Opened 6 years ago

Closed 16 months ago

#1108 closed Bug / Defect (wontfix)

3.0.0 & 3.0.1 Reconnection problems/battery life

Reported by: sundance88 Owned by: OpenVPN Inc.
Priority: major Milestone:
Component: OpenVPN Connect Version:
Severity: Not set (select this one, unless your'e a OpenVPN developer) Keywords:
Cc:

Description

iPad Pro 10.5, iOS 12 GM, OpenVPN Connect 3.0.0 & 3.0.1

Burning up my battery and fails to reconnect after being asleep or in airplane mode for a while.

2018-09-12 22:03:39 PROTOCOL OPTIONS:

cipher: AES-256-GCM
digest: SHA512
compress: LZO_STUB
peer ID: 1

2018-09-12 22:03:39 EVENT: ASSIGN_IP

2018-09-12 22:03:39 NIP: preparing TUN network settings

2018-09-12 22:03:39 NIP: init TUN network settings with endpoint: 94.100.23.165

2018-09-12 22:03:39 NIP: adding IPv4 address to network settings 10.26.110.13/255.255.255.0

2018-09-12 22:03:39 NIP: adding (included) IPv4 route 10.26.110.0/24

2018-09-12 22:03:39 NIP: redirecting all IPv4 traffic to TUN interface

2018-09-12 22:03:39 NIP: adding DNS 10.26.110.1

2018-09-12 22:03:39 NIP: blocking all IPv6 traffic

2018-09-12 22:03:39 Connected via NetworkExtensionTUN

2018-09-12 22:03:39 LZO-ASYM init swap=0 asym=1

2018-09-12 22:03:39 Comp-stub init swap=0

2018-09-12 22:03:39 EVENT: CONNECTED 94.100.23.165:443 (94.100.23.165) via /UDPv4 on NetworkExtensionTUN/10.26.110.13/ gw=/

2018-09-12 22:07:12 OS Event: SLEEP

2018-09-12 22:07:12 EVENT: PAUSE

2018-09-12 22:17:14 OS Event: WAKEUP

2018-09-12 22:17:17 RESUME TEST: Internet:ReachableViaWiFi/-R t------

2018-09-12 22:17:17 STANDARD RESUME

2018-09-12 22:17:17 EVENT: RESUME

2018-09-12 22:17:17 EVENT: RECONNECTING

2018-09-12 22:17:17 EVENT: RESOLVE

2018-09-12 22:17:17 Contacting [94.100.23.165]:443/UDP via UDP

2018-09-12 22:17:17 EVENT: WAIT

2018-09-12 22:17:17 Connecting to [94.100.23.165]:443 (94.100.23.165) via UDPv4

2018-09-12 22:17:17 EVENT: CONNECTING

2018-09-12 22:17:17 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client

2018-09-12 22:17:17 Creds: UsernameEmpty/PasswordEmpty?

2018-09-12 22:17:17 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 3.0.1-770
IV_VER=3.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO_STUB=1
IV_COMP_STUB=1
IV_COMP_STUBv2=1
IV_IPv6=0
IV_AUTO_SESS=1

2018-09-12 22:17:18 VERIFY OK : depth=1
cert. version : 3
serial number : 8C:D8:43:EF:E4:5F:20:03
issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
issued on : 2014-04-11 10:15:45
expires on : 2024-04-08 10:15:45
signed using : RSA with SHA1
RSA key size : 4096 bits
basic constraints : CA=true

2018-09-12 22:17:18 VERIFY OK : depth=0
cert. version : 3
serial number : 45
issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@…
issued on : 2014-04-11 10:45:01
expires on : 2024-04-08 10:45:01
signed using : RSA with SHA1
RSA key size : 4096 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-09-12 22:17:19 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384

2018-09-12 22:17:19 Session is ACTIVE

2018-09-12 22:17:19 EVENT: GET_CONFIG

2018-09-12 22:17:19 Sending PUSH_REQUEST to server...

2018-09-12 22:17:20 OPTIONS:
0 [comp-lzo] [no]
1 [redirect-gateway] [def1] [bypass-dhcp]
2 [dhcp-option] [DNS] [10.26.110.1]
3 [route-gateway] [10.26.110.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.26.110.13] [255.255.255.0]
8 [peer-id] [1]
9 [cipher] [AES-256-GCM]
10 [block-ipv6]

2018-09-12 22:17:20 PROTOCOL OPTIONS:

cipher: AES-256-GCM
digest: SHA512
compress: LZO_STUB
peer ID: 1

2018-09-12 22:17:20 EVENT: ASSIGN_IP

2018-09-12 22:17:20 NIP: preparing TUN network settings

2018-09-12 22:17:20 NIP: init TUN network settings with endpoint: 94.100.23.165

2018-09-12 22:17:20 NIP: adding IPv4 address to network settings 10.26.110.13/255.255.255.0

2018-09-12 22:17:20 NIP: adding (included) IPv4 route 10.26.110.0/24

2018-09-12 22:17:20 NIP: redirecting all IPv4 traffic to TUN interface

2018-09-12 22:17:20 NIP: adding DNS 10.26.110.1

2018-09-12 22:17:20 NIP: blocking all IPv6 traffic

2018-09-12 22:17:20 Connected via NetworkExtensionTUN

2018-09-12 22:17:20 LZO-ASYM init swap=0 asym=1

2018-09-12 22:17:20 Comp-stub init swap=0

2018-09-12 22:17:20 EVENT: CONNECTED 94.100.23.165:443 (94.100.23.165) via /UDPv4 on NetworkExtensionTUN/10.26.110.13/ gw=/

2018-09-12 22:18:18 OS Event: SLEEP

2018-09-12 22:18:18 EVENT: PAUSE

2018-09-12 22:18:53 OS Event: WAKEUP

2018-09-12 22:18:56 RESUME TEST: Internet:ReachableViaWiFi/-R t------

2018-09-12 22:18:56 STANDARD RESUME

2018-09-12 22:18:56 EVENT: RESUME

2018-09-12 22:18:56 EVENT: RECONNECTING

2018-09-12 22:18:56 EVENT: RESOLVE

2018-09-12 22:18:56 Contacting [94.100.23.165]:443/UDP via UDP

2018-09-12 22:18:56 EVENT: WAIT

2018-09-12 22:18:56 Connecting to [94.100.23.165]:443 (94.100.23.165) via UDPv4

2018-09-12 22:18:56 EVENT: CONNECTING

2018-09-12 22:18:56 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client

2018-09-12 22:18:56 Creds: UsernameEmpty/PasswordEmpty?

2018-09-12 22:18:56 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 3.0.1-770
IV_VER=3.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO_STUB=1
IV_COMP_STUB=1
IV_COMP_STUBv2=1
IV_IPv6=0
IV_AUTO_SESS=1

2018-09-12 22:18:56 VERIFY OK : depth=1
cert. version : 3
serial number : 8C:D8:43:EF:E4:5F:20:03
issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
issued on : 2014-04-11 10:15:45
expires on : 2024-04-08 10:15:45
signed using : RSA with SHA1
RSA key size : 4096 bits
basic constraints : CA=true

2018-09-12 22:18:56 VERIFY OK : depth=0
cert. version : 3
serial number : 45
issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@…
issued on : 2014-04-11 10:45:01
expires on : 2024-04-08 10:45:01
signed using : RSA with SHA1
RSA key size : 4096 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-09-12 22:18:57 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384

2018-09-12 22:18:57 Session is ACTIVE

2018-09-12 22:18:57 EVENT: GET_CONFIG

2018-09-12 22:18:57 Sending PUSH_REQUEST to server...

2018-09-12 22:18:58 OPTIONS:
0 [comp-lzo] [no]
1 [redirect-gateway] [def1] [bypass-dhcp]
2 [dhcp-option] [DNS] [10.26.110.1]
3 [route-gateway] [10.26.110.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.26.110.13] [255.255.255.0]
8 [peer-id] [1]
9 [cipher] [AES-256-GCM]
10 [block-ipv6]

2018-09-12 22:18:58 PROTOCOL OPTIONS:

cipher: AES-256-GCM
digest: SHA512
compress: LZO_STUB
peer ID: 1

2018-09-12 22:18:58 EVENT: ASSIGN_IP

2018-09-12 22:18:58 NIP: preparing TUN network settings

2018-09-12 22:18:58 NIP: init TUN network settings with endpoint: 94.100.23.165

2018-09-12 22:18:58 NIP: adding IPv4 address to network settings 10.26.110.13/255.255.255.0

2018-09-12 22:18:58 NIP: adding (included) IPv4 route 10.26.110.0/24

2018-09-12 22:18:58 NIP: redirecting all IPv4 traffic to TUN interface

2018-09-12 22:18:58 NIP: adding DNS 10.26.110.1

2018-09-12 22:18:58 NIP: blocking all IPv6 traffic

2018-09-12 22:18:58 Connected via NetworkExtensionTUN

2018-09-12 22:18:58 LZO-ASYM init swap=0 asym=1

2018-09-12 22:18:58 Comp-stub init swap=0

2018-09-12 22:18:58 EVENT: CONNECTED 94.100.23.165:443 (94.100.23.165) via /UDPv4 on NetworkExtensionTUN/10.26.110.13/ gw=/

2018-49-12 22:49:07 1

2018-49-12 22:49:07 ----- OpenVPN Start -----
OpenVPN core 3.2 ios arm64 64-bit PT_PROXY built on Sep 4 2018 09:41:09

2018-49-12 22:49:07 Frame=512/2048/512 mssfix-ctrl=1250

2018-49-12 22:49:07 UNUSED OPTIONS
3 [resolv-retry] [infinite]
4 [nobind]
5 [persist-key]
6 [persist-tun]
7 [auth-nocache]
8 [verb] [3]
9 [explicit-exit-notify] [5]

2018-49-12 22:49:07 EVENT: RESOLVE

2018-49-12 22:49:07 Contacting [94.100.23.165]:443/UDP via UDP

2018-49-12 22:49:07 EVENT: WAIT

2018-49-12 22:49:07 Connecting to [94.100.23.165]:443 (94.100.23.165) via UDPv4

2018-49-12 22:49:07 EVENT: CONNECTING

2018-49-12 22:49:07 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client

2018-49-12 22:49:07 Creds: UsernameEmpty/PasswordEmpty?

2018-49-12 22:49:07 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 3.0.1-770
IV_VER=3.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO_STUB=1
IV_COMP_STUB=1
IV_COMP_STUBv2=1
IV_IPv6=0
IV_AUTO_SESS=1

2018-49-12 22:49:07 VERIFY OK : depth=1
cert. version : 3
serial number : 8C:D8:43:EF:E4:5F:20:03
issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
issued on : 2014-04-11 10:15:45
expires on : 2024-04-08 10:15:45
signed using : RSA with SHA1
RSA key size : 4096 bits
basic constraints : CA=true

2018-49-12 22:49:07 VERIFY OK : depth=0
cert. version : 3
serial number : 45
issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@…
subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@…
issued on : 2014-04-11 10:45:01
expires on : 2024-04-08 10:45:01
signed using : RSA with SHA1
RSA key size : 4096 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-49-12 22:49:08 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384

2018-49-12 22:49:08 Session is ACTIVE

2018-49-12 22:49:08 EVENT: GET_CONFIG

2018-49-12 22:49:08 Sending PUSH_REQUEST to server...

Change History (5)

comment:1 Changed 6 years ago by Antonio Quartulli

Component: Generic / unclassifiedOpenVPN Connect
Owner: set to yuriy
Status: newassigned

comment:2 Changed 6 years ago by hunterx1

I may have duplicated this issue with this bug: https://community.openvpn.net/openvpn/ticket/1112

I believe this is the part of your log that is showing the time of the re-connection following the disconnect. There are no logs that show the exact issue or disconnect time (at least in my case).

 2018-09-12 22:18:58 EVENT: CONNECTED 94.100.23.165:443 (94.100.23.165) via /UDPv4 on NetworkExtensionTUN/10.26.110.13/ gw=/

2018-49-12 22:49:07 1

2018-49-12 22:49:07 ----- OpenVPN Start -----
OpenVPN core 3.2 ios arm64 64-bit PT_PROXY built on Sep 4 2018 09:41:09

comment:3 Changed 3 years ago by Gert Döring

Owner: changed from yuriy to denys

comment:4 Changed 3 years ago by Antonio Quartulli

Owner: changed from denys to OpenVPN Inc.

comment:5 Changed 16 months ago by Gert Döring

Resolution: wontfix
Status: assignedclosed

OpenVPN Inc does not want to receive any feedback for the "Connect"
OpenVPN clients via the community bug trackers (here and in GH issues).

Please resubmit - if still relevant - via https://support.openvpn.net/

Note: See TracTickets for help on using tickets.