Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN to 2.5.0 works ?

    Scheduled Pinned Locked Moved OpenVPN
    17 Posts 4 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JKnottJ
      JKnott @hypnosis4u2nv
      last edited by

      @hypnosis4u2nv said in OpenVPN to 2.5.0 works ?:

      I've been playing with it since upgrading, I can't get it to work even though it was working prior.

      For me, the config that was working with 2.4.5 didn't with 2.5.0.

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      H 1 Reply Last reply Reply Quote 0
      • H
        hypnosis4u2nv @JKnott
        last edited by

        @jknott Yeah, I'm in the same boat. Had it working and 2.5 killed it somehow.

        How this issue wasn't seen during development is beyond me.

        chudakC 1 Reply Last reply Reply Quote 1
        • chudakC
          chudak @hypnosis4u2nv
          last edited by

          @hypnosis4u2nv

          Wonder if a bug was reported about this ?

          H 1 Reply Last reply Reply Quote 0
          • H
            hypnosis4u2nv @chudak
            last edited by

            @chudak Scrolling through the forums I see lots of complaints regarding OpenVPN. I'd like to submit a bug but where do I begin? Is it OpenVPN or pfsense? I don't even know. My pfsense crashed during my attempts to get it working. When it rebooted, it knocked out the VPN client gateway forcing me to phantom edit and save to get it back up.

            This release has serious flaws and shouldn't be out until this is fixed. The loss of connectivity is a pretty serious problem to have in deployment.

            chudakC 1 Reply Last reply Reply Quote 0
            • chudakC
              chudak @hypnosis4u2nv
              last edited by chudak

              @hypnosis4u2nv said in OpenVPN to 2.5.0 works ?:

              @chudak Scrolling through the forums I see lots of complaints regarding OpenVPN. I'd like to submit a bug but where do I begin? Is it OpenVPN or pfsense? I don't even know. My pfsense crashed during my attempts to get it working. When it rebooted, it knocked out the VPN client gateway forcing me to phantom edit and save to get it back up.

              This release has serious flaws and shouldn't be out until this is fixed. The loss of connectivity is a pretty serious problem to have in deployment.

              Shining side of open source is that everyone can contribute
              Pls submit as it will benefit all of us !

              https://redmine.pfsense.org/
              https://github.com/pfsense/pfsense

              1 Reply Last reply Reply Quote 0
              • D
                divsys
                last edited by divsys

                @divsys Was able to get my "problem" OpenVPN site back up.

                To recap: TLS/SSL S2S connection that was previously fine under 2.4.5p1 Server/Client.
                Converted Client to 2.5.0, Server left at 2.4.5p1 and the connection remained fine.
                Once I converted the Server (remote in my case) to 2.5.0, the connection failed w/ various TLS HMAC and other Handshake errors.

                Chased various issues, finally disabled TLS completely to drop the variables in play and recreated a new CA, Server cert, and Client cert.
                Copied the certs onto the client and restarted both ends.
                I started seeing
                "VERIFY WARNING: depth=1, unable to get certificate ....."
                for the CA I just created on the Server and the Client.
                As a possible fix I went back and checked the box
                "Add this Certificate Authority to the Operating System Trust Store"
                on the Server and Client CA cert page.
                I had to physically reboot both boxes for this to have any effect.
                I was then able to apply the newly created CA and Certs to both ends and the link came back up.

                Seems a new cert check in 2.5.0 didn't like my previously created certs from 2.4.x.
                Was a little ugly to track, but reasonably simple to resolve in the end.

                If this is a possibility moving forward, it might be nice to "prescan" previously created certs somehow to know if you're going to step into a minefield.

                Edit: I was able to re-enable TLS once I had the certs connected properly.

                -jfp

                H 1 Reply Last reply Reply Quote 1
                • H
                  hypnosis4u2nv @divsys
                  last edited by hypnosis4u2nv

                  @divsys Thanks for sharing your troubleshooting. Going to give this a try later and configure my OpenVPN client from scratch again.

                  There's a known issue with non local gateways not coming back up after boot. Did you do a reboot and confirm that they connect fine? Not sure if this pertains to us who use OpenVPN as a client and have specific traffic utilizing that gateway.

                  https://redmine.pfsense.org/issues/11433

                  D 1 Reply Last reply Reply Quote 0
                  • D
                    divsys @hypnosis4u2nv
                    last edited by

                    @hypnosis4u2nv That's not an issue for my setups.
                    I'm typically using this a means of providing secure Site-Site links over multiple different LANS.
                    General internet traffic simply passes through the local gateway at each site.
                    With the exceptions I've noted, the changeover to 2.5.0 has been pretty invisible.
                    I'll be moving more slowly as I changeover sites.
                    Some of the remote locations are less than accessible, I don't need to create headaches when not required.

                    -jfp

                    D 1 Reply Last reply Reply Quote 1
                    • D
                      divsys @divsys
                      last edited by

                      @divsys Looks like my guesses about needing the:
                      "Add this Certificate Authority to the Operating System Trust Store"
                      option on the CA were incorrect.
                      The S2S link remains stable after my previous work to rebuild CA&certs, but I found the secondary server for RoadWarrior clients was not allowing any connections.
                      It was failing with the same Unable to get certificate msgs.

                      Hunted about a few messages and found:OpenVPN 2.5.0 Certificate Verification Fails
                      Implemented the suggested fix and everything came back to life.
                      Hopefully we'll see a patch/fix for this.

                      -jfp

                      H 1 Reply Last reply Reply Quote 0
                      • H
                        hypnosis4u2nv @divsys
                        last edited by

                        @divsys Appreciate the heads up. Gonna wait for a fix for all this. Right now I'm getting by as a Wireguard client.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.