Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    losing OpenVPN connection every 20 - 120 seconds

    Scheduled Pinned Locked Moved OpenVPN
    76 Posts 7 Posters 13.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      akkiz @akkiz
      last edited by akkiz

      @akkiz couldnt see any traffic coming out of OPT1 port (which is assigned ovp3) problem still persist

      chpalmerC 1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Ok are you able to connect to ExpressVPN using that same config from a local client directly?

        Can you get the connection logs from that so we can see how it connects?

        Steve

        A 1 Reply Last reply Reply Quote 0
        • chpalmerC
          chpalmer @akkiz
          last edited by

          @akkiz said in losing OpenVPN connection every 20 - 120 seconds:

          @akkiz couldnt see any traffic coming out of OPT1 port (which is assigned ovp3) problem still persist

          You do not generally need to assign a VPN connection to an interface.. (not sure if this is the case when transferring all traffic to a "VPN service".

          Is it possible to remove this "assignment" to test?

          Triggering snowflakes one by one..
          Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

          A 1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            It shouldn't make any difference here but it's easy to test so...

            I notice it's setting the send and receive buffers everytime. You might try removing that setting so it just uses the default values.

            Connecting but not passing traffic really looks like a compression mismatch though. If you can connect using those settings from a host client instead of pfSense then we will at least have a known set of connection settings.

            1 Reply Last reply Reply Quote 0
            • A
              akkiz @stephenw10
              last edited by

              @stephenw10 let me set up and see but through their app it works fine for some countries but for some countries it connects but no traffic flows since ISP is blocking or throttling vpn connection hereScreenshot_20200114-075447_ExpressVPN.jpg

              1 Reply Last reply Reply Quote 0
              • A
                akkiz @chpalmer
                last edited by

                @chpalmer it didnt make any difference Screenshot_20200114-075817_Chrome.jpg

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Ok so no connection logs from a phone app, you're going to need to connect from a PC to get that I think.

                  However the fact it connects and doesn't pass traffic to some servers seems exactly like what you're seeing in pfSense. It could just be your ISP blocking the traffic.

                  Steve

                  A 2 Replies Last reply Reply Quote 0
                  • A
                    akkiz @stephenw10
                    last edited by akkiz

                    @stephenw10 yes i just came to know here they are blocking open vpn protocol but ipsec is open but i cant find any write up for it do u know how to configure ipsec in pf sense

                    A 1 Reply Last reply Reply Quote 0
                    • A
                      akkiz @akkiz
                      last edited by

                      @akkiz because i tried open vpn on my work pc it connects fine but no internet flows so i think my isp blocks open vpn from ipsec works fine here

                      1 Reply Last reply Reply Quote 0
                      • A
                        akkiz @stephenw10
                        last edited by akkiz

                        @stephenw10 through phone app it works fine since it had all 3 protocols see attached pic zz.jpg

                        1 Reply Last reply Reply Quote 0
                        • B
                          bcruze
                          last edited by

                          to be clear.

                          its not working using their equipment + pfsense and openvpn

                          but its working over wireless using the same equipment using the app + openvpn?

                          A 1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            That looks like a Windows application. Are there logs there showing how it is connecting?

                            You might try using their TCP setting instead, if you know what those are.

                            IPSec is far more likely to be blocked, on the standard ports at least.

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • A
                              akkiz @bcruze
                              last edited by

                              @bcruze express vpn app works fine in android and in windows laptop but open vpn does not work in pf sense or in windows ,but ipsec is working in windows

                              A 1 Reply Last reply Reply Quote 0
                              • A
                                akkiz @akkiz
                                last edited by

                                @stephenw10 my goal is to create 2 wireless access point one regular internet one vpn internet,so i can switch between the 2 networks

                                A 1 Reply Last reply Reply Quote 0
                                • A
                                  akkiz @akkiz
                                  last edited by akkiz

                                  the internet speed is nearly same as before vpn

                                  zz.jpg

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    So OpenVPN does not work from Windows using either UDP or TCP?

                                    A 2 Replies Last reply Reply Quote 0
                                    • A
                                      akkiz @stephenw10
                                      last edited by

                                      @stephenw10 wait a sec let me try

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        akkiz @stephenw10
                                        last edited by akkiz

                                        @stephenw10 log.txt
                                        it connects to server but no traffic flows my vpn provider has onlu udp i guess didnt see tcp
                                        log.txt

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          It shows TCP on the phone app.

                                          If you see no traffic when connecting from Windows then there's no point trying to get pfSense to connect IMO. Something is blocking that traffic.

                                          Steve

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            akkiz
                                            last edited by

                                            hello guys why am i able to use open vpn client on ddwrt does ddwrt software connects in a different manner than pf sense ??? i attached logs of ddwrt connection if you guys see something in the logs..
                                            Client: CONNECTED SUCCESS

                                            Local Address: 10.71.0.54
                                            Remote Address: 10.71.0.53

                                            Status
                                            VPN Client Stats

                                            TUN/TAP read bytes
                                            28128246
                                            TUN/TAP write bytes
                                            84819766
                                            TCP/UDP read bytes
                                            91726426
                                            TCP/UDP write bytes
                                            30626151
                                            Auth read bytes
                                            84819766
                                            pre-compress bytes
                                            0
                                            post-compress bytes
                                            0
                                            pre-decompress bytes
                                            0
                                            post-decompress bytes
                                            0

                                            Log
                                            Clientlog:
                                            20200129 07:36:09 W WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
                                            20200129 07:36:09 W WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
                                            20200129 07:36:09 W WARNING: file '/tmp/openvpncl/client.key' is group or others accessible
                                            20200129 07:36:09 W WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
                                            20200129 07:36:09 W WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
                                            20200129 07:36:09 I OpenVPN 2.4.8 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 23 2020
                                            20200129 07:36:09 I library versions: OpenSSL 1.1.1d 10 Sep 2019 LZO 2.09
                                            20200129 07:36:09 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
                                            20200129 07:36:09 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
                                            20200129 07:36:09 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
                                            20200129 07:36:09 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
                                            20200129 07:36:09 I TCP/UDP: Preserving recently used remote address: [AF_INET]31.204.154.117:1195
                                            20200129 07:36:09 Socket Buffers: R=[180224->180224] S=[180224->180224]
                                            20200129 07:36:09 I UDPv4 link local: (not bound)
                                            20200129 07:36:09 I UDPv4 link remote: [AF_INET]31.204.154.117:1195
                                            20200129 07:36:09 TLS: Initial packet from [AF_INET]31.204.154.117:1195 sid=3e415a68 21d92ff3
                                            20200129 07:36:09 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
                                            20200129 07:36:09 VERIFY OK: depth=1 C=VG ST=BVI O=ExpressVPN OU=ExpressVPN CN=ExpressVPN CA emailAddress=support@expressvpn.com
                                            20200129 07:36:09 VERIFY KU OK
                                            20200129 07:36:09 Validating certificate extended key usage
                                            20200129 07:36:09 NOTE: --mute triggered...
                                            20200129 07:36:09 4 variation(s) on previous 3 message(s) suppressed by --mute
                                            20200129 07:36:09 I [Server-457-1a] Peer Connection Initiated with [AF_INET]31.204.154.117:1195
                                            20200129 07:36:10 SENT CONTROL [Server-457-1a]: 'PUSH_REQUEST' (status=1)
                                            20200129 07:36:10 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 10.71.0.1 comp-lzo no route 10.71.0.1 topology net30 ping 10 ping-restart 60 ifconfig 10.71.0.54 10.71.0.53 peer-id 12 cipher AES-256-GCM'
                                            20200129 07:36:10 OPTIONS IMPORT: timers and/or timeouts modified
                                            20200129 07:36:10 NOTE: --mute triggered...
                                            20200129 07:36:10 7 variation(s) on previous 3 message(s) suppressed by --mute
                                            20200129 07:36:10 Data Channel: using negotiated cipher 'AES-256-GCM'
                                            20200129 07:36:10 NCP: overriding user-set keysize with default
                                            20200129 07:36:10 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
                                            20200129 07:36:10 NOTE: --mute triggered...
                                            20200129 07:36:10 1 variation(s) on previous 3 message(s) suppressed by --mute
                                            20200129 07:36:10 I TUN/TAP device tun1 opened
                                            20200129 07:36:10 TUN/TAP TX queue length set to 100
                                            20200129 07:36:10 I /sbin/ifconfig tun1 10.71.0.54 pointopoint 10.71.0.53 mtu 1500
                                            20200129 07:36:10 /sbin/route add -net 31.204.154.117 netmask 255.255.255.255 gw 10.10.100.10
                                            20200129 07:36:10 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.71.0.53
                                            20200129 07:36:10 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.71.0.53
                                            20200129 07:36:10 /sbin/route add -net 10.71.0.1 netmask 255.255.255.255 gw 10.71.0.53
                                            20200129 07:36:11 I Initialization Sequence Completed
                                            20200129 07:36:24 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:36:24 D MANAGEMENT: CMD 'state'
                                            20200129 07:36:24 MANAGEMENT: Client disconnected
                                            20200129 07:36:24 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:36:24 D MANAGEMENT: CMD 'state'
                                            20200129 07:36:24 MANAGEMENT: Client disconnected
                                            20200129 07:36:24 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:36:24 D MANAGEMENT: CMD 'state'
                                            20200129 07:36:24 MANAGEMENT: Client disconnected
                                            20200129 07:36:24 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:36:24 D MANAGEMENT: CMD 'status 2'
                                            20200129 07:36:24 MANAGEMENT: Client disconnected
                                            20200129 07:36:24 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:36:24 D MANAGEMENT: CMD 'log 500'
                                            20200129 07:36:24 MANAGEMENT: Client disconnected
                                            20200129 07:38:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:38:33 D MANAGEMENT: CMD 'state'
                                            20200129 07:38:33 MANAGEMENT: Client disconnected
                                            20200129 07:38:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:38:33 D MANAGEMENT: CMD 'state'
                                            20200129 07:38:33 MANAGEMENT: Client disconnected
                                            20200129 07:38:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:38:33 D MANAGEMENT: CMD 'state'
                                            20200129 07:38:33 MANAGEMENT: Client disconnected
                                            20200129 07:38:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:38:33 D MANAGEMENT: CMD 'status 2'
                                            20200129 07:38:33 MANAGEMENT: Client disconnected
                                            20200129 07:38:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
                                            20200129 07:38:33 D MANAGEMENT: CMD 'log 500'
                                            19700101 04:00:00

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.