OpenVPN: TLS Negotiation Failed?
-
Share your OpenVPN settings and Firewall Rules (screenshots).
-Rico
-
Here are all the screenshots requested. Note: "AGVPN (out)" was my Dynamic DNS Solution, I deleted the rule for it as I'm no longer using it right now, but kept some other ones and the Server config just in case I would want to try it again.
-
@rico Also - I have used User Auth only before, but I still get the same error.
- Andrew
-
Did you use the client exporter to configure the windows client?
The default compression setting is Omit Preference. Why is that changed? Do you know you need to change it?
What does the OpenVPN server log (Status > System Logs, OpenVPN) include when you try to connect?
-
@Derelict I do use the client exporter package. As for the compression setting, I don't ever remember changing that, but it seems I have (not consciously).
Here is the current System Log for OpenVPN (Most recent and current PID)
Feb 12 20:12:43 openvpn 81170 OpenVPN 2.4.6 amd64-portbld-freebsd11.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 3 2018 Feb 12 20:12:43 openvpn 81170 library versions: OpenSSL 1.0.2o-freebsd 27 Mar 2018, LZO 2.10 Feb 12 20:12:43 openvpn 81345 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Feb 12 20:12:43 openvpn 81345 TUN/TAP device ovpns1 exists previously, keep at program end Feb 12 20:12:43 openvpn 81345 TUN/TAP device /dev/tun1 opened Feb 12 20:12:43 openvpn 81345 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Feb 12 20:12:43 openvpn 81345 /sbin/ifconfig ovpns1 10.0.80.1 10.0.80.2 mtu 1500 netmask 255.255.255.0 up Feb 12 20:12:43 openvpn 81345 /usr/local/sbin/ovpn-linkup ovpns1 1500 1621 10.0.80.1 255.255.255.0 init Feb 12 20:12:43 openvpn 81345 UDPv4 link local (bound): [AF_INET]10.0.0.20:1194 Feb 12 20:12:43 openvpn 81345 UDPv4 link remote: [AF_UNSPEC] Feb 12 20:12:43 openvpn 81345 Initialization Sequence Completed
-
@agnet said in OpenVPN: TLS Negotiation Failed?:
@Derelict I do use the client exporter package. As for the compression setting, I don't ever remember changing that, but it seems I have (not consciously).
Here is the current System Log for OpenVPN (Most recent and current PID)
Feb 12 20:12:43 openvpn 81170 OpenVPN 2.4.6 amd64-portbld-freebsd11.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 3 2018 Feb 12 20:12:43 openvpn 81170 library versions: OpenSSL 1.0.2o-freebsd 27 Mar 2018, LZO 2.10 Feb 12 20:12:43 openvpn 81345 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Feb 12 20:12:43 openvpn 81345 TUN/TAP device ovpns1 exists previously, keep at program end Feb 12 20:12:43 openvpn 81345 TUN/TAP device /dev/tun1 opened Feb 12 20:12:43 openvpn 81345 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Feb 12 20:12:43 openvpn 81345 /sbin/ifconfig ovpns1 10.0.80.1 10.0.80.2 mtu 1500 netmask 255.255.255.0 up Feb 12 20:12:43 openvpn 81345 /usr/local/sbin/ovpn-linkup ovpns1 1500 1621 10.0.80.1 255.255.255.0 init Feb 12 20:12:43 openvpn 81345 UDPv4 link local (bound): [AF_INET]10.0.0.20:1194 Feb 12 20:12:43 openvpn 81345 UDPv4 link remote: [AF_UNSPEC] Feb 12 20:12:43 openvpn 81345 Initialization Sequence Completed
It doesn't seem like it's even logging any activity from the device. Could there be a setting on the xFi router I need to change? I have 1194/udp Port Forwarded to 10.0.0.20 (pfSense WAN)
-
If it's not logging anything it is probably not receiving the traffic at all. That would dovetail with the client error messages.
-
@derelict So where can I go from here? According to my current firewall rules on pfSense, it's accepting IPv4 UDP traffic on port 1194/udp.. The only other way I can see is forwarding the traffic on the xFi router to the pfSense router's WAN address (which I already did).
-
If you are connecting from afar to the pfSense WAN IP on UDP 1194 and that traffic is not hitting pfSense WAN, you need to look upstream.
pfSense can only operate on traffic that actually arrives on its interfaces.
-
@derelict I hear ya’. That’s a bummer, but makes sense... I could maybe I replace our existing router with another pfSense one and do a P2P server between both of them instead so the firewalls can talk to each other? xFi isn’t the best with their interface - far too simple. Home-Network friendly I suppose.
Thank you for the help though.