2FA keeps sending push notifications, even after sleep
-
Hi.
We're using Tunnelblick on Mac, and I've just implemented 2FA (Miniorange). It seemed like it worked, but I just realized that after I close the lid and send Mac to sleep, without first disconnecting the OpenVPN connection, I keep getting 2FA push notifications every 10-15 minutes.Do you have any idea why pfsense/openvpn keeps sending 2FA notifications? Can pfsense simply close the connection in such sleep cases? And is there any way to not have to use 2FA after computer comes back from sleep?
The pfsense log looks like this (repeats every 10-50 min):
Oct 26 18:18:14 openvpn 80333 user 'johndoe' could not authenticate. Oct 26 18:18:14 openvpn 80333 openvpn.auth-user.php: Error during RADIUS authentication : No valid RADIUS responses received Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 [johndoe] Peer Connection Initiated with [AF_INET]xxx.xxx.xxx.xxx:1194 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_GUI_VER="net.tunnelblick.tunnelblick_5711_3.8.6a__build_5711)" Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_TCPNL=1 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_COMP_STUBv2=1 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_COMP_STUB=1 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_LZO=1 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_LZ4v2=1 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_LZ4=1 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:AES-128-CBC Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_NCP=2 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_PROTO=6 Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_PLAT=mac Oct 26 18:15:13 openvpn 71792 xxx.xxx.xxx.xxx:1194 peer info: IV_VER=2.5.3
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.