Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN fails with 2.50

    Scheduled Pinned Locked Moved OpenVPN
    60 Posts 13 Posters 13.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • AKEGECA
      AKEGEC
      last edited by

      @jknott, it's an authhentification errors. Try to change your VPN client password.

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @dotdash
        last edited by

        @dotdash

        No, I'm not connecting from the same network. I get 2 IPv4 addresses from my ISP. My firewall is on one and my notebook computer on the other.

        I used colour coded Ethernet cables. The white ones connect directly to my modem. One goes to my firewall and the other to my notebook. I also have blue for connecting to my LAN and yellow for my test LAN. It helps to keep things straight when testing. ๐Ÿ˜‰

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        JKnottJ 1 Reply Last reply Reply Quote 0
        • JKnottJ
          JKnott @AKEGEC
          last edited by

          @akegec

          I'm using TLS, not user authentication, so no password used.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          1 Reply Last reply Reply Quote 0
          • S
            super_oleg
            last edited by

            Same problem

            1 Reply Last reply Reply Quote 0
            • JKnottJ
              JKnott @JKnott
              last edited by

              @jknott

              I just tried again and once again I can connect over the local LAN, but not from outside my firewall. I have the same firewall rule for it since 2017.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              P JKnottJ B 3 Replies Last reply Reply Quote 0
              • P
                PatPend @JKnott
                last edited by

                In VPN>OpenVPN>Servers>Edit change Protocol to "UDP on IPv4 only".

                JKnottJ 1 Reply Last reply Reply Quote 0
                • JKnottJ
                  JKnott @PatPend
                  last edited by

                  @patpend

                  That's all I have ever used.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  1 Reply Last reply Reply Quote 0
                  • JKnottJ
                    JKnott @JKnott
                    last edited by JKnott

                    Here are the relevant parts of the server and client logs:

                    Server:
                    Feb 25 10:04:24 firewall openvpn[88273]: 99.245.217.240:32854 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
                    Feb 25 10:04:24 firewall openvpn[88273]: 99.245.217.240:32854 TLS Error: TLS handshake failed
                    Feb 25 10:04:34 firewall openvpn[38758]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
                    Feb 25 10:04:34 firewall openvpn[38758]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
                    Feb 25 10:04:34 firewall openvpn[38758]: TCP/UDP: Preserving recently used remote address: [AF_INET]172.16.0.1:1194
                    Feb 25 10:04:34 firewall openvpn[38758]: UDPv4 link local: (not bound)
                    Feb 25 10:04:34 firewall openvpn[38758]: UDPv4 link remote: [AF_INET]172.16.0.1:1194

                    Client - OpenSUSE 15.2 network manager
                    2021-02-25T10:04:23.967189-05:00 E520 NetworkManager[1467]: <warn>
                    [1614265463.9636]
                    vpn-connection[0x5649aad226e0,58407612-4bce-4c1b-9421-3dcc15e7f6e7,"firewall-UDP4-1194-E520-config",0]:
                    VPN connection: connect timeout exceeded.
                    2021-02-25T10:04:23.971490-05:00 E520 nm-openvpn-serv[5314]: Connect
                    timer expired, disconnecting.
                    2021-02-25T10:04:23.974072-05:00 E520 nm-openvpn[5317]: SIGTERM[hard,]
                    received, process exiting
                    2021-02-25T10:04:23.974457-05:00 E520 NetworkManager[1467]: <warn>
                    [1614265463.9729]
                    vpn-connection[0x5649aad226e0,58407612-4bce-4c1b-9421-3dcc15e7f6e7,"firewall-UDP4-1194-E520-config",0]:
                    VPN plugin: failed: connect-failed (1)
                    2021-02-25T10:04:23.974809-05:00 E520 NetworkManager[1467]: <info>
                    [1614265463.9730]
                    vpn-connection[0x5649aad226e0,58407612-4bce-4c1b-9421-3dcc15e7f6e7,"firewall-UDP4-1194-E520-config",0]:
                    VPN plugin: state changed: stopping (5)
                    2021-02-25T10:04:23.975133-05:00 E520 NetworkManager[1467]: <info>
                    [1614265463.9730]
                    vpn-connection[0x5649aad226e0,58407612-4bce-4c1b-9421-3dcc15e7f6e7,"firewall-UDP4-1194-E520-config",0]:
                    VPN plugin: state changed: stopped (6)

                    As I mentioned earlier, it will connect when the client is on the LAN side of pfsense, but not WAN side. The client is OpenVPN 2.5.1, but I had similar results with 2.4.3.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    1 Reply Last reply Reply Quote 0
                    • B
                      bennyc @JKnott
                      last edited by

                      @jknott
                      If you can connect on LAN, I would think the server config is fine?
                      Wondering now what did you set in the gui, did you change interface from WAN to LAN for that test or is it set to Any (and thus it listens on all if's)?
                      I've upgraded 5d ago to 2.5.0, and have 2 openvpn instances running without issues, where one serves a "Peer to Peer" for a pfSense still running 2.4.x. also with only certs and no user auth. No change has been done on that one, it reconnected after upgrade so at least we (I) know it can work...

                      Did you try rebooting? ๐Ÿ˜ฌ

                      4x XG-7100 (2xHA), 1x SG-4860, 1x SG-2100
                      1x PC Engines APU2C4, 1x PC Engines APU1C4

                      JKnottJ 1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @bennyc
                        last edited by

                        @bennyc said in OpenVPN fails with 2.50:

                        If you can connect on LAN, I would think the server config is fine?

                        My thought too.

                        Wondering now what did you set in the gui, did you change interface from WAN to LAN for that test or is it set to Any (and thus it listens on all if's)?

                        It's set to WAN, but I have tried any. No difference

                        Did you try rebooting?

                        Several times.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        dotdashD 1 Reply Last reply Reply Quote 0
                        • dotdashD
                          dotdash @JKnott
                          last edited by

                          @jknott
                          Just curious, but has your only test been off the same CPE? I've seen strange behavior between clients on the same ISP (Cough... Comcast)
                          Maybe verify from somewhere external.

                          JKnottJ 1 Reply Last reply Reply Quote 0
                          • JKnottJ
                            JKnott @dotdash
                            last edited by

                            @dotdash

                            I have 2 IPv4 addresses from my ISP. With my notebook plugged into the same modem as my firewall, I get a different address. So, it would appear as though it was another customer with my ISP. BTW, I have used this setup for years, for testing. However, I just tried tethering with my cell phone and that seems to work. I wonder what's different with 2.5.0, as this using my 2nd IPv4 address worked with the pfsense 2.4.5, as I have done many times. My firewall rule for OpenVPN hasn't changed since Sept. 19, 2017 and the source is any. Also, why is it allowing a connection from the LAN?

                            PfSense running on Qotom mini PC
                            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                            UniFi AC-Lite access point

                            I haven't lost my mind. It's around here...somewhere...

                            1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              1. Make sure your default gateway is set to your WAN gateway on System > Routing
                              2. Try setting the OpenVPN server Protocol value to "UDP IPv4 and IPv6 on all interfaces (multihome)"

                              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              JKnottJ 1 Reply Last reply Reply Quote 1
                              • JKnottJ
                                JKnott @jimp
                                last edited by JKnott

                                @jimp

                                I have only used IPv4 for the UDP packets, as I run into DNS issues, due to the IPv4 host name being an alias and IPv6 being an actual address. Regardless, this worked reliably until I updated to pfsense 2.5.0. I can ping pfsense from my notebook and both the OpenVPN logs and Packet Capture show the connection is being attempted. The gateway is correct as it has been since I started using pfsense 5 years ago. Connecting the VPN in this manner most recently worked the day before I updated to 2.5.0, when I was testing for an issue with the Windows client. I normally use the VPN with Linux.

                                5ecad194-7429-4ca5-9d3d-aa5e0a122962-image.png

                                PfSense running on Qotom mini PC
                                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                UniFi AC-Lite access point

                                I haven't lost my mind. It's around here...somewhere...

                                GertjanG 1 Reply Last reply Reply Quote 0
                                • GertjanG
                                  Gertjan @JKnott
                                  last edited by Gertjan

                                  Wow, detail are not missing here ....

                                  This is what I have :

                                  fd94076a-db40-433a-b8dd-a92e9ed9899e-image.png

                                  The settings :

                                  .....

                                  73968630-1995-43c3-8d39-562688c8e4bd-image.png

                                  Ok, cut in half :

                                  eb6cfefc-1234-4b4c-803f-bcfdf243a58b-image.png

                                  30368877-bb2a-4410-955c-56a2f301f81f-image.png

                                  When exporting :

                                  c6f9fcf1-52b9-4f6a-8626-dc858de3422c-image.png

                                  Note : I do accept the new "2.5.0 OpenVPN stuff".

                                  When I export, I only use one of these button :

                                  2d0111c0-355b-4ebb-bded-5c766e6fdb37-image.png

                                  Result : using the iPhone OpenVPN Connect App (the official one ?!) it connects using IPv4 - IP ok - also received an IPv6 (correct address) but IPv6 is out.
                                  I can live with that.

                                  @home, I use the OpenVPN connect version 2.4.9 or 2.4.10 (have to check - it from last year) NOT the latest 2.5.1 from yesterday or so (and yes, shame or Netgate for not pushing that one out the minute it came out of the oven, I'm with you here ๐Ÿ˜€ )

                                  It connects with any (or just one) warnings just fine !
                                  IPv4 and IPv6 are up !

                                  My OpenVPN servers bind to my WAN = 192.168.10.3 - I have an upstream ISP router with its NAT rule stuff for VPN on port 1194-UDP.
                                  "Works for yers" .

                                  Now this seems strange. I presumed that I needed to upgrade at least my Windows 10 home OpenVPN connect App, but no ... it was working and kept on working.

                                  Btw : my routes :

                                  f831c266-8601-439e-a21b-192f6fb4819d-image.png

                                  I never use my VPN client facilities (I do have a xxxxVPN to play with) - they are just there so I can fool around with it so I can maybe once understand some one wants to tunnel my already TLS encrypted traffic.
                                  I'm using he.net for my IPv6 because, well, you know why.

                                  edit : Maybe I should raise my cyphering. Dono.
                                  The VPN is just for me so I can 'do things at work' while not being at work.

                                  No "help me" PM's please. Use the forum, the community will thank you.
                                  Edit : and where are the logs ??

                                  JKnottJ 1 Reply Last reply Reply Quote 0
                                  • JKnottJ
                                    JKnott @Gertjan
                                    last edited by

                                    @gertjan

                                    The VPN is working, just not when I use my 2nd IPv4 address. As I mentioned above, it does work when my notebook is tethered to my phone. My ISP provides 2 IPv4 addresses, which are not in the same /23 subnet and I normally use the 2nd address for testing. Testing this way has worked for years, until I updated to pfsense 2.5.0. I'd rather not have to tether to my phone for testing, but it appears I may have to.

                                    What changed in pfsense or OpenVPN to cause this?

                                    PfSense running on Qotom mini PC
                                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                    UniFi AC-Lite access point

                                    I haven't lost my mind. It's around here...somewhere...

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • jimpJ
                                      jimp Rebel Alliance Developer Netgate
                                      last edited by

                                      @jimp said in OpenVPN fails with 2.50:

                                      "UDP IPv4 and IPv6 on all interfaces (multihome)"

                                      Set that and try it again -- doesn't matter why you have the settings you have now or if it worked before.

                                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                      Need help fast? Netgate Global Support!

                                      Do not Chat/PM for help!

                                      JKnottJ 1 Reply Last reply Reply Quote 1
                                      • JKnottJ
                                        JKnott @jimp
                                        last edited by

                                        @jimp

                                        It still fails when I use my second IPv4 address.

                                        PfSense running on Qotom mini PC
                                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                        UniFi AC-Lite access point

                                        I haven't lost my mind. It's around here...somewhere...

                                        JKnottJ 1 Reply Last reply Reply Quote 0
                                        • JKnottJ
                                          JKnott @JKnott
                                          last edited by

                                          @jknott

                                          I just tried with ssh and the same thing happens. If I use my 2nd IPv4 address, Packet Capture shows the attempt, but no connection. I can connect with ssh if I tether to my phone. This shows the problem is with FreeBSD and not OpenVPN.

                                          Here's what ifconfig shows:
                                          inet 99.246.125.121 netmask 0xfffffe00 broadcast 255.255.255.255

                                          This shows the appropriate /23 subnet mask. My 2nd address (99.245.223.190) is also a /23, but in a different subnet.

                                          On the other hand, ping works in both directions. What is it that's causing this issue with OpenVPN & ssh?

                                          PfSense running on Qotom mini PC
                                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                          UniFi AC-Lite access point

                                          I haven't lost my mind. It's around here...somewhere...

                                          JKnottJ 1 Reply Last reply Reply Quote 0
                                          • JKnottJ
                                            JKnott @JKnott
                                            last edited by

                                            @jknott

                                            Here's a packet capture, showing ping, OpenVPN & ssh (along with some other junk) from my notebook computer to pfsense, using my 2nd IPv4 address. Ping works, but OpenVPN & ssh fail.packetcapture (7).cap Both OpenVPN and ssh work if I tether through my phone.

                                            PfSense running on Qotom mini PC
                                            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                            UniFi AC-Lite access point

                                            I haven't lost my mind. It's around here...somewhere...

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.