Содержание
- Tls error cannot locate hmac in incoming packet from pfsense
- Tls error cannot locate hmac in incoming packet from pfsense
- Re: Mikrotik as OpenVPN Client for PFSense
- Re: Mikrotik as OpenVPN Client for PFSense
- Re: Mikrotik as OpenVPN Client for PFSense
- Re: Mikrotik as OpenVPN Client for PFSense
- Re: Mikrotik as OpenVPN Client for PFSense
- OpenVPN Support Forum
- Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
- pfsense as openvpn client
- Orddie
- obrith
- Orddie
- Orddie
- Shockey
- Orddie
- Orddie
- D-EJ915
- Orddie
- Nate Carmody
- tls-auth in openvpn.conf not working #14
- Comments
Tls error cannot locate hmac in incoming packet from pfsense
Поднял OpenVpn server. Виндовые и прочие клиенты подключаются нормально, все видят сеть и все такое. Есть в удаленной точке Synology NVR, на ней пытаюсь создать подключение ругается что нет сервера или сертификат просрочен. Логи со стороны Pfsense : TLS Error: cannot locate HMAC in incoming packet from [AF_INET6]::ffff:
1. Synology NVR не поддерживает TLS authentication.
или
2. Вы не сконфигурировали на Synology NVR TLS authentication.
На стороне клиента в конфиге это
tls-auth ta.key 1
ta.key — это то, что в pfSense Видно как Key в Cryptographic Settings
или
3. На стороне клиента и сервера не совпадает директива
auth SHA1auth SHA512и т.д.
Я новичок в этих делах можете помочь сконфигурировать конфигурационный файл?
Я новичок в этих делах можете помочь сконфигурировать конфигурационный файл?
Виндовые и прочие клиенты подключаются нормально
Просто возьмите работающий конфиг с этих клиентов как основу и отредактируйте его применительно к клиенту Synology NVR.
Да пытался что то не получается. Ну что ж бкдк пробовать. В любом случаи спасибо!! 😉
Вот так отредактировал, synology ругается что неверные параметры
dev tun
proto udp
remote «тут ip сервера и порт» udp
resolv-retry infinite
ca ca.crt
cert client.crt
key client.key
verify-x509-name «MyVPN» name
auth-user-pass
pkcs12 pfSense-udp-1194-Video.p12
tls-auth pfSense-udp-1194-Video-tls.key 1
remote-cert-tls server
cipher AES-256-CBC
ncp-ciphers AES-256-GCM:AES-128-GCM
synology ругается что неверные параметры
Ищите, что конкретно ему не нравится. Добавьте ему в конфиг
И ищите в логе ошибки. У Synology доступен стсемный логлог Open VPN?
Источник
Tls error cannot locate hmac in incoming packet from pfsense
Wed Aug 28, 2013 1:57 pm
Hi!
Today i set up Mikrotik device as OpenVPN client for PFSense gateway.
All is ok, but i have one trouble — tls-auth.
When i choose «Enable authentication of TLS packets.» in PFSense, Mikrotik not connecting.
What wrong?
Re: Mikrotik as OpenVPN Client for PFSense
Tue Sep 03, 2013 7:07 pm
Can you share your settings on Pfsense and mikrotik with just dummy ip address and will try to resolve your problem. we can exchange email : jollyrecto@gmail.com. I have experience on pfsense wiht openvpn but none on mikrotik..
Re: Mikrotik as OpenVPN Client for PFSense
Mon Jul 06, 2015 7:14 pm
Re: Mikrotik as OpenVPN Client for PFSense
Fri Oct 09, 2015 5:50 pm
This might come a little late but .
Things that got me up and running(on the microtik hAPs):
1) Import certificate is relatively standard (.crt) I also imported CA, not sure it’s needed.
2) Import key should be done in pem format «openssl rsa -in cert-key.key -out cert-key.pem» + import is necessary not automated, you should see KT in front of cert after successful import.
3) compression(no pref) on pf.
4) tcp not udp.
5) match crypto params AES-128 + SHA1 or anything else.
6) last but not least profile with local + remote IP in PPP menu.
Hope this helps
Re: Mikrotik as OpenVPN Client for PFSense
Tue Oct 13, 2015 5:08 pm
This might come a little late but .
Things that got me up and running(on the microtik hAPs):
1) Import certificate is relatively standard (.crt) I also imported CA, not sure it’s needed.
2) Import key should be done in pem format «openssl rsa -in cert-key.key -out cert-key.pem» + import is necessary not automated, you should see KT in front of cert after successful import.
3) compression(no pref) on pf.
4) tcp not udp.
5) match crypto params AES-128 + SHA1 or anything else.
6) last but not least profile with local + remote IP in PPP menu.
Hope this helps
Re: Mikrotik as OpenVPN Client for PFSense
Sun Dec 13, 2015 1:40 am
I have a working Mikrotik to pfSense tunnel via OpenVPN working. This is not a full guide but here are some steps to help you:
You must set up the VPN server on pfSense’s side using the «Remote Access (User Auth)» Server Mode. The reason for this is that Mikrotik requires usernames/passwords for OpenVPN operation. So you will need to add VPN users to pfSense’s side and use the login(s) from the Mikrotik device. Im not going to cover SSL + User Auth as that will just add complexity right now.
TLS authentication (Static keys) is not supported in RouterOS right now. Unfortuantely this restricts from being able to use the peer-to-peer modes directly You need to ensure the «Enable authentication of TLS packets» is unchecked on pfSense.
Due to constraints in this mode, you must use /29 for your ipv4 tunnel network. Make sure you check «Allocate only one IP per client» in the topology section
You will need to ensure the CA cert generated (if one doesnt exist you will need it for Remote Access mode) is imported into your Mikrotik device. Note, you do NOT set this as the certificate in the Mikrotik OpenVPN client interface
Источник
OpenVPN Support Forum
Community Support Forum
Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by dsetis » Thu Jun 21, 2018 11:14 am
Sometimes I have received attempts to connect to my server (not real connections I think), and each one of them, generating entries in my LOGFILE:
«TLS Error: cannot locate HMAC in incoming packet from. »
Result: 20G logfiles per day, that my rotate can’t manage..
What is the best way to solve it?
— «verb 0» isn’t a good option, i think.
— «disable the TLS security?» wrong way .
Any ideas?
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by TinCanTech » Thu Jun 21, 2018 8:01 pm
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by dsetis » Wed Jun 27, 2018 10:02 pm
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by TinCanTech » Wed Jun 27, 2018 10:34 pm
Result: 20G logfiles per day,
— «verb 0» isn’t a good option,
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by dsetis » Mon Jul 02, 2018 7:00 pm
With «0», I think no LOGS will be generated and its not so good.
with 1, the LOG is usefull, the problem is about the TLS attack. With 1, its flooding openvpn.log file
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by TinCanTech » Mon Jul 02, 2018 8:33 pm
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by dsetis » Tue Jul 03, 2018 2:32 pm
I was really confused.
I’m so sorry
I reversed mute option. 2 = less equals logs.
Thanks. Its working!
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by TinCanTech » Tue Jul 03, 2018 2:37 pm
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by dsetis » Tue Jul 03, 2018 3:13 pm
Now, again.. around 13k per second.
With verb 1 and mute 1
Tue Jul 3 12:08:23 2018 TLS Error: incoming packet authentication failed from 152.240.255.85:35215
Tue Jul 3 12:08:23 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:23 2018 TLS Error: incoming packet authentication failed from 177.56.233.73:58123
Tue Jul 3 12:08:23 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:23 2018 TLS Error: incoming packet authentication failed from 189.93.133.108:37127
Tue Jul 3 12:08:23 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:23 2018 TLS Error: incoming packet authentication failed from 152.240.129.127:48610
Tue Jul 3 12:08:23 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:23 2018 TLS Error: incoming packet authentication failed from 152.240.114.76:44890
Tue Jul 3 12:08:24 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:24 2018 TLS Error: incoming packet authentication failed from 152.240.107.107:44177
Tue Jul 3 12:08:24 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:24 2018 TLS Error: incoming packet authentication failed from 187.69.219.44:34305
Tue Jul 3 12:08:24 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:24 2018 TLS Error: incoming packet authentication failed from 152.240.224.88:55099
Tue Jul 3 12:08:24 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:24 2018 TLS Error: incoming packet authentication failed from 152.245.135.126:46313
Tue Jul 3 12:08:24 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:24 2018 TLS Error: incoming packet authentication failed from 179.86.133.247:53054
Tue Jul 3 12:08:24 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Jul 3 12:08:24 2018 TLS Error: incoming packet authentication failed from 152.245.160.189:33492
Re: Disk Full: TLS Error: cannot locate HMAC in incoming packet from.
Post by TinCanTech » Tue Jul 03, 2018 3:24 pm
Источник
pfsense as openvpn client
Orddie
I have been using openvpn server on a Linux host and connecting to that server from a windows host and bridging the connections together.
I tried configuring pfsense to replace the windows 7 box but it does not appear to be working correctly.
From the logs on the linux box. It would appear that pfsense is NOT making any attempt to connect to the Linux server.
Does anyone have suggestions where i can start?
obrith
Limp Gawd
Orddie
Orddie
I can not see pfsense trying to talk to the openvpn server.
I’m getting the following in the openvpn server log
TLS Error: reading acknowledgement record from packet
TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
and the following in the pfsense openvpn log
TLS Error: cannot locate HMAC in incoming packet from [AF_INET]XX.XXX.XXX.XXX:1194 (replaced ip w/ X’s)
Shockey
after googling the error you get from pfsense. i got this link
says to do this
Orddie
after googling the error you get from pfsense. i got this link
says to do this
i have no idea what that means.
the server is the linux box. the client is the pfsense box.
Orddie
okay. got it up and «working» now.
The connection appears to be connected but i can not ping the other network. I have done an iptables —flush on the linux box and did an allow any any in pfsense openvpn port.
any suggestions where to go from here?
D-EJ915
[H]ard|Gawd
Orddie
I added 192.168.1.0/24 to route over the opt1 interface.
The interface; once connected got an ip of 192.168.1.2 with a default route of 192.168.1.1 (the interface on the linux server).
I could never ping 192.168.1.2 from the linux server and could never ping 192.168.1.1 from my home network.
I could ping 192.168.1.2 (interface on pfsense server) from my home network.
@ times when the openvpn connection started up. It would kill all of my internet connection. According to the logs it looks as if it changed the default route to force
everything over the openvpn connection. That’s not my goal here. I’m looking to extend the network to be able to route traffic «internally».
I ended up moving the connection to the exchange server and bridging the tap interface with the servers network card. It’s not how i wanted it. I still want pfsense to handle this but after 6 hours of working on it. I needed to move on.
Nate Carmody
I added 192.168.1.0/24 to route over the opt1 interface.
The interface; once connected got an ip of 192.168.1.2 with a default route of 192.168.1.1 (the interface on the linux server).
I could never ping 192.168.1.2 from the linux server and could never ping 192.168.1.1 from my home network.
I could ping 192.168.1.2 (interface on pfsense server) from my home network.
@ times when the openvpn connection started up. It would kill all of my internet connection. According to the logs it looks as if it changed the default route to force
everything over the openvpn connection. That’s not my goal here. I’m looking to extend the network to be able to route traffic «internally».
I ended up moving the connection to the exchange server and bridging the tap interface with the servers network card. It’s not how i wanted it. I still want pfsense to handle this but after 6 hours of working on it. I needed to move on.
Источник
tls-auth in openvpn.conf not working #14
when i disable the line # tls-auth /etc/openvpn/pki/ta.key it works.
The text was updated successfully, but these errors were encountered:
Sounds like your client is misconfigured and not sending HMAC signatures.
Funny error on my mint linux, when i use the ovpn-file and connect manually openvpn my.ovpn it work.
When i import the same ovpn-file in the network manager, i can’t connect.
So it is no issue of docker-openvpn (tested also with win7, ubuntu 12.04 LTS, OSX and it works fine).
Thanks for the update. Glad to hear you got it working.
I assume Network Manager is messing with your config file. That «tool». haha. 😉
Sorry to bump an old topic, but if anyone find the same issue, you’re probably missing to configure your TLS auth key in the (graphical) network manager. First I split the client.ovpn file into several ones (client.crt, ca.crt, client.key. and ta.key (with what is in between )). While configuring your connection, you need to click on «Advanced» > TLS Authentication tab. Check the «Use additional TLS authentication», select your file (ta.key or whatever you call it) and «1» as key direction. Click Ok and you’re done.
I have to install openvpn server on debain after configuration and creation of clients I made the test on the server by executing the command openvpn client.ovpn it sends me this message of errors someone can help me please
Tue Mar 7 14:12:42 2017 TLS Error: cannot locate HMAC in incoming packet from [ AF_INET]154.65.33.243:49816
I’m also having the issue, even with the
Check the «Use additional TLS authentication», select your file (ta.key or whatever you call it) and «1» as key direction
Or also with pure openvpn cli: openvpn —config my.ovpn
What can I disable to verify the rest is working properly?
Источник
This topic has been deleted. Only users with topic management privileges can see it.
Поднял OpenVpn server. Виндовые и прочие клиенты подключаются нормально, все видят сеть и все такое. Есть в удаленной точке Synology NVR, на ней пытаюсь создать подключение ругается что нет сервера или сертификат просрочен. Логи со стороны Pfsense : TLS Error: cannot locate HMAC in incoming packet from [AF_INET6]::ffff:
1. Synology NVR не поддерживает TLS authentication.
или
2. Вы не сконфигурировали на Synology NVR TLS authentication.
На стороне клиента в конфиге это
tls-auth ta.key 1
ta.key — это то, что в pfSense Видно как Key в Cryptographic Settings
или
3. На стороне клиента и сервера не совпадает директива
auth SHA1auth SHA512и т.д.
https://serverfault.com/questions/194769/unable-to-logon-to-vpn
Я новичок в этих делах можете помочь сконфигурировать конфигурационный файл?
@Shuh:
Я новичок в этих делах можете помочь сконфигурировать конфигурационный файл?
Виндовые и прочие клиенты подключаются нормально
Просто возьмите работающий конфиг с этих клиентов как основу и отредактируйте его применительно к клиенту Synology NVR.
Да пытался что то не получается. Ну что ж бкдк пробовать. В любом случаи спасибо!!
Вот так отредактировал, synology ругается что неверные параметры
dev tun
proto udp
remote «тут ip сервера и порт» udp
resolv-retry infinite
persist-key
persist-tun
ca ca.crt
cert client.crt
key client.key
verify-x509-name «MyVPN» name
auth-user-pass
pkcs12 pfSense-udp-1194-Video.p12
tls-auth pfSense-udp-1194-Video-tls.key 1
remote-cert-tls server
cipher AES-256-CBC
ncp-ciphers AES-256-GCM:AES-128-GCM
synology ругается что неверные параметры
Ищите, что конкретно ему не нравится. Добавьте ему в конфиг
verb 3
И ищите в логе ошибки. У Synology доступен стсемный логлог Open VPN?
auth-user-pass
Где вводятся логинпароль?
https://habrahabr.ru/post/216197/
https://www.ogalik.ee/synology-dsm-4-openvpn-client/
Народ помогите не могу разобраться все та же ошибка прилагаю конфигурационный файл из Synology :dev tun
tls-client
remote ipserver 1194
pull
proto udp
up /usr/syno/etc.defaults/synovpnclient/scripts/ovpn-up
route-up /usr/syno/etc.defaults/synovpnclient/scripts/route-up
ca ca_o1517654907.crt
route-noexec
script-security 2
float
reneg-sec 0
explicit-exit-notify
plugin /lib/openvpn/openvpn-down-root.so /usr/syno/etc.defaults/synovpnclient/scripts/ip-down
auth-user-pass /tmp/ovpn_client_up
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and
privacy statement. We’ll occasionally send you account related emails.
Already on GitHub?
Sign in
to your account
Comments
I keep getting TLS Error: cannot locate HMAC in incoming packet from [AF_INET]xx.xx.xx.xx:xxxxx
when my OpenVPN client connected to the server. It seems tls-auth /etc/openvpn/pki/ta.key
doesn’t work.
If I comment this line and it will generate a log message like xx.xx.xx.xx:xxxxx TLS: Initial packet from [AF_INET]xx.xx.xx.xx:xxxxx, sid=a1b9713f 033e1970
, but xx.xx.xx.xx:xxxxx TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
& xx.xx.xx.xx:xxxxx TLS Error: TLS handshake failed
will be generated after a while. The connection is still failed. Could you please advise the solution? Really appreciate.
Same issue here. To fix this, you can either comment out the tls-auth
option from the openvpn.conf
file; or add the tls-auth
and key-redirection
into the end of client configuration file, as below:
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
(contents of ta.key)
-----END OpenVPN Static key V1-----
</tls-auth>
key-direction 1
Had to add tls-server
to the server.conf for this to work
I don’t think this is a server issue. It is a client side problem. You should inspect your OpenVPN client configuration especially TLS auth part.
-
Bits & Bytes
-
Networking & Security
You should upgrade or use an alternative browser.
pfsense as openvpn client
-
Thread starterOrddie
-
Start dateJan 14, 2012
-
#1
- Joined
- Dec 20, 2010
- Messages
- 3,291
I have been using openvpn server on a Linux host and connecting to that server from a windows host and bridging the connections together.
I tried configuring pfsense to replace the windows 7 box but it does not appear to be working correctly.
From the logs on the linux box… It would appear that pfsense is NOT making any attempt to connect to the Linux server.
Does anyone have suggestions where i can start?
-
#2
- Joined
- Jun 11, 2004
- Messages
- 267
-
#3
- Joined
- Dec 20, 2010
- Messages
- 3,291
Did you set up OpenVPN on the server tab or the client tab on pfSense?
client tab.
-
#4
- Joined
- Dec 20, 2010
- Messages
- 3,291
I’m getting the following in the openvpn server log
TLS Error: reading acknowledgement record from packet
TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
and the following in the pfsense openvpn log
TLS Error: cannot locate HMAC in incoming packet from [AF_INET]XX.XXX.XXX.XXX:1194 (replaced ip w/ X’s)
-
#5
- Joined
- Nov 24, 2008
- Messages
- 2,255
http://forum.pfsense.org/index.php?topic=30329.0
says to do this
«TLS Error» sounds difficult but it’s easy: Just take the TLS string from your server, put it into a textfile on your openvpn client.
-
#6
- Joined
- Dec 20, 2010
- Messages
- 3,291
after googling the error you get from pfsense. i got this linkhttp://forum.pfsense.org/index.php?topic=30329.0
says to do this
i have no idea what that means….
the server is the linux box. the client is the pfsense box.
*server config*
management localhost 7505
client-config-dir /etc/openvpn
#route 10.1.1.0 255.255.255.0
route 192.168.1.0 255.255.255.0
local 97.X.X.227
port 1194
proto udp
dev tap0
ca ca.crt
cert server.crt
key server.key # This file should be kept secret
dh dh1024.pem
#server 10.1.1.0 255.255.255.0
#server-bridge 10.0.1.25 255.255.255.0 10.0.1.26 10.0.1.27
server-bridge 192.168.1.1 255.255.255.0 192.168.1.2 192.168.1.3
ifconfig-pool-persist ipp.txt
client-to-client
duplicate-cn
keepalive 60 120
comp-lzo
max-clients 51
user nobody
group nobody
persist-key
persist-tun
status openvpn-status.log
log openvpn.log
log-append openvpn.log
#verb 4
verb 6
tls-server
*pfsense config*
server mode = Peer to peer (ssl/tls)
protocol = UDP
device mode = tap
interface = wan
server host = 97.XX.XX.227
server port = 1194
Enable authentication of tls packets = checked
advanced section = verb 6;tun-mtu 1532;fragment 1300;keysize 128;redirect-gateway def1;persist-key;
-
#7
- Joined
- Dec 20, 2010
- Messages
- 3,291
The connection appears to be connected but i can not ping the other network. I have done an iptables —flush on the linux box and did an allow any any in pfsense openvpn port.
any suggestions where to go from here?
-
#8
- Joined
- Jan 31, 2003
- Messages
- 1,718
-
#9
- Joined
- Dec 20, 2010
- Messages
- 3,291
You have a route setup for the network you are VPNing into?
Yep.
I added 192.168.1.0/24 to route over the opt1 interface.
The interface; once connected got an ip of 192.168.1.2 with a default route of 192.168.1.1 (the interface on the linux server).
I could never ping 192.168.1.2 from the linux server and could never ping 192.168.1.1 from my home network.
I could ping 192.168.1.2 (interface on pfsense server) from my home network.
@ times when the openvpn connection started up…. It would kill all of my internet connection. According to the logs it looks as if it changed the default route to force
everything over the openvpn connection. That’s not my goal here. I’m looking to extend the network to be able to route traffic «internally».
I ended up moving the connection to the exchange server and bridging the tap interface with the servers network card. It’s not how i wanted it… I still want pfsense to handle this but after 6 hours of working on it… I needed to move on.
Any suggestions?
-
#10
- Joined
- Jun 13, 2016
- Messages
- 1
Yep.I added 192.168.1.0/24 to route over the opt1 interface.
The interface; once connected got an ip of 192.168.1.2 with a default route of 192.168.1.1 (the interface on the linux server).
I could never ping 192.168.1.2 from the linux server and could never ping 192.168.1.1 from my home network.
I could ping 192.168.1.2 (interface on pfsense server) from my home network.
@ times when the openvpn connection started up…. It would kill all of my internet connection. According to the logs it looks as if it changed the default route to force
everything over the openvpn connection. That’s not my goal here. I’m looking to extend the network to be able to route traffic «internally».I ended up moving the connection to the exchange server and bridging the tap interface with the servers network card. It’s not how i wanted it… I still want pfsense to handle this but after 6 hours of working on it… I needed to move on.
Any suggestions?
I had the same problem, it was a Auth digest algorithm issue.
Once I switched server and client to SHA1 (160-bit), everything worked just great (aside from the inherent weakness in SHA1).
-
Bits & Bytes
-
Networking & Security