK-NAT\"\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: deleting connection \"L2TP-PSK-NAT\" instance with peer 123.123.123.123 {isakmp=#0\/ipsec=#0}\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: new NAT mapping for #55, was 123.123.123.123:12345, now 123.123.123.123:54321\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: received and ignored informational message\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: malformed payload in packet\r\n| payload malformed after IV\r\n|   ec 0c b1 2a  d4 96 ac ec  47 8a 9f d3  9c 71 64 d3\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: sending notification PAYLOAD_MALFORMED to 123.123.123.123:54321\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: malformed payload in packet\r\n| payload malformed after IV\r\n|   ec 0c b1 2a  d4 96 ac ec  47 8a 9f d3  9c 71 64 d3\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: sending notification PAYLOAD_MALFORMED to 123.123.123.123:54321\r\n\"L2TP-PSK-NAT\"[36] 220.249.99.240 #52: max number of retransmissions (2) reached STATE_MAIN_R1\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: byte 7 of ISAKMP NAT-OA Payload must be zero, but is not\r\n\"L2TP-PSK-NAT\"[38] 123.123.123.123 #55: malformed payload in packet\r\n| payload malformed after IV\r\n|   ec 0c b1 2a  d4 96 ac ec  47 8a 9f d3  9c 71 64 d3\r\n......<\/pre>\n<p>\u5982\u6b64\u5faa\u73af\uff0c\u76f4\u5230 Android \u62a5\u544a\u8fde\u63a5\u8d85\u65f6\u4e3a\u6b62\u3002\u770b\u4e86\u65e5\u5fd7\u7684\u4fe1\u606f\u4e4b\u540e\uff0c\u7ed3\u5408 iOS \u53ef\u4ee5\u8f7b\u677e\u8fde\u63a5\u800c Android ICS \u5374\u65e0\u8bba\u5982\u4f55\u65e0\u6cd5\u8fde\u4e0a\u8fd9\u4e2a\u4e8b\u5b9e\uff0c\u6211\u4e25\u91cd\u6000\u7591 Android ICS \u7684 L2TP\/IPSec \u5ba2\u6237\u7aef\u6709 Bug \u3002\u4e00\u641c\uff0c\u679c\u7136\u5982\u6b64\u3002<\/p>\n<p>\u597d\u5728\u8fd9\u4e2a Bug \u5728\u624b\u673a\u5df2\u7ecf root \u8fc7\u7684\u60c5\u51b5\u4e0b\u53ef\u4ee5\u975e\u5e38\u5bb9\u6613\u800c\u4e14\u4e00\u52b3\u6c38\u9038\u5730\u4fee\u590d\u2014\u2014\u66ff\u6362\u6389\u90a3\u4e2a\u4e0d\u505c\u5730\u51fa\u5a04\u5b50\u7684 IPSec \u7a0b\u5e8f racoon \u5c31\u53ef\u4ee5\u4e86\u3002\u9996\u5148\u5728\u624b\u673a\u4e0a\u4e0b\u8f7d\u6253\u597d patch \u7684\u4e8c\u8fdb\u5236\u6587\u4ef6\uff08\u5b89\u5168\u6027\u81ea\u5df1\u8003\u8651\u5427\uff09\uff1a<a href=\"http:\/\/code.google.com\/p\/android\/issues\/detail?id=23124#c203\" target=\"_blank\">http:\/\/code.google.com\/p\/android\/issues\/detail?id=23124#c203<\/a><\/p>\n<p>\u7136\u540e\u6253\u5f00\u624b\u673a\u4e0a\u7684\u7ec8\u7aef\uff08\u6a21\u62df\u5668\u6216\u8005 adb shell \u7686\u53ef\uff09\uff0c\u6267\u884c\u4ee5\u4e0b\u547d\u4ee4\uff1a<\/p>\n<pre class=\"brush: bash; title: \u4ee3\u7801; notranslate\" title=\"\u4ee3\u7801\">\r\nsu\r\nbusybox mount -o remount,rw \/system\r\nbusybox ls -l \/system\/bin\/racoon\r\nmv \/system\/bin\/racoon \/system\/bin\/racoon.sucker\r\nmv \/sdcard\/download\/racoon.bin \/system\/bin\/racoon\r\nchmod 0755 \/system\/bin\/racoon\r\nchown 0 \/system\/bin\/racoon\r\nchgrp 2000 \/system\/bin\/racoon\r\nbusybox mount -o remount,ro \/system\r\nexit\r\n<\/pre>\n<p>\u63a5\u7740\uff0cL2TP\/IPSec \u5c31\u53ef\u4ee5\u6b63\u5e38\u4f7f\u7528\u4e86\u3002<\/p>\n<p>\u4e00\u70b9\u8bf4\u660e\uff1a\u4e0a\u8ff0\u547d\u4ee4\u91cc\u9762\uff0c\/sdcard\/download\/racoon.bin \u662f\u4e0b\u8f7d\u4e0b\u6765\u7684\u6587\u4ef6\uff0cls -l \u662f\u4e3a\u4e86\u67e5\u770b\u7cfb\u7edf\u539f\u672c\u7684 racoon \u7684\u5c5e\u4e3b\u548c\u5c5e\u7ec4\uff0c\u6211\u8fd9\u91cc\u662f 0 \u548c 2000 \uff0c\u8bf7\u6839\u636e\u60c5\u51b5\u8c03\u6574\u3002<\/p>\n<p>racoon \u9879\u76ee\u7684\u4e3b\u9875\uff1a<a href=\"http:\/\/ipsec-tools.sourceforge.net\/\" target=\"_blank\">http:\/\/ipsec-tools.sourceforge.net\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5728\u8fd9\u53f0\u670d\u52a1\u5668\u88ab\u5899\u7684\u90a3\u4e24\u5929\u91cc\uff0c\u6211\u5c1d\u8bd5\u4e86\u8ba9\u624b\u673a\u8fde\u63a5\u5907\u673a\u4e0a\u7684 IPSec L2TP \uff0c\u4f46\u662f\u5374\u53d1\u73b0\u65e0\u8bba\u5982\u4f55\u8fde\u4e0d\u4e0a\u3002\u672c\u6765 &hellip; <a href=\"http:\/\/blog.dword1511.info\/?p=3557\" class=\"more-link\">\u7ee7\u7eed\u9605\u8bfb<span class=\"screen-reader-text\">\u4fee\u7406 Android ICS \u4e0a\u90a3\u4e2a\u62bd\u98ce\u6b62\u4e0d\u4f4f\u7684 L2TP\/IPSec \u5ba2\u6237\u7aef<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[10],"tags":[],"_links":{"self":[{"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=\/wp\/v2\/posts\/3557"}],"collection":[{"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3557"}],"version-history":[{"count":3,"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=\/wp\/v2\/posts\/3557\/revisions"}],"predecessor-version":[{"id":3684,"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=\/wp\/v2\/posts\/3557\/revisions\/3684"}],"wp:attachment":[{"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3557"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.dword1511.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}