#1349 closed Bug / Defect (notabug)
Client fails to connect with 2.5, succeeds with 2.4.9
Reported by: | BrianKopp | Owned by: | plaisthos |
---|---|---|---|
Priority: | major | Milestone: | |
Component: | OSS OpenVPN Clients | Version: | OpenVPN 2.5.0 (Community Ed) |
Severity: | Not set (select this one, unless your'e a OpenVPN developer) | Keywords: | |
Cc: |
Description
System information:
Arch Linux
Client Version (failing) 2.5.0-3
Client Version (succeeding) 2.4.9
Server Version 2.1.4b
Using autologin openvpn-client@… and user-specific login failed on version 2.5.0-3, had to revert to 2.4.9 to succeed.
Segment of client logs. Server logs showed auth succeeded, and then auth failed a few seconds later.
2020-11-05 23:18:00 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2020-11-05 23:18:00 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2020-11-05 23:18:00 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2020-11-05 23:18:00 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2020-11-05 23:18:00 TCP/UDP: Preserving recently used remote address: [AF_INET]XXX.XXX.XXX.XXX:443
2020-11-05 23:18:00 Socket Buffers: R=[131072->200000] S=[16384->200000]
2020-11-05 23:18:00 Attempting to establish TCP connection with [AF_INET]XXX.XXX.XXX.XXX:443 [nonblock]
2020-11-05 23:18:00 TCP connection established with [AF_INET]XXX.XXX.XXX.XXX:443
2020-11-05 23:18:00 TCP_CLIENT link local: (not bound)
2020-11-05 23:18:00 TCP_CLIENT link remote: [AF_INET]XXX.XXX.XXX.XXX:443
2020-11-05 23:18:00 TLS: Initial packet from [AF_INET]XXX.XXX.XXX.XXX:443, sid=e6709db4 2241870f
2020-11-05 23:18:00 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2020-11-05 23:18:00 net_route_v4_best_gw query: dst 0.0.0.0
2020-11-05 23:18:00 net_route_v4_best_gw result: via 10.0.0.1 dev eno1
2020-11-05 23:18:01 VERIFY OK: nsCertType=SERVER
2020-11-05 23:18:01 VERIFY OK: depth=0, CN=OpenVPN Server
2020-11-05 23:18:01 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2020-11-05 23:18:01 [OpenVPN Server] Peer Connection Initiated with [AF_INET]XXX.XXX.XXX.XXX:443
2020-11-05 23:18:02 SENT CONTROL [OpenVPN Server]: 'PUSH_REQUEST' (status=1)
2020-11-05 23:18:02 AUTH: Received control message: AUTH_FAILED
2020-11-05 23:18:02 SIGTERM[soft,auth-failure] received, process exiting
Change History (6)
comment:1 Changed 3 years ago by
Version: | OpenVPN 2.1.4 (Community Ed) → OpenVPN 2.5.0 (Community Ed) |
---|
comment:2 Changed 3 years ago by
Resolution: | → notabug |
---|---|
Status: | new → closed |
No reply in 11 months - Closed
comment:3 Changed 2 years ago by
I have seen this exact behaviour - a client connection log that reports just AUTH_FAILED when using a certain openvpn 2.5.x client profile, but if you use the exact same connection profile with an openvpn 2.4.x client, it connects fine. In my case, adding the below line to the client profile if using openvpn 2.5.x fixed it immediately:
cipher BF-CBC
comment:4 Changed 2 years ago by
Do NOT use --cipher
because it is deprecated, use --data-ciphers
.
Do NOT use BF-CBC
because it is not secure, change your Server configuration to use a secure cipher.
comment:5 Changed 2 years ago by
Indeed, good advice @tct - assuming of course that you can influence or reconfigure/upgrade the server (eg. might be a customer's server). Not always possible to do, at least immediately. It would have been better if OpenVPN 2.5.x clients could detect and explicitly warn about this condition, with the appropriate advice to upgrade the server (preferable) or use a cipher downgrade (quick, but not secure, not recommended). Instead, the connection fails and it looks just like an incorrect password or token was entered.
comment:6 Changed 2 years ago by
Without seeing the server log, it's hard to give good advice here.
A 2.6 client might refuse to connect to a server that is only offering BF-CBC (but it would log something about "no common cipher, use ... to fix this"), but a 2.5.x client should connect just fine. With a 2.3 server, falling back to BF-CBC, with a 2.4 and higher server, negotiating AES-GCM.
It might be a server that is configured to use --opt-verify
and --cipher BF-CBC
. Such a server needs to be upgraded.
There is no way to incrementally move to more secure defaults(!) with servers that insists on clients having explicitly-configured insecure configs.
So, it would be really good to understand what is happening on the server side in this case (= see a server log with verb 3
, with the server version).
The server is refusing this client.
So you need to check the server logs why it is failing - "Server logs showed auth succeeded, and then auth failed a few seconds later" this is a bit thin, it should normally log some more verbose indication what it dislikes.
I can guess that it's related to the
--cipher
related changes, but since you are talking about "autologin profiles", this sounds like OpenVPN Access Server, and that one should be giving you a more clear indication what it isn't liking.So - more details needed.