I have been using Openvpn for some time. I currently have it installed
Code: Select all
OpenVPN 2.4.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
on Debian 9 KVM.
Clients connect to the server with openwrt, openpli, etc. (mips). Everything works without problems. I started testing Debian 10 KVM and installed OpenVPN from the repository (ver. 2.4.7). From debian 9, I moved the /etc /openvpn directory to debian 10
Some clients connect to the OpenVPN server without any problems, but some cannot connect at all.
Code: Select all
Wed Jan 27 06:22:44 2021 TCP connection established with [AF_INET]xx.34.xx.155:4196
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 TCP connection established with [AF_INET]192.168.1.56:45654
Wed Jan 27 06:22:45 2021 TCP connection established with [AF_INET]xx.99.110.173:58054
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 TLS: Initial packet from [AF_INET]xx.34.xx.155:4196, sid=7df63db9 5baf36f6
Wed Jan 27 06:22:45 2021 TCP connection established with [AF_INET]xx.99.56.195:56489
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 TLS error: Unsupported protocol. This typically indicates that client and server have no common TLS version enabled. This can be caused by mismatched tls-version-min and tls-version-max options on client and server. If your OpenVPN client is between v2.3.6 and v2.3.2 try adding tls-version-min 1.0 to the client configuration to use TLS 1.0+ instead of TLS 1.0 only
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 OpenSSL: error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 TLS_ERROR: BIO read tls_read_plaintext error
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 TLS Error: TLS object -> incoming plaintext read error
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 TLS Error: TLS handshake failed
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 Fatal TLS error (check_tls_errors_co), restarting
Wed Jan 27 06:22:45 2021 xx.34.xx.155:4196 SIGUSR1[soft,tls-error] received, client-instance restarting
Some clients that cannot connect to the OpenVPN server use
Code: Select all
OpenVPN 2.3.2 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Oct 23 2017
I found some information about my issue.I would like to know if it is enough to add this directive to client.conf
Ideally, I would update with OpenVPN clients, but it’s not that simple.
Thank You
While trying to connect to a VPN via openvpn
I get the following error from openssl
Tue Oct 30 11:34:16 2018 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
... several more lines
Tue Oct 30 11:34:17 2018 OpenSSL: error:1425F102:SSL routines:ssl_choose_client_version:unsupported protocol
Tue Oct 30 11:34:17 2018 TLS_ERROR: BIO read tls_read_plaintext error
Tue Oct 30 11:34:17 2018 TLS Error: TLS object -> incoming plaintext read error
Tue Oct 30 11:34:17 2018 TLS Error: TLS handshake failed
Tue Oct 30 11:34:17 2018 SIGUSR1[soft,tls-error] received, process restarting
Tue Oct 30 11:34:17 2018 Restart pause, 5 second(s)
This error does not arise when using OpenSSL 1.1.0h.
- Why does this error arise after upgrading the
openssl
libraries? - How do I manage around this recurring problem?
- Is there a way to make this work by giving some flags to
openvpn
CLI instead of downgradingopenssl
?
OS: Debian Sid
ksinkar
2812 silver badges9 bronze badges
asked Oct 30, 2018 at 6:12
You don’t have to downgrade OpenSSL.
With the introduction of openssl version 1.1.1 in Debian the defaults are set to more secure values by default. This is done in the /etc/ssl/openssl.cnf config file. At the end of the file there is:
[system_default_sect]
MinProtocol = TLSv1.2
CipherString = DEFAULT@SECLEVEL=2
Debian now require as minimum the TLS 1.2 version instead TLS 1.0. If the other side does not support TLS 1.2 or higher you will get some connection errors.
I recommend upgrade openvpn on server to newer version which support TLS 1.2..
Second options (not much secure) is modify MinProcotol to TLSv1 or TLSv1.1.
answered Oct 30, 2018 at 13:42
Petr DuchekPetr Duchek
1,21314 silver badges19 bronze badges
2
You don’t have to downgrade OpenSSL or change the system default.
Instead of modifying /etc/ssl/openssl.cnf you can just configure the openvpn
client to configure libssl with a different minimum protocol version. The option
is --tls-version-min
or tls-version-min
in a config file.
It’s still preferable to upgrade the server but this is a better way to deal with a temporary version skew.
answered Nov 2, 2018 at 9:46
3
You can even directly override the system default e.g. by using:
tls-cipher "DEFAULT:@SECLEVEL=1"
to have a basic configuration that matches normal OpenSSL defaults. Note that OpenVPN normally sets a more restricted cipher list (see man page).
answered Nov 5, 2018 at 11:35
plaisthosplaisthos
6,1956 gold badges34 silver badges62 bronze badges
Содержание
- OpenVPN Support Forum
- TLS error: Unsupported protocol.
- TLS error: Unsupported protocol.
- Re: TLS error: Unsupported protocol.
- Re: TLS error: Unsupported protocol.
- Re: TLS error: Unsupported protocol.
- Re: TLS error: Unsupported protocol.
- Re: TLS error: Unsupported protocol.
- CentOS
- cannot connect to openvpn server TLS handshake failed
- cannot connect to openvpn server TLS handshake failed
- Re: cannot connect to openvpn server TLS handshake failed
- [SOLVED] cannot connect to openvpn server TLS handshake failed
- Linux Mint Forums
- [SOLVED] VPN will not connect
- [SOLVED] VPN will not connect
- Re: VPN will not connect
- Re: VPN will not connect
- Re: VPN will not connect
- Re: VPN will not connect
- OpenVPN Support Forum
- Synology TLS Error
- Synology TLS Error
- OpenVPN Support Forum
- Unable to connect with Openvpn server (TLS Error)
- Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
- Re: Unable to connect with Openvpn server (TLS Error)
OpenVPN Support Forum
Community Support Forum
TLS error: Unsupported protocol.
TLS error: Unsupported protocol.
Post by madial3368 » Thu Sep 17, 2020 8:36 am
In yealink phone logs, I found that openvpn version is 2.2.1, and read, that this openvpn client version not supporting tls 1.2, and this is the cause of the issue.
Please advise, can I somehow connect this phone to my openvpn? and actually my investigation is went to the right way or not?
Re: TLS error: Unsupported protocol.
Post by madial3368 » Wed Sep 23, 2020 7:33 am
Re: TLS error: Unsupported protocol.
Post by Oldman4sail » Fri Sep 25, 2020 2:05 am
Re: TLS error: Unsupported protocol.
Post by madial3368 » Fri Sep 25, 2020 7:05 am
Re: TLS error: Unsupported protocol.
Post by Oldman4sail » Fri Sep 25, 2020 2:41 pm
they only mention sha1. (search the pdf for. sha1), it’s at the bottom under troubleshooting.
http://support.yealink.com/previewPdf?f . qyTg%3D%3D
or create an account and ask yealink support.
It seems that the firmware version controls what’s supported. The newer firmware supports dh2048 and sha256, but a post to yealinks support forum could not hurt.
Re: TLS error: Unsupported protocol.
Post by madial3368 » Tue Sep 29, 2020 8:33 am
Источник
CentOS
The Community ENTerprise Operating System
cannot connect to openvpn server TLS handshake failed
cannot connect to openvpn server TLS handshake failed
Post by ikfredje » 2020/01/18 11:54:22
Then in the NetworkManager UI I added the necessary information and certificates. I’ve thoroughly checked several times that this information is correct and the same as a working setup on Centos 7.6. I’ve checked that is is not a firewall issue by temporarily disabling the firewall.
I finally found the following log entries:
Re: cannot connect to openvpn server TLS handshake failed
Post by matt2020 » 2020/01/20 07:55:29
What version of TLS are both the client and server trying to use ?
«TLS error: Unsupported protocol. This typically indicates that client and server have no common TLS version enabled. This can be caused by mismatched tls-version-min and tls-version-max options»
I think CentOS 8 wants TLS v1.3.
I had to downgrade mine by changing this config file to get my mailserver to talk to lower TLS systems :
[SOLVED] cannot connect to openvpn server TLS handshake failed
Post by ikfredje » 2020/01/22 19:30:39
Hi,
Many thanks for your reply . although MinProtocol was already set to TLSv1.2. However looking at the Ciphersuites line I noticed that none of the ciphers appeared in the server’s list. So I added «:AES256-GCM-SHA384» (which appears in the server’s cipher list) to the end of the line and now it works !
Источник
Linux Mint Forums
Welcome to the Linux Mint forums!
[SOLVED] VPN will not connect
[SOLVED] VPN will not connect
Post by Rander » Mon Feb 15, 2021 4:26 pm
I have my router (Asus RT-AC66U, FW ver. 3.0.0.4.382_51641) running an OpenVPN server. Using the OpenVPN client app on my phone, I can connect to it with no problems, so that part works!
I have tried setting up my (newly installed) LMDE4 as a client, and I cant get it to work! When I try and connect, it says «Connecting» for about 15 seconds, then says it was unable to connect.
The syslog has this to say:
Re: VPN will not connect
Post by it-place » Mon Feb 15, 2021 4:36 pm
could you also post how you’ve configured your VPN client in LMDE4, please?
Re: VPN will not connect
Post by Rander » Tue Feb 16, 2021 3:24 am
Well, I downloaded a .ovpn file from the router and imported that as a network VPN connection. That’s what I did on a Mint 20 install, and that worked no problem (and still does). They both run the same version of openvpn, but i noticed that the Mint runs openssl 1.1.1f, while LMDE4 runs openssl 1.1.1d — could this be the problem?
If there are any specific settings you need, I’ll see if I can find them.
Re: VPN will not connect
Post by it-place » Tue Feb 16, 2021 9:10 am
Re: VPN will not connect
Post by Rander » Tue Feb 16, 2021 4:25 pm
Okay, so this solved another thing.
I thought my router no longer received updates — it’s been a long time ago that it told me there was an update available. It appears that the server it checked no longer exists, but Asus did have a never firmware on their site. After installing that, it’s self-checking for new firmwares now works again.
More importantly (for the matter at hand), this update also updated the routers openvpn 2.3.2 to 2.4.7 — and apparantly that was all it took! The connection from LMDE4 now works!
Источник
OpenVPN Support Forum
Community Support Forum
Synology TLS Error
Synology TLS Error
Post by jctheeng » Thu Jul 08, 2021 2:38 am
We have a Synology NAS. We have a working L2TP VPN which I need to replace with OpenVPN because I need split tunnel capability. The current VPN connection kicks everyone off every so often and it is very problematic. I have done the OpenVPN set up in the VPN Server package of the Synology. (L2TP ip on 10.2.0.0. and OpenVPN ip on 10.8.0.0. ) I have exported the OpenVPN file. When I open the config file to edit the IP address everything is in just a couples lines so I have added hard returns where I believe they should go and un-commented the lines I believe need to be fixed. I tried to use the client config file from https://github.com/OpenVPN/openvpn/tree . nfig-files but it feels like it is a little old and some of the info in my config file didn’t seem to be in the github version.
Client config file
Sorry for all the # lines but if that is where my problem is than you gotta see that too.
Here is my client side log:
I don’t know how to get my Server config without logging in with SSH. Port forwarding for SSH has not been set up in the router so I can’t do that from here.
Every search I have done for TLS Error has come up with the solution being «oh, I just had to do my port forwarding on my router. »
UDP 1194 port has been forwarded on the router.
Please help. I have read lots of posts and lots of forums and watched YouTube videos and done google searches. What am I missing?
Источник
OpenVPN Support Forum
Community Support Forum
Unable to connect with Openvpn server (TLS Error)
Unable to connect with Openvpn server (TLS Error)
Post by kelsini » Tue Apr 12, 2016 12:17 pm
Hello members, i have recently installed a openvpn server on my ARCH 4.4.5-1 i686 GNU/Linux home machine.
Aparently the server is running OK as the output show:
My server config:
When i try to connect my server with my android phone (with openvpn for android app installed) with the respective imported keys and cert (ca.crt; kelsinni.crt; kelsinni.key) i got always the same TLS error:
I have double checked all the configs but still got this same error all the times. can anyone please give me a tip about the source of this problem?
Thanks in advance for all the help given.
Re: Unable to connect with Openvpn server (TLS Error)
Post by Traffic » Tue Apr 12, 2016 2:50 pm
Re: Unable to connect with Openvpn server (TLS Error)
Post by kelsini » Tue Apr 12, 2016 6:47 pm
.
client-to-client
keepalive 1800 4000
cipher DES-EDE3-CBC # Triple-DES
comp-lzo yes
user nobody
group nobody
.
Re: Unable to connect with Openvpn server (TLS Error)
Post by Traffic » Tue Apr 12, 2016 7:23 pm
Re: Unable to connect with Openvpn server (TLS Error)
Post by kelsini » Tue Apr 12, 2016 9:34 pm
Re: Unable to connect with Openvpn server (TLS Error)
Post by Traffic » Tue Apr 12, 2016 10:15 pm
Re: Unable to connect with Openvpn server (TLS Error)
Post by kelsini » Tue Apr 12, 2016 11:11 pm
I have notice that ‘de.blinkt.openvpn’ wasnt for sure correct but. i went on the smartphone openvpn for android app and change the «search domain» on «DNS AND IP» tab form ‘de.blinkt.openvpn’ to my DNS.
The most strange is that after this change the log still give me that ‘de.blinkt.openvpn’ DNS. and the same TLS error.
Re: Unable to connect with Openvpn server (TLS Error)
Post by Traffic » Tue Apr 12, 2016 11:25 pm
Re: Unable to connect with Openvpn server (TLS Error)
Post by kelsini » Wed Apr 13, 2016 9:24 pm
cd /var/log/
dir
btmp faillog journal lastlog old openvpn.log pacman.log wtmp
I think you are asking openvpn.log. here it is:
Re: Unable to connect with Openvpn server (TLS Error)
Post by Traffic » Wed Apr 13, 2016 9:30 pm
Re: Unable to connect with Openvpn server (TLS Error)
Post by kelsini » Wed Apr 13, 2016 9:54 pm
Re: Unable to connect with Openvpn server (TLS Error)
Post by Traffic » Wed Apr 13, 2016 10:53 pm
This most probably means that you have corrupted your tls-auth ta.key while importing it to you phone .. or possibly imported the wrong file. Try again. make sure the file is exactly the same.
FYI: you do not have to call the file ta.key .. you can rename it to anything more memorable.
Re: Unable to connect with Openvpn server (TLS Error)
Post by kelsini » Thu Apr 14, 2016 10:40 am
This most probably means that you have corrupted your tls-auth ta.key while importing it to you phone .. or possibly imported the wrong file. Try again. make sure the file is exactly the same.
FYI: you do not have to call the file ta.key .. you can rename it to anything more memorable.
I have 2 folders where keys and certs are.
in /root/easy-rsa/keys/
01.pem dh2048.pem index.txt ipp.txt serial
02.pem homeserver.crt index.txt.attr kelsinni.crt serial.old
ca.crt homeserver.csr index.txt.attr.old kelsinni.csr ta.key
ca.key homeserver.key index.txt.old kelsinni.key
and in /etc/openvpn/certs/
ca.crt dh2048.pem homeserver.key
ca.key homeserver.crt ta.key
The keys that i copied to my android were the client certificate (kelsinni.crt), client certificate key (kelsinni.key) and the CA certificate (ca.crt) all locate on /root/easy-rsa/keys/
The app openvpn for android only asks these 3 files CA certificate, Client certificate and Client certificate key. nothing about ta.key:
Im going to copy again the files to the android.
Источник
I’ve been struggling with this for a couple of days now and I cannot seem to find a answer so far.
I’ve ins talled a fresh CentOS 8 and added the openvpn functionality as follows:
Code: Select all
# dnf install openvpn
# yum install openvpn-devel.x86_64
# yum install NetworkManager-openvpn.x86_64 NetworkManager-openvpn-gnome.x86_64
Then in the NetworkManager UI I added the necessary information and certificates. I’ve thoroughly checked several times that this information is correct and the same as a working setup on Centos 7.6. I’ve checked that is is not a firewall issue by temporarily disabling the firewall.
I finally found the following log entries:
Code: Select all
$ journalctl -u NetworkManager --no-pager
Jan 18 11:55:03 maxwell NetworkManager[981]: <info> [1579344903.4589] audit: op="connection-activate" uuid="20378b68-9764-4f31-96a5-79200779a57e" name="lpprma-at-home" pid=2238 uid=1000 result="success"
Jan 18 11:55:03 maxwell NetworkManager[981]: <info> [1579344903.4681] vpn-connection[0x560936696100,20378b68-9764-4f31-96a5-79200779a57e,"lpprma-at-home",0]: Started the VPN service, PID 6461
Jan 18 11:55:03 maxwell NetworkManager[981]: <info> [1579344903.4881] vpn-connection[0x560936696100,20378b68-9764-4f31-96a5-79200779a57e,"lpprma-at-home",0]: Saw the service appear; activating connection
Jan 18 11:55:03 maxwell NetworkManager[981]: <info> [1579344903.5011] vpn-connection[0x560936696100,20378b68-9764-4f31-96a5-79200779a57e,"lpprma-at-home",0]: VPN plugin: state changed: starting (3)
Jan 18 11:55:03 maxwell NetworkManager[981]: <info> [1579344903.5011] vpn-connection[0x560936696100,20378b68-9764-4f31-96a5-79200779a57e,"lpprma-at-home",0]: VPN connection: (ConnectInteractive) reply received
Jan 18 11:55:03 maxwell nm-openvpn[6465]: WARNING: file '<edited>.pem' is group or others accessible
Jan 18 11:55:03 maxwell nm-openvpn[6465]: OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov 1 2019
Jan 18 11:55:03 maxwell nm-openvpn[6465]: library versions: OpenSSL 1.1.1 FIPS 11 Sep 2018, LZO 2.08
Jan 18 11:55:03 maxwell nm-openvpn[6465]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jan 18 11:55:03 maxwell nm-openvpn[6465]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jan 18 11:55:03 maxwell nm-openvpn[6465]: TCP/UDP: Preserving recently used remote address: [AF_INET]<ip address edited>:1194
Jan 18 11:55:03 maxwell nm-openvpn[6465]: UDP link local: (not bound)
Jan 18 11:55:03 maxwell nm-openvpn[6465]: UDP link remote: [AF_INET]<ip address edited>:1194
Jan 18 11:55:03 maxwell nm-openvpn[6465]: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Jan 18 11:55:03 maxwell nm-openvpn[6465]: TLS error: Unsupported protocol. This typically indicates that client and server have no common TLS version enabled. This can be caused by mismatched tls-version-min and tls-version-max options on client and server. If your OpenVPN client is between v2.3.6 and v2.3.2 try adding tls-version-min 1.0 to the client configuration to use TLS 1.0+ instead of TLS 1.0 only
Jan 18 11:55:03 maxwell nm-openvpn[6465]: OpenSSL: error:1425F102:SSL routines:ssl_choose_client_version:unsupported protocol
Jan 18 11:55:03 maxwell nm-openvpn[6465]: TLS_ERROR: BIO read tls_read_plaintext error
Jan 18 11:55:03 maxwell nm-openvpn[6465]: TLS Error: TLS object -> incoming plaintext read error
Jan 18 11:55:03 maxwell nm-openvpn[6465]: TLS Error: TLS handshake failed
Jan 18 11:55:03 maxwell nm-openvpn[6465]: SIGUSR1[soft,tls-error] received, process restarting
So it would appear that the client (CentOS and the server do not have a common cyher to use. When I check on the VPN server I try to connect to (using the working CentOS 7.6 openvpn), I can see that to me it appears that although it is a somewhat dated server TLSv1.2 should be available which I thought was still OK to use. (I forgot where I found to check this).
Code: Select all
$ openssl ciphers -v 'TLSv1.2' | grep AES
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
DHE-DSS-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(256) Mac=AEAD
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-DSS-AES256-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AES(256) Mac=SHA256
ADH-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=None Enc=AESGCM(256) Mac=AEAD
ADH-AES256-SHA256 TLSv1.2 Kx=DH Au=None Enc=AES(256) Mac=SHA256
ECDH-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AESGCM(256) Mac=AEAD
ECDH-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH/ECDSA Au=ECDH Enc=AESGCM(256) Mac=AEAD
ECDH-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AES(256) Mac=SHA384
ECDH-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH/ECDSA Au=ECDH Enc=AES(256) Mac=SHA384
AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256
DHE-DSS-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
DHE-DSS-AES128-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AES(128) Mac=SHA256
ADH-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=None Enc=AESGCM(128) Mac=AEAD
ADH-AES128-SHA256 TLSv1.2 Kx=DH Au=None Enc=AES(128) Mac=SHA256
ECDH-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AESGCM(128) Mac=AEAD
ECDH-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH/ECDSA Au=ECDH Enc=AESGCM(128) Mac=AEAD
ECDH-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AES(128) Mac=SHA256
ECDH-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH/ECDSA Au=ECDH Enc=AES(128) Mac=SHA256
AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256
When I do the same on the CentOS 8 client, I get:
Code: Select all
$ openssl ciphers -v 'TLSv1.2' | grep AES
TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD
TLS_AES_128_CCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESCCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-DSS-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(256) Mac=AEAD
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES256-CCM8 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESCCM8(256) Mac=AEAD
ECDHE-ECDSA-AES256-CCM TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESCCM(256) Mac=AEAD
DHE-RSA-AES256-CCM8 TLSv1.2 Kx=DH Au=RSA Enc=AESCCM8(256) Mac=AEAD
DHE-RSA-AES256-CCM TLSv1.2 Kx=DH Au=RSA Enc=AESCCM(256) Mac=AEAD
ADH-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=None Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-DSS-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES128-CCM8 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESCCM8(128) Mac=AEAD
ECDHE-ECDSA-AES128-CCM TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESCCM(128) Mac=AEAD
DHE-RSA-AES128-CCM8 TLSv1.2 Kx=DH Au=RSA Enc=AESCCM8(128) Mac=AEAD
DHE-RSA-AES128-CCM TLSv1.2 Kx=DH Au=RSA Enc=AESCCM(128) Mac=AEAD
ADH-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=None Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-DSS-AES256-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AES(256) Mac=SHA256
ADH-AES256-SHA256 TLSv1.2 Kx=DH Au=None Enc=AES(256) Mac=SHA256
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
DHE-DSS-AES128-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AES(128) Mac=SHA256
ADH-AES128-SHA256 TLSv1.2 Kx=DH Au=None Enc=AES(128) Mac=SHA256
RSA-PSK-AES256-GCM-SHA384 TLSv1.2 Kx=RSAPSK Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-PSK-AES256-GCM-SHA384 TLSv1.2 Kx=DHEPSK Au=PSK Enc=AESGCM(256) Mac=AEAD
DHE-PSK-AES256-CCM8 TLSv1.2 Kx=DHEPSK Au=PSK Enc=AESCCM8(256) Mac=AEAD
DHE-PSK-AES256-CCM TLSv1.2 Kx=DHEPSK Au=PSK Enc=AESCCM(256) Mac=AEAD
AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
AES256-CCM8 TLSv1.2 Kx=RSA Au=RSA Enc=AESCCM8(256) Mac=AEAD
AES256-CCM TLSv1.2 Kx=RSA Au=RSA Enc=AESCCM(256) Mac=AEAD
PSK-AES256-GCM-SHA384 TLSv1.2 Kx=PSK Au=PSK Enc=AESGCM(256) Mac=AEAD
PSK-AES256-CCM8 TLSv1.2 Kx=PSK Au=PSK Enc=AESCCM8(256) Mac=AEAD
PSK-AES256-CCM TLSv1.2 Kx=PSK Au=PSK Enc=AESCCM(256) Mac=AEAD
RSA-PSK-AES128-GCM-SHA256 TLSv1.2 Kx=RSAPSK Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-PSK-AES128-GCM-SHA256 TLSv1.2 Kx=DHEPSK Au=PSK Enc=AESGCM(128) Mac=AEAD
DHE-PSK-AES128-CCM8 TLSv1.2 Kx=DHEPSK Au=PSK Enc=AESCCM8(128) Mac=AEAD
DHE-PSK-AES128-CCM TLSv1.2 Kx=DHEPSK Au=PSK Enc=AESCCM(128) Mac=AEAD
AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
AES128-CCM8 TLSv1.2 Kx=RSA Au=RSA Enc=AESCCM8(128) Mac=AEAD
AES128-CCM TLSv1.2 Kx=RSA Au=RSA Enc=AESCCM(128) Mac=AEAD
PSK-AES128-GCM-SHA256 TLSv1.2 Kx=PSK Au=PSK Enc=AESGCM(128) Mac=AEAD
PSK-AES128-CCM8 TLSv1.2 Kx=PSK Au=PSK Enc=AESCCM8(128) Mac=AEAD
PSK-AES128-CCM TLSv1.2 Kx=PSK Au=PSK Enc=AESCCM(128) Mac=AEAD
AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256
AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256
Both list have may cyphers in common … :
Code: Select all
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
DHE-DSS-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(256) Mac=AEAD
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD
ADH-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=None Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD
DHE-DSS-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(128) Mac=AEAD
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD
ADH-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=None Enc=AESGCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256
DHE-DSS-AES256-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AES(256) Mac=SHA256
ADH-AES256-SHA256 TLSv1.2 Kx=DH Au=None Enc=AES(256) Mac=SHA256
ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256
DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256
DHE-DSS-AES128-SHA256 TLSv1.2 Kx=DH Au=DSS Enc=AES(128) Mac=SHA256
ADH-AES128-SHA256 TLSv1.2 Kx=DH Au=None Enc=AES(128) Mac=SHA256
AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD
AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD
AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256
AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256
So, I’m not sure what is going on. Can someone help me with this ? Many thanks.
I have my router (Asus RT-AC66U, FW ver. 3.0.0.4.382_51641) running an OpenVPN server. Using the OpenVPN client app on my phone, I can connect to it with no problems, so that part works!
I have tried setting up my (newly installed) LMDE4 as a client, and I cant get it to work! When I try and connect, it says «Connecting» for about 15 seconds, then says it was unable to connect.
The syslog has this to say:
Code: Select all
Feb 15 20:41:16 dellap NetworkManager[594]: <info> [1613418076.2030] audit: op="connection-activate" uuid="b6d3a504-6b69-43dc-9944-eb87c64aeb0d" name="Home" pid=4246 uid=1000 result="success"
Feb 15 20:41:16 dellap NetworkManager[594]: <info> [1613418076.2222] vpn-connection[0x558b65fba320,b6d3a504-6b69-43dc-9944-eb87c64aeb0d,"Home",0]: Started the VPN service, PID 6220
Feb 15 20:41:16 dellap NetworkManager[594]: <info> [1613418076.2373] vpn-connection[0x558b65fba320,b6d3a504-6b69-43dc-9944-eb87c64aeb0d,"Home",0]: Saw the service appear; activating connection
Feb 15 20:41:16 dellap NetworkManager[594]: <info> [1613418076.3295] vpn-connection[0x558b65fba320,b6d3a504-6b69-43dc-9944-eb87c64aeb0d,"Home",0]: VPN plugin: state changed: starting (3)
Feb 15 20:41:16 dellap NetworkManager[594]: <info> [1613418076.3296] vpn-connection[0x558b65fba320,b6d3a504-6b69-43dc-9944-eb87c64aeb0d,"Home",0]: VPN connection: (ConnectInteractive) reply received
Feb 15 20:41:16 dellap nm-openvpn[6228]: OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 20 2019
Feb 15 20:41:16 dellap nm-openvpn[6228]: library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
Feb 15 20:41:16 dellap nm-openvpn[6228]: WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
Feb 15 20:41:16 dellap nm-openvpn[6228]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 15 20:41:16 dellap nm-openvpn[6228]: TCP/UDP: Preserving recently used remote address: [AF_INET]<my-ip>:1194
Feb 15 20:41:16 dellap nm-openvpn[6228]: UDP link local: (not bound)
Feb 15 20:41:16 dellap nm-openvpn[6228]: UDP link remote: [AF_INET]<my-ip>:1194
Feb 15 20:41:16 dellap nm-openvpn[6228]: NOTE: chroot will be delayed because of --client, --pull, or --up-delay
Feb 15 20:41:16 dellap nm-openvpn[6228]: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Feb 15 20:41:16 dellap nm-openvpn[6228]: TLS error: Unsupported protocol. This typically indicates that client and server have no common TLS version enabled. This can be caused by mismatched tls-version-min and tls-version-max options on client and server. If your OpenVPN client is between v2.3.6 and v2.3.2 try adding tls-version-min 1.0 to the client configuration to use TLS 1.0+ instead of TLS 1.0 only
Feb 15 20:41:16 dellap nm-openvpn[6228]: OpenSSL: error:1425F102:SSL routines:ssl_choose_client_version:unsupported protocol
Feb 15 20:41:16 dellap nm-openvpn[6228]: TLS_ERROR: BIO read tls_read_plaintext error
Feb 15 20:41:16 dellap nm-openvpn[6228]: TLS Error: TLS object -> incoming plaintext read error
Feb 15 20:41:16 dellap nm-openvpn[6228]: TLS Error: TLS handshake failed
Feb 15 20:41:16 dellap nm-openvpn[6228]: SIGUSR1[soft,tls-error] received, process restarting
Feb 15 20:41:18 dellap NetworkManager[594]: <info> [1613418078.7085] audit: op="connection-deactivate" uuid="b6d3a504-6b69-43dc-9944-eb87c64aeb0d" name="Home" pid=4246 uid=1000 result="success"
Feb 15 20:41:18 dellap dbus-daemon[583]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' requested by ':1.10' (uid=0 pid=594 comm="/usr/sbin/NetworkManager --no-daemon ")
Feb 15 20:41:18 dellap systemd[1]: Starting Network Manager Script Dispatcher Service...
Feb 15 20:41:18 dellap nm-openvpn[6228]: SIGTERM[hard,init_instance] received, process exiting
Feb 15 20:41:18 dellap NetworkManager[594]: <warn> [1613418078.7257] vpn-connection[0x558b65fba320,b6d3a504-6b69-43dc-9944-eb87c64aeb0d,"Home",0]: VPN plugin: failed: connect-failed (1)
As far as I can make out, it is some sort of tls-problem!? So, how do I move on from here? I’m guessing that I should tell LMDE to use an older tls-version, but how?
Last edited by LockBot on Wed Dec 28, 2022 7:16 am, edited 2 times in total.
Reason: Topic automatically closed 6 months after creation. New replies are no longer allowed.
Overview of changes in 2.6
Project changes
We want to deprecate our old Trac bug tracking system.
Please report any issues with this release in GitHub
instead: https://github.com/OpenVPN/openvpn/issues
New features
Support unlimited number of connection entries and remote entries
- New management commands to enumerate and list remote entries
- Use
remote-entry-count
andremote-entry-get
commands from the management interface to get the number of
remote entries and the entries themselves. - Keying Material Exporters (RFC 5705) based key generation
- As part of the cipher negotiation OpenVPN will automatically prefer
the RFC5705 based key material generation to the current custom
OpenVPN PRF. This feature requires OpenSSL or mbed TLS 2.18+. - Compatibility with OpenSSL in FIPS mode
- OpenVPN will now work with OpenSSL in FIPS mode. Note, no effort
has been made to check or implement all the
requirements/recommendation of FIPS 140-2. This just allows OpenVPN
to be run on a system that be configured OpenSSL in FIPS mode. mlock
will now check if enough memlock-able memory has been reserved,- and if less than 100MB RAM are available, use setrlimit() to upgrade
the limit. See Trac #1390. Not available on OpenSolaris. - Certificate pinning/verify peer fingerprint
-
The
--peer-fingerprint
option has been introduced to give users an
easy to use alternative to thetls-verify
for matching the
fingerprint of the peer. The option takes use a number of allowed
SHA256 certificate fingerprints.See the man page section «Small OpenVPN setup with peer-fingerprint»
for a tutorial on how to use this feature. This is also available online
under https://github.com/openvpn/openvpn/blob/master/doc/man-sections/example-fingerprint.rst - TLS mode with self-signed certificates
- When
--peer-fingerprint
is used, the--ca
and--capath
option
become optional. This allows for small OpenVPN setups without setting up
a PKI with Easy-RSA or similar software. - Deferred auth support for scripts
- The
--auth-user-pass-verify
script supports now deferred authentication. - Pending auth support for plugins and scripts
-
Both auth plugin and script can now signal pending authentication to
the client when using deferred authentication. The newclient-crresponse
script option andOPENVPN_PLUGIN_CLIENT_CRRESPONSE
plugin function can
be used to parse a client response to aCR_TEXT
two factor challenge.See
sample/sample-scripts/totpauth.py
for an example. - Compatibility mode (
--compat-mode
) - The modernisation of defaults can impact the compatibility of OpenVPN 2.6.0
with older peers. The options--compat-mode
allows UIs to provide users
with an easy way to still connect to older servers. - OpenSSL 3.0 support
- OpenSSL 3.0 has been added. Most of OpenSSL 3.0 changes are not user visible but
improve general compatibility with OpenSSL 3.0.--tls-cert-profile insecure
has been added to allow selecting the lowest OpenSSL security level (not
recommended, use only if you must). OpenSSL 3.0 no longer supports the Blowfish
(and other deprecated) algorithm by default and the new option--providers
allows loading the legacy provider to renable these algorithms. - Optional ciphers in
--data-ciphers
- Ciphers in
--data-ciphers
can now be prefixed with a?
to mark
those as optional and only use them if the SSL library supports them. - Improved
--mssfix
and--fragment
calculation - The
--mssfix
and--fragment
options now allow an optionalmtu
parameter to specify that different overhead for IPv4/IPv6 should taken into
account and the resulting size is specified as the total size of the VPN packets
including IP and UDP headers. - Cookie based handshake for UDP server
-
Instead of allocating a connection for each client on the initial packet
OpenVPN server will now use an HMAC based cookie as its session id. This
way the server can verify it on completing the handshake without keeping
state. This eliminates the amplification and resource exhaustion attacks.
For tls-crypt-v2 clients, this requires OpenVPN 2.6 clients or later
because the client needs to resend its client key on completing the hand
shake. The tls-crypt-v2 option allows controlling if older clients are
accepted.By default the rate of initial packet responses is limited to 100 per 10s
interval to avoid OpenVPN servers being abused in reflection attacks
(see--connect-freq-initial
). - Data channel offloading with ovpn-dco
- 2.6.0+ implements support for data-channel offloading where the data packets
are directly processed and forwarded in kernel space thanks to the ovpn-dco
kernel module. The userspace openvpn program acts purely as a control plane
application. Note that DCO will use DATA_V2 packets in P2P mode, therefore,
this implies that peers must be running 2.6.0+ in order to have P2P-NCP
which brings DATA_V2 packet support. - Session timeout
- It is now possible to terminate a session (or all) after a specified amount
of seconds has passed session commencement. This behaviour can be configured
using--session-timeout
. This option can be configured on the server, on
the client or can also be pushed. - Inline auth username and password
- Username and password can now be specified inline in the configuration file
within the <auth-user-pass></auth-user-pass> tags. If the password is
missing OpenVPN will prompt for input via stdin. This applies to inline’d
http-proxy-user-pass too. - Tun MTU can be pushed
- The client can now also dynamically configure its MTU and the server
will try to push the client MTU when the client supports it. The
directive--tun-mtu-max
has been introduced to increase the maximum
pushable MTU size (defaults to 1600). - Improved control channel packet size control (
max-packet-size
) - The size of control channel is no longer tied to
--link-mtu
/--tun-mtu
and can be set using--max-packet-size
.
Sending large control channel frames is also optimised by allowing 6
outstanding packets instead of just 4.max-packet-size
will also set
mssfix
to try to limit data-channel packets as well.
Deprecated features
inetd
has been removed- This was a very limited and not-well-tested way to run OpenVPN, on TCP
and TAP mode only. verify-hash
has been deprecated- This option has very limited usefulness and should be replaced by either
a better--ca
configuration or with a--tls-verify
script. secret
has been deprecated- static key mode (non-TLS) is no longer considered «good and secure enough»
for today’s requirements. Use TLS mode instead. If deploying a PKI CA
is considered «too complicated», using--peer-fingerprint
makes
TLS mode about as easy as using--secret
. ncp-disable
has been removed- This option mainly served a role as debug option when NCP was first
introduced. It should now no longer be necessary. - TLS 1.0 and 1.1 are deprecated
tls-version-min
is set to 1.2 by default. OpenVPN 2.6.0 defaults
to a minimum TLS version of 1.2 as TLS 1.0 and 1.1 should be generally
avoided. Note that OpenVPN versions older than 2.3.7 use TLS 1.0 only.--cipher
argument is no longer appended to--data-ciphers
- by default. Data cipher negotiation has been introduced in 2.4.0
and been significantly improved in 2.5.0. The implicit fallback
to the cipher specified in--cipher
has been removed.
Effectively,--cipher
is a no-op in TLS mode now, and will
only have an effect in pre-shared-key mode (--secret
).
From now on--cipher
should not be used in new configurations
for TLS mode.
Should backwards compatibility with older OpenVPN peers be
required, please see the--compat-mode
instead. --prng
has beeen removed- OpenVPN used to implement its own PRNG based on a hash. However implementing
a PRNG is better left to a crypto library. So we use the PRNG
mbed TLS or OpenSSL now. --keysize
has been removed- The
--keysize
option was only useful to change the key length when using the
BF, CAST6 or RC2 ciphers. For all other ciphers the key size is fixed with the
chosen cipher. As OpenVPN v2.6 no longer supports any of these variable length
ciphers, this option was removed as well to avoid confusion. - Compression no longer enabled by default
- Unless an explicit compression option is specified in the configuration,
--allow-compression
defaults tono
in OpeNVPN 2.6.0.
By default, OpenVPN 2.5 still allowed a server to enable compression by
pushing compression related options. - PF (Packet Filtering) support has been removed
- The built-in PF functionality has been removed from the code base. This
feature wasn’t really easy to use and was long unmaintained.
This implies that also--management-client-pf
and any other compile
time or run time related option do not exist any longer. - Option conflict checking is being deprecated and phased out
- The static option checking (OCC) is no longer useful in typical setups
that negotiate most connection parameters. The--opt-verify
and
--occ-disable
options are deprecated, and the configure option
--enable-strict-options
has been removed. Logging of mismatched
options has been moved to debug logging (verb 7).
User-visible Changes
- CHACHA20-POLY1305 is included in the default of
--data-ciphers
when available. - Option
--prng
is ignored as we rely on the SSL library random number generator. - Option
--nobind
is default when--client
or--pull
is used in the configuration link_mtu
parameter is removed from environment or replaced with 0 when scripts are
called with parameters. This parameter is unreliable and no longer internally calculated.- control channel packet maximum size is no longer influenced by
--link-mtu
/--tun-mtu
and must be set by--max-packet-size
now.
The default is 1250 for the control channel size. - In point-to-point OpenVPN setups (no
--server
), using
--explict-exit-notiy
on one end would terminate the other side at
session end. This is considered a no longer useful default and has
been changed to «restart on reception of explicit-exit-notify message».
If the old behaviour is still desired,--remap-usr1 SIGTERM
can be used. - FreeBSD tun interfaces with
--topology subnet
are now put into real
subnet mode (IFF_BROADCAST instead of IFF_POINTOPOINT) — this might upset
software that enumerates interfaces, looking for «broadcast capable?» and
expecting certain results. Normal uses should not see any difference. - The default configurations will no longer allow connections to OpenVPN 2.3.x
peer or earlier, use the new--compat-mode
option if you need
compatibility with older versions. See the manual page on the
--compat-mode
for details.
Common errors with OpenSSL 3.0 and OpenVPN 2.6
Both OpenVPN 2.6 and OpenSSL 3.0 tighten the security considerable, so some
configuration will no longer work. This section will cover the most common
causes and error message we have seen and explain their reason and temporary
workarounds. You should fix the underlying problems as soon as possible since
these workaround are not secure and will eventually stop working in a future
update.
-
weak SHA1 or MD5 signature on certificates
This will happen on either loading of certificates or on connection
to a server:OpenSSL: error:0A00018E:SSL routines::ca md too weak Cannot load certificate file cert.crt Exiting due to fatal error
OpenSSL 3.0 no longer allows weak signatures on certificates. You can
downgrade your security to allow them by using--tls-cert-profile insecure
but should replace/regenerate these certificates as soon as possible. -
1024 bit RSA certificates, 1024 bit DH parameters, other weak keys
This happens if you use private keys or other cryptographic material that
does not meet today’s cryptographic standards anymore. Messages are similar
to:OpenSSL: error:0A00018F:SSL routines::ee key too small OpenSSL: error:1408518A:SSL routines:ssl3_ctx_ctrl:dh key too small
DH parameters (
--dh
) can be regenerated withopenssl dhparam 2048
.
For other cryptographic keys, these keys and certificates need to be
regenerated. TLS Security level can be temporarily lowered with
--tls-cert-profile legacy
or even--tls-cert-profile insecure
. -
Connecting to a OpenVPN 2.3.x server or allowing OpenVPN 2.3.x or earlier
clientsThis will normally result in messages like:
OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server. or client/127.0.0.1:49954 SENT CONTROL [client]: 'AUTH_FAILED,Data channel cipher negotiation failed (no shared cipher)' (status=1)
You can manually add the missing cipher to the
--data-ciphers
. The
standard ciphers should be included as well, e.g.
--data-ciphers AES-256-GCM:AES-128-GCM:?Chacha20-Poly1305:?AES-128-CBC
.
You can also use the--compat-mode
option. Note that these message may
also indicate other cipher configuration problems. See the data channel
cipher negotiation manual section for more details. (Available online under
https://github.com/OpenVPN/openvpn/blob/master/doc/man-sections/cipher-negotiation.rst) -
Use of a legacy or deprecated cipher (e.g. 64bit block ciphers)
OpenSSL 3.0 no longer supports a number of insecure and outdated ciphers in
its default configuration. Some of these ciphers are known to be vulnerable (SWEET32 attack).This will typically manifest itself in messages like:
OpenSSL: error:0308010C:digital envelope routines::unsupported Cipher algorithm 'BF-CBC' not found Unsupported cipher in --data-ciphers: BF-CBC
If your OpenSSL distribution comes with the legacy provider (see
alsoman OSSL_PROVIDER-legacy
), you can load it with
--providers legacy default
. This will re-enable the old algorithms. -
OpenVPN version not supporting TLS 1.2 or later
The default in OpenVPN 2.6 and also in many distributions is now TLS 1.2 or
later. Connecting to a peer that does not support this will results in
messages like:TLS error: Unsupported protocol. This typically indicates that client and server have no common TLS version enabled. This can be caused by mismatched tls-version-min and tls-version-max options on client and server. If your OpenVPN client is between v2.3.6 and v2.3.2 try adding tls-version-min 1.0 to the client configuration to use TLS 1.0+ instead of TLS 1.0 only OpenSSL: error:0A000102:SSL routines::unsupported protocol
This can be an OpenVPN 2.3.6 or earlier version.
compat-version 2.3.0
will
enable TLS 1.0 support if supported by the OpenSSL distribution. Note that
on some Linux distributions enabling TLS 1.1 or 1.0 is not possible.
Overview of changes in 2.5
New features
- Client-specific tls-crypt keys (
--tls-crypt-v2
) tls-crypt-v2
adds the ability to supply each client with a unique
tls-crypt key. This allows large organisations and VPN providers to profit
from the same DoS and TLS stack protection that small deployments can
already achieve usingtls-auth
ortls-crypt
.- ChaCha20-Poly1305 cipher support
- Added support for using the ChaCha20-Poly1305 cipher in the OpenVPN data
channel. - Improved Data channel cipher negotiation
-
The option
ncp-ciphers
has been renamed todata-ciphers
.
The old name is still accepted. The change in name signals that
data-ciphers
is the preferred way to configure data channel
ciphers and the data prefix is chosen to avoid the ambiguity that
exists with--cipher
for the data cipher andtls-cipher
for the TLS ciphers.OpenVPN clients will now signal all supported ciphers from the
data-ciphers
option to the server viaIV_CIPHERS
. OpenVPN
servers will select the first common cipher from thedata-ciphers
list instead of blindly pushing the first cipher of the list. This
allows to use a configuration like
data-ciphers ChaCha20-Poly1305:AES-256-GCM
on the server that
prefers ChaCha20-Poly1305 but uses it only if the client supports it.See the data channel negotiation section in the manual for more details.
- Removal of BF-CBC support in default configuration:
-
By default OpenVPN 2.5 will only accept AES-256-GCM and AES-128-GCM as
data ciphers. OpenVPN 2.4 allows AES-256-GCM,AES-128-GCM and BF-CBC when
no —cipher and —ncp-ciphers options are present. Accepting BF-CBC can be
enabled by addingdata-ciphers AES-256-GCM:AES-128-GCM:BF-CBC
and when you need to support very old peers also
data-ciphers-fallback BF-CBC
To offer backwards compatibility with older configs an explicit
cipher BF-CBC
in the configuration will be automatically translated into adding BF-CBC
to the data-ciphers option and setting data-ciphers-fallback to BF-CBC
(as in the example commands above). We strongly recommend to switching
away from BF-CBC to a more secure cipher. - Asynchronous (deferred) authentication support for auth-pam plugin.
- See src/plugins/auth-pam/README.auth-pam for details.
- Deferred client-connect
- The
--client-connect
option and the connect plugin API allow
asynchronous/deferred return of the configuration file in the same way
as the auth-plugin. - Faster connection setup
- A client will signal in the
IV_PROTO
variable that it is in pull
mode. This allows the server to push the configuration options to
the client without waiting for aPULL_REQUEST
message. The feature
is automatically enabled if both client and server support it and
significantly reduces the connection setup time by avoiding one
extra packet round-trip and 1s of internal event delays. - Netlink support
-
On Linux, if configured without
--enable-iproute2
, configuring IP
addresses and adding/removing routes is now done via the netlink(3)
kernel interface. This is much faster than callingifconfig
or
route
and also enables OpenVPN to run with less privileges.If configured with —enable-iproute2, the
ip
command is used
(as in 2.4). Support forifconfig
androute
is gone. - Wintun support
- On Windows, OpenVPN can now use
wintun
devices. They are faster
than the traditionaltap9
tun/tap devices, but do not provide
--dev tap
mode — so the official installers contain both. To use
a wintun device, add--windows-driver wintun
to your config
(and use of the interactive service is required as wintun needs
SYSTEM privileges to enable access). - IPv6-only operation
- It is now possible to have only IPv6 addresses inside the VPN tunnel,
and IPv6-only address pools (2.4 always required IPv4 config/pools
and IPv6 was the «optional extra»). - Improved Windows 10 detection
- Correctly log OS on Windows 10 now.
- Linux VRF support
- Using the new
--bind-dev
option, the OpenVPN outside socket can
now be put into a Linux VRF. See the «Virtual Routing and Forwarding»
documentation in the man page. - TLS 1.3 support
- TLS 1.3 support has been added to OpenVPN. Currently, this requires
OpenSSL 1.1.1+.
The options--tls-ciphersuites
and--tls-groups
have been
added to fine tune TLS protocol options. Most of the improvements
were also backported to OpenVPN 2.4 as part of the maintainance
releases. - Support setting DHCP search domain
- A new option
--dhcp-option DOMAIN-SEARCH my.example.com
has been
defined, and Windows support for it is implemented (tun/tap only, no
wintun support yet). Other platforms need to support this via--up
script (Linux) or GUI (OSX/Tunnelblick). - per-client changing of
--data-ciphers
ordata-ciphers-fallback
- from client-connect script/dir (NOTE: this only changes preference of
ciphers for NCP, but can not override what the client announces as
«willing to accept») - Handle setting of tun/tap interface MTU on Windows
- If IPv6 is in use, MTU must be >= 1280 (Windows enforces IETF requirements)
Add support for OpenSSL engines to access private key material (like TPM).
- HMAC based auth-token support
- The
--auth-gen-token
support has been improved and now generates HMAC
based user token. If the optional--auth-gen-token-secret
option is
used clients will be able to seamlessly reconnect to a different server
using the same secret file or to the same server after a server restart. - Improved support for pending authentication
-
The protocol has been enhanced to be able to signal that
the authentication should use a secondary authentication
via web (like SAML) or a two factor authentication without
disconnecting the OpenVPN session with AUTH_FAILED. The
session will instead be stay in a authenticated state and
wait for the second factor authentication to complete.This feature currently requires usage of the managent interface
on both client and server side. See the management-notes.txt
client-pending-auth
andcr-response
commands for more
details. - VLAN support
-
OpenVPN servers in TAP mode can now use 802.1q tagged VLANs
on the TAP interface to separate clients into different groups
that can then be handled differently (different subnets / DHCP,
firewall zones, …) further down the network. See the new
options--vlan-tagging
,--vlan-accept
,--vlan-pvid
.802.1q tagging on the client side TAP interface is not handled
today (= tags are just forwarded transparently to the server).
Support building of .msi installers for Windows
Allow unicode search string in --cryptoapicert
option (Windows)
- Support IPv4 configs with /31 netmasks now
- (By no longer trying to configure «broadcast x.x.x.x» in
ifconfig calls, /31 support «just works») - New option
--block-ipv6
to reject all IPv6 packets (ICMPv6) - this is useful if the VPN service has no IPv6, but the clients
might have (LAN), to avoid client connections to IPv6-enabled
servers leaking «around» the IPv4-only VPN. --ifconfig-ipv6
and--ifconfig-ipv6-push
will now accept- hostnames and do a DNS lookup to get the IPv6 address to use
Deprecated features
For an up-to-date list of all deprecated options, see this wiki page:
https://community.openvpn.net/openvpn/wiki/DeprecatedOptions
-
ncp-disable
has been deprecated- With the improved and matured data channel cipher negotiation, the use
ofncp-disable
should not be necessary anymore.
inetd
has been deprecated
This is a very limited and not-well-tested way to run OpenVPN, on TCP
and TAP mode only, which complicates the code quite a bit for little gain.
To be removed in OpenVPN 2.6 (unless users protest).no-iv
has been removed
This option was made into a NOOP option with OpenVPN 2.4. This has now
been completely removed.--client-cert-not-required
has been removed
This option will now cause server configurations to not start. Use
--verify-client-cert none
instead.--ifconfig-pool-linear
has been removed
This option is removed. Use--topology p2p
or--topology subnet
instead.--compress xxx
is considered risky and is warned against, see below.--key-method 1
has been removed
User-visible Changes
- If multiple connect handlers are used (client-connect, ccd, connect
plugin) and one of the handler succeeds but a subsequent fails, the
client-disconnect-script is now called immediately. Previously it
was called, when the VPN session was terminated. - Support for building with OpenSSL 1.0.1 has been removed. The minimum
supported OpenSSL version is now 1.0.2. - The GET_CONFIG management state is omitted if the server pushes
the client configuration almost immediately as result of the
faster connection setup feature. --compress
is nowadays considered risky, because attacks exist
leveraging compression-inside-crypto to reveal plaintext (VORACLE). So
by default,--compress xxx
will now accept incoming compressed
packets (for compatibility with peers that have not been upgraded yet),
but will not use compression outgoing packets. This can be controlled with
the new option--allow-compression yes|no|asym
.- Stop changing
--txlen
aways from OS defaults unless explicitly specified
in config file. OS defaults nowadays are actually larger then what we used
to configure, so our defaults sometimes caused packet drops = bad performance. - remove
--writepid
pid file on exit now - plugin-auth-pam now logs via OpenVPN logging method, no longer to stderr
(this means you’ll have log messages in syslog or openvpn log file now) - use ISO 8601 time format for file based logging now (YYYY-MM-DD hh:mm:dd)
(syslog is not affected, nor is--machine-readable-output
) --clr-verify
now loads all CRLs if more than one CRL is in the same
file (OpenSSL backend only, mbedTLS always did that)- when
--auth-user-pass file
has no password, and the management interface
is active, query management interface (instead of trying console query,
which does not work on windows) - skip expired certificates in Windows certificate store (
--cryptoapicert
) --socks-proxy
+--proto udp*
will now allways use IPv4, even if
IPv6 is requested and available. Our SOCKS code does not handle IPv6+UDP,
and before that change it would just fail in non-obvious ways.- TCP listen() backlog queue is now set to 32 — this helps TCP servers that
receive lots of «invalid» connects by TCP port scanners - do no longer print OCC warnings («option mismatch») about
key-method
,
keydir
,tls-auth
andcipher
— these are either gone now, or
negotiated, and the warnings do not serve a useful purpose. dhcp-option DNS
anddhcp-option DNS6
are now treated identically
(= both accept an IPv4 or IPv6 address for the nameserver)
Maintainer-visible changes
- the man page is now in maintained in .rst format, so building the openvpn.8
manpage from a git checkout now requires python-docutils (if this is missing,
the manpage will not be built — which is not considered an error generally,
but for package builders ormake distcheck
it is). Release tarballs
contain the openvpn.8 file, so unless some .rst is changed, doc-utils are
not needed for building. - OCC support can no longer be disabled
- AEAD support is now required in the crypto library
--disable-server
has been removed from configure (so it is no longer
possible to build a client-/p2p-only OpenVPN binary) — the saving in code
size no longer outweighs the extra maintenance effort.--enable-iproute2
will disable netlink(3) support, so maybe remove
that from package building configs (see above)- support building with MSVC 2019
- cmocka based unit tests are now only run if cmocka is installed externally
(2.4 used to ship a local git submodule which was painful to maintain) --disable-crypto
configure option has been removed. OpenVPN is now always
built with crypto support, which makes the code much easier to maintain.
This does not affect--cipher none
to do a tunnel without encryption.--disable-multi
configure option has been removed
Overview of changes in 2.4
New features
- Seamless client IP/port floating
- Added new packet format P_DATA_V2, which includes peer-id. If both the
server and client support it, the client sends all data packets in
the new format. When a data packet arrives, the server identifies peer
by peer-id. If peer’s ip/port has changed, server assumes that
client has floated, verifies HMAC and updates ip/port in internal structs.
This allows the connection to be immediately restored, instead of requiring
a TLS handshake before the server accepts packets from the new client
ip/port. - Data channel cipher negotiation
-
Data channel ciphers (
--cipher
) are now by default negotiated. If a
client advertises support for Negotiable Crypto Parameters (NCP), the
server will choose a cipher (by default AES-256-GCM) for the data channel,
and tell the client to use that cipher. Data channel cipher negotiation
can be controlled using--ncp-ciphers
and--ncp-disable
.A more limited version also works in client-to-server and server-to-client
scenarios where one of the end points uses a v2.4 client or server and the
other side uses an older version. In such scenarios the v2.4 side will
change to the--cipher
set by the remote side, if permitted by by
--ncp-ciphers
. For example, a v2.4 client with--cipher BF-CBC
andncp-ciphers AES-256-GCM:AES-256-CBC
can connect to both a v2.3
server withcipher BF-CBC
as well as a server with
cipher AES-256-CBC
in its config. The other way around, a v2.3 client
with eithercipher BF-CBC
orcipher AES-256-CBC
can connect to a
v2.4 server with e.g.cipher BF-CBC
and
ncp-ciphers AES-256-GCM:AES-256-CBC
in its config. For this to work
it requires that OpenVPN was built without disabling OCC support. - AEAD (GCM) data channel cipher support
- The data channel now supports AEAD ciphers (currently only GCM). The AEAD
packet format has a smaller crypto overhead than the CBC packet format,
(e.g. 20 bytes per packet for AES-128-GCM instead of 36 bytes per packet
for AES-128-CBC + HMAC-SHA1). - ECDH key exchange
- The TLS control channel now supports for elliptic curve diffie-hellmann
key exchange (ECDH). - Improved Certificate Revocation List (CRL) processing
- CRLs are now handled by the crypto library (OpenSSL or mbed TLS), instead
of inside OpenVPN itself. The crypto library implementations are more
strict than the OpenVPN implementation was. This might reject peer
certificates that would previously be accepted. If this occurs, OpenVPN
will log the crypto library’s error description. - Dualstack round-robin DNS client connect
- Instead of only using the first address of each
--remote
OpenVPN
will now try all addresses (IPv6 and IPv4) of a--remote
entry. - Support for providing IPv6 DNS servers
-
A new DHCP sub-option
DNS6
is added alongside with the already existing
DNS
sub-option. This is used to provide DNS resolvers available over
IPv6. This may be pushed to clients where « —up« scripts and--plugin
can act upon it through theforeign_option_<n>
environment variables.Support for the Windows client picking up this new sub-option is added,
however IPv6 DNS resolvers need to be configured vianetsh
which requires
administrator privileges unless the new interactive services on Windows is
being used. If the interactive service is used, this service will execute
netsh
in the background with the proper privileges. - New improved Windows Background service
- The new OpenVPNService is based on openvpnserv2, a complete rewrite of the OpenVPN
service wrapper. It is intended for launching OpenVPN instances that should be
up at all times, instead of being manually launched by a user. OpenVPNService is
able to restart individual OpenVPN processes if they crash, and it also works
properly on recent Windows versions. OpenVPNServiceLegacy tends to work poorly,
if at all, on newer Windows versions (8+) and its use is not recommended. - New interactive Windows service
-
The installer starts OpenVPNServiceInteractive automatically and configures
it to start at system startup.The interactive Windows service allows unprivileged users to start
OpenVPN connections in the global config directory (usually
C:Program FilesOpenVPNconfig) using OpenVPN GUI without any
extra configuration.Users who belong to the built-in Administrator group or to the
local «OpenVPN Administrator» group can also store configuration
files under %USERPROFILE%OpenVPNconfig for use with the
interactive service. - redirect-gateway ipv6
- OpenVPN has now feature parity between IPv4 and IPv6 for redirect
gateway including the handling of overlapping IPv6 routes with
IPv6 remote VPN server address. - LZ4 Compression and pushable compression
- Additionally to LZO compression OpenVPN now also supports LZ4 compression.
Compression options are now pushable from the server. - Filter pulled options client-side: pull-filter
- New option to explicitly allow or reject options pushed by the server.
May be used multiple times and is applied in the order specified. - Per-client remove push options: push-remove
- New option to remove options on a per-client basis from the «push» list
(more fine-grained than--push-reset
). - Http proxy password inside config file
- Http proxy passwords can be specified with the inline file option
<http-proxy-user-pass>
..</http-proxy-user-pass>
- Windows version detection
- Windows version is detected, logged and possibly signalled to server
(IV_PLAT_VER=<nn> if--push-peer-info
is set on client). - Authentication tokens
- In situations where it is not suitable to save user passwords on the client,
OpenVPN has support for pushing a —auth-token since v2.3. This option is
pushed from the server to the client with a token value to be used instead
of the users password. For this to work, the authentication plug-in would
need to implement this support as well. In OpenVPN 2.4 —auth-gen-token
is introduced, which will allow the OpenVPN server to generate a random
token and push it to the client without any changes to the authentication
modules. When the clients need to re-authenticate the OpenVPN server will
do the authentication internally, instead of sending the re-authentication
request to the authentication module . This feature is especially
useful in configurations which use One Time Password (OTP) authentication
schemes, as this allows the tunnel keys to be renegotiated regularly without
any need to supply new OTP codes. - keying-material-exporter
- Keying Material Exporter [RFC-5705] allow additional keying material to be
derived from existing TLS channel. - Android platform support
- Support for running on Android using Android’s VPNService API has been added.
See doc/android.txt for more details. This support is primarily used in
the OpenVPN for Android app (https://github.com/schwabe/ics-openvpn) - AIX platform support
- AIX platform support has been added. The support only includes tap
devices since AIX does not provide tun interface. - Control channel encryption (
--tls-crypt
) - Use a pre-shared static key (like the
--tls-auth
key) to encrypt control
channel packets. Provides more privacy, some obfuscation and poor-man’s
post-quantum security. - Asynchronous push reply
- Plug-ins providing support for deferred authentication can benefit from a more
responsive authentication where the server sends PUSH_REPLY immediately once
the authentication result is ready, instead of waiting for the the client to
to send PUSH_REQUEST once more. This requires OpenVPN to be built with
./configure --enable-async-push
. This is a compile-time only switch.
Deprecated features
For an up-to-date list of all deprecated options, see this wiki page:
https://community.openvpn.net/openvpn/wiki/DeprecatedOptions
--key-method 1
is deprecated in OpenVPN 2.4 and will be removed in v2.5.
Migrate away from--key-method 1
as soon as possible. The recommended
approach is to remove the--key-method
option from the configuration
files, OpenVPN will then use--key-method 2
by default. Note that this
requires changing the option in both the client and server side configs.--tls-remote
is removed in OpenVPN 2.4, as indicated in the v2.3
man-pages. Similar functionality is provided via--verify-x509-name
,
which does the same job in a better way.--compat-names
and--no-name-remapping
were deprecated in OpenVPN 2.3
and will be removed in v2.5. All scripts and plug-ins depending on the old
non-standard X.509 subject formatting must be updated to the standardized
formatting. See the man page for more information.--no-iv
is deprecated in OpenVPN 2.4 and will be removed in v2.5.--keysize
is deprecated in OpenVPN 2.4 and will be removed in v2.6
together with the support of ciphers with cipher block size less than
128-bits.--comp-lzo
is deprecated in OpenVPN 2.4. Use--compress
instead.--ifconfig-pool-linear
has been deprecated since OpenVPN 2.1 and will be
removed in v2.5. Use--topology p2p
instead.--client-cert-not-required
is deprecated in OpenVPN 2.4 and will be removed
in v2.5. Use--verify-client-cert none
for a functional equivalent.--ns-cert-type
is deprecated in OpenVPN 2.3.18 and v2.4. It will be removed
in v2.5. Use the far better--remote-cert-tls
option which replaces this
feature.
User-visible Changes
-
When using ciphers with cipher blocks less than 128-bits,
OpenVPN will complain loudly if the configuration uses ciphers considered
weak, such as the SWEET32 attack vector. In such scenarios, OpenVPN will by
default renegotiate for each 64MB of transported data (--reneg-bytes
).
This renegotiation can be disabled, but is HIGHLY DISCOURAGED. -
For certificate DNs with duplicate fields, e.g. «OU=one,OU=two», both fields
are now exported to the environment, where each second and later occurrence
of a field get _$N appended to it’s field name, starting at N=1. For the
example above, that would result in e.g. X509_0_OU=one, X509_0_OU_1=two.
Note that this breaks setups that rely on the fact that OpenVPN would
previously (incorrectly) only export the last occurrence of a field. -
proto udp
andproto tcp
now use both IPv4 and IPv6. The new
optionsproto udp4
andproto tcp4
use IPv4 only. -
--sndbuf
and--recvbuf
default now to OS defaults instead of 64k -
OpenVPN exits with an error if an option has extra parameters;
previously they were silently ignored -
--tls-auth
always requires OpenVPN static key files and will no
longer work with free form files -
--proto udp6/tcp6
in server mode will now try to always listen to
both IPv4 and IPv6 on platforms that allow it. Use--bind ipv6only
to explicitly listen only on IPv6. -
Removed
--enable-password-save
from configure. This option is now
always enabled. -
Stricter default TLS cipher list (override with
--tls-cipher
), that now
also disables:- Non-ephemeral key exchange using static (EC)DH keys
- DSS private keys
-
mbed TLS builds: changed the tls_digest_N values exported to the script
environment to be equal to the ones exported by OpenSSL builds, namely
the certificate fingerprint (was the hash of the ‘to be signed’ data). -
mbed TLS builds: minimum RSA key size is now 2048 bits. Shorter keys will
not be accepted, both local and from the peer. -
--connect-timeout
now specifies the timeout until the first TLS packet
is received (identical to--server-poll-timeout
) and this timeout now
includes the removed socks proxy timeout and http proxy timeout.In
--static
modeconnect-timeout
specifies the timeout for TCP and
proxy connection establishment -
--connect-retry-max
now specifies the maximum number of unsuccessful
attempts of each remote/connection entry before exiting. -
--http-proxy-timeout
and the static non-changeable socks timeout (5s)
have been folded into a «unified»--connect-timeout
which covers all
steps needed to connect to the server, up to the start of the TLS exchange.
The default value has been raised to 120s, to handle slow http/socks
proxies graciously. The old «fail TCP fast» behaviour can be achieved by
adding «--connect-timeout 10
» to the client config. -
--http-proxy-retry
and--sock-proxy-retry
have been removed. Proxy connections
will now behave like regular connection entries and generate a USR1 on failure. -
--connect-retry
gets an optional second argument that specifies the maximum
time in seconds to wait between reconnection attempts when an exponential
backoff is triggered due to repeated retries. Default = 300 seconds. -
Data channel cipher negotiation (see New features section) can override
ciphers configured in the config file. Use--ncp-disable
if you do not want
this behavior. -
All tun devices on all platforms are always considered to be IPv6
capable. The--tun-ipv6
option is ignored (behaves like it is always
on). -
On the client side recursively routed packets, which have the same destination
as the VPN server, are dropped. This can be disabled with
—allow-recursive-routing option. -
On Windows, when the
--register-dns
option is set, OpenVPN no longer
restarts thednscache
service — this had unwanted side effects, and
seems to be no longer necessary with currently supported Windows versions. -
If no flags are given, and the interactive Windows service is used, «def1»
is implicitly set (because «delete and later reinstall the existing
default route» does not work well here). If not using the service,
the old behaviour is kept. -
OpenVPN now reloads a CRL only if the modication time or file size has
changed, instead of for each new connection. This reduces the connection
setup time, in particular when using large CRLs. -
OpenVPN now ships with more up-to-date systemd unit files which take advantage
of the improved service management as well as some hardening steps. The
configuration files are picked up from the /etc/openvpn/server/ and
/etc/openvpn/client/ directories (depending on unit file). This also avoids
these new unit files and how they work to collide with older pre-existing
unit files. -
Using
--no-iv
(which is generally not a recommended setup) will
require explicitly disabling NCP with--disable-ncp
. This is
intentional because NCP will by default use AES-GCM, which requires
an IV — so we want users of that option to consciously reconsider.
Maintainer-visible changes
- OpenVPN no longer supports building with crypto support, but without TLS
support. As a consequence, OPENSSL_CRYPTO_{CFLAGS,LIBS} and
OPENSSL_SSL_{CFLAGS,LIBS} have been merged into OPENSSL_{CFLAGS,LIBS}. This
is particularly relevant for maintainers who build their own OpenSSL library,
e.g. when cross-compiling. - Linux distributions using systemd is highly encouraged to ship these new unit
files instead of older ones, to provide a unified behaviour across systemd
based Linux distributions. - With OpenVPN 2.4, the project has moved over to depend on and actively use
the official C99 standard (-std=c99). This may fail on some older compiler/libc
header combinations. In most of these situations it is recommended to
use -std=gnu99 in CFLAGS. This is known to be needed when doing
i386/i686 builds on RHEL5.
Version 2.4.5
New features
- The new option
--tls-cert-profile
can be used to restrict the set of
allowed crypto algorithms in TLS certificates in mbed TLS builds. The
default profile is ‘legacy’ for now, which allows SHA1+, RSA-1024+ and any
elliptic curve certificates. The default will be changed to the ‘preferred’
profile in the future, which requires SHA2+, RSA-2048+ and any curve.
Version 2.4.3
New features
- Support building with OpenSSL 1.1 now (in addition to older versions)
- On Win10, set low interface metric for TAP adapter when block-outside-dns
is in use, to make Windows prefer the TAP adapter for DNS queries
(avoiding large delays)
Security
- CVE-2017-7522: Fix
--x509-track
post-authentication remote DoS
A client could crash a v2.4+ mbedtls server, if that server uses the
--x509-track
option and the client has a correct, signed and unrevoked
certificate that contains an embedded NUL in the certificate subject.
Discovered and reported to the OpenVPN security team by Guido Vranken. - CVE-2017-7521: Fix post-authentication remote-triggerable memory leaks
A client could cause a server to leak a few bytes each time it connects to the
server. That can eventually cause the server to run out of memory, and thereby
causing the server process to terminate. Discovered and reported to the
OpenVPN security team by Guido Vranken. (OpenSSL builds only.) - CVE-2017-7521: Fix a potential post-authentication remote code execution
attack on servers that use the--x509-username-field
option with an X.509
extension field (option argument prefixed withext:
). A client that can
cause a server to run out-of-memory (see above) might be able to cause the
server to double free, which in turn might lead to remote code execution.
Discovered and reported to the OpenVPN security team by Guido Vranken.
(OpenSSL builds only.) - CVE-2017-7520: Pre-authentication remote crash/information disclosure for
clients. If clients use a HTTP proxy with NTLM authentication (i.e.
--http-proxy <server> <port> [<authfile>|'auto'|'auto-nct'] ntlm2
),
a man-in-the-middle attacker between the client and the proxy can cause
the client to crash or disclose at most 96 bytes of stack memory. The
disclosed stack memory is likely to contain the proxy password. If the
proxy password is not reused, this is unlikely to compromise the security
of the OpenVPN tunnel itself. Clients who do not use the--http-proxy
option with ntlm2 authentication are not affected. - CVE-2017-7508: Fix remotely-triggerable ASSERT() on malformed IPv6 packet.
This can be used to remotely shutdown an openvpn server or client, if
IPv6 and--mssfix
are enabled and the IPv6 networks used inside the VPN
are known. - Fix null-pointer dereference when talking to a malicious http proxy
that returns a malformedProxy-Authenticate:
headers for digest auth. - Fix overflow check for long
--tls-cipher
option - Windows: Pass correct buffer size to
GetModuleFileNameW()
(OSTIF/Quarkslabs audit, finding 5.6)
User-visible Changes
--verify-hash
can now take an optional flag which changes the hashing
algorithm. It can be either SHA1 or SHA256. The default if not provided is
SHA1 to preserve backwards compatibility with existing configurations.- Restrict the supported
--x509-username-field
extension fields to subjectAltName
and issuerAltName. Other extensions probably didn’t work anyway, and would
cause OpenVPN to crash when a client connects.
Bugfixes
- Fix fingerprint calculation in mbed TLS builds. This means that mbed TLS users
of OpenVPN 2.4.0, v2.4.1 and v2.4.2 that rely on the values of the
tls_digest_*
env vars, or that use--verify-hash
will have to change
the fingerprint values they check against. The security impact of the
incorrect calculation is very minimal; the last few bytes (max 4, typically
4) are not verified by the fingerprint. We expect no real-world impact,
because users that used this feature before will notice that it has suddenly
stopped working, and users that didn’t will notice that connection setup
fails if they specify correct fingerprints. - Fix edge case with NCP when the server sends an empty PUSH_REPLY message
back, and the client would not initialize it’s data channel crypto layer
properly (trac #903) - Fix SIGSEGV on unaligned buffer access on OpenBSD/Sparc64
- Fix TCP_NODELAY on OpenBSD
- Remove erroneous limitation on max number of args for
--plugin
- Fix NCP behaviour on TLS reconnect (Server would not send a proper
«cipher …» message back to the client, leading to client and server
using different ciphers) (trac #887)
Version 2.4.2
Bugfixes
- Fix memory leak introduced in OpenVPN 2.4.1: if
--remote-cert-tls
is
used, we leaked some memory on each TLS (re)negotiation.
Security
- Fix a pre-authentication denial-of-service attack on both clients and
servers. By sending a too-large control packet, OpenVPN 2.4.0 or v2.4.1 can
be forced to hit an ASSERT() and stop the process. If--tls-auth
or
--tls-crypt
is used, only attackers that have the--tls-auth
or
--tls-crypt
key can mount an attack.
(OSTIF/Quarkslab audit finding 5.1, CVE-2017-7478) - Fix an authenticated remote DoS vulnerability that could be triggered by
causing a packet id roll over. An attack is rather inefficient; a peer
would need to get us to send at least about 196 GB of data.
(OSTIF/Quarkslab audit finding 5.2, CVE-2017-7479)
Version 2.4.1
--remote-cert-ku
now only requires the certificate to have at least the
bits set of one of the values in the supplied list, instead of requiring an
exact match to one of the values in the list.--remote-cert-tls
now only requires that a keyUsage is present in the
certificate, and leaves the verification of the value up to the crypto
library, which has more information (i.e. the key exchange method in use)
to verify that the keyUsage is correct.--ns-cert-type
is deprecated. Use--remote-cert-tls
instead.
The nsCertType x509 extension is very old, and barely used.
--remote-cert-tls
uses the far more common keyUsage and extendedKeyUsage
extension instead. Make sure your certificates carry these to be able to
use--remote-cert-tls
.