id summary reporter owner description type status priority milestone component version severity resolution keywords cc 1349 Client fails to connect with 2.5, succeeds with 2.4.9 BrianKopp plaisthos "System information: Arch Linux Client Version (failing) 2.5.0-3 Client Version (succeeding) 2.4.9 Server Version 2.1.4b Using autologin openvpn-client@client.service and user-specific login failed on version 2.5.0-3, had to revert to 2.4.9 to succeed. Segment of client logs. Server logs showed auth succeeded, and then auth failed a few seconds later. 2020-11-05 23:18:00 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. 2020-11-05 23:18:00 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 2020-11-05 23:18:00 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 2020-11-05 23:18:00 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 2020-11-05 23:18:00 TCP/UDP: Preserving recently used remote address: [AF_INET]XXX.XXX.XXX.XXX:443 2020-11-05 23:18:00 Socket Buffers: R=[131072->200000] S=[16384->200000] 2020-11-05 23:18:00 Attempting to establish TCP connection with [AF_INET]XXX.XXX.XXX.XXX:443 [nonblock] 2020-11-05 23:18:00 TCP connection established with [AF_INET]XXX.XXX.XXX.XXX:443 2020-11-05 23:18:00 TCP_CLIENT link local: (not bound) 2020-11-05 23:18:00 TCP_CLIENT link remote: [AF_INET]XXX.XXX.XXX.XXX:443 2020-11-05 23:18:00 TLS: Initial packet from [AF_INET]XXX.XXX.XXX.XXX:443, sid=e6709db4 2241870f 2020-11-05 23:18:00 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this 2020-11-05 23:18:00 net_route_v4_best_gw query: dst 0.0.0.0 2020-11-05 23:18:00 net_route_v4_best_gw result: via 10.0.0.1 dev eno1 2020-11-05 23:18:01 VERIFY OK: nsCertType=SERVER 2020-11-05 23:18:01 VERIFY OK: depth=0, CN=OpenVPN Server 2020-11-05 23:18:01 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA 2020-11-05 23:18:01 [OpenVPN Server] Peer Connection Initiated with [AF_INET]XXX.XXX.XXX.XXX:443 2020-11-05 23:18:02 SENT CONTROL [OpenVPN Server]: 'PUSH_REQUEST' (status=1) 2020-11-05 23:18:02 AUTH: Received control message: AUTH_FAILED 2020-11-05 23:18:02 SIGTERM[soft,auth-failure] received, process exiting" Bug / Defect closed major OSS OpenVPN Clients OpenVPN 2.5.0 (Community Ed) Not set (select this one, unless your'e a OpenVPN developer) notabug