What's new

VPN Problems with 380.69 on AC87U

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Thorton

Regular Contributor
Once upgraded, VPN stopped working because of AUTH_FAILED error and the only way to fix it was do hard-reset ( https://www.snbforums.com/threads/r...in-380-69-is-now-available.42697/#post-364064 )

It looked the issue was solved, but it's not. Almost every hour VPN connection stops working and the only way to get it up is Disable/Enable VPN client. Looking at logs, I found OpenVPN re-establishes connection every hour:

Code:
Dec 12 17:24:19 openvpn[3050]: OpenVPN 2.4.3 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 11 2017
Dec 12 17:24:19 openvpn[3050]: library versions: OpenSSL 1.0.2n  7 Dec 2017, LZO 2.08
Dec 12 17:24:19 openvpn[3051]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Dec 12 17:24:19 openvpn[3051]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Dec 12 17:24:19 openvpn[3051]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Dec 12 17:24:19 openvpn[3051]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Dec 12 17:24:20 openvpn[3051]: TCP/UDP: Preserving recently used remote address: [AF_INET]95.143.193.6:1194
Dec 12 17:24:20 openvpn[3051]: Socket Buffers: R=[122880->122880] S=[122880->122880]
Dec 12 17:24:20 openvpn[3051]: UDP link local: (not bound)
Dec 12 17:24:20 openvpn[3051]: UDP link remote: [AF_INET]95.143.193.6:1194
Dec 12 17:24:20 openvpn[3051]: TLS: Initial packet from [AF_INET]95.143.193.6:1194, sid=fe497cea 549a60d2
Dec 12 17:24:20 openvpn[3051]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Dec 12 17:24:20 openvpn[3051]: VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=se23.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Dec 12 17:24:20 openvpn[3051]: VERIFY KU OK
Dec 12 17:24:20 openvpn[3051]: Validating certificate extended key usage
Dec 12 17:24:20 openvpn[3051]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 12 17:24:20 openvpn[3051]: VERIFY EKU OK
Dec 12 17:24:20 openvpn[3051]: VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=se23.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Dec 12 17:24:20 openvpn[3051]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Dec 12 17:24:20 openvpn[3051]: [se23.nordvpn.com] Peer Connection Initiated with [AF_INET]95.143.193.6:1194
Dec 12 17:24:21 openvpn[3051]: SENT CONTROL [se23.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Dec 12 17:24:21 openvpn[3051]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.8.8.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.8.96 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: timers and/or timeouts modified
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Dec 12 17:24:21 openvpn[3051]: Socket Buffers: R=[122880->245760] S=[122880->245760]
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: --ifconfig/up options modified
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: route options modified
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: route-related options modified
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: peer-id set
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: adjusting link_mtu to 1657
Dec 12 17:24:21 openvpn[3051]: OPTIONS IMPORT: data channel crypto options modified
Dec 12 17:24:21 openvpn[3051]: Data Channel: using negotiated cipher 'AES-256-GCM'
Dec 12 17:24:21 openvpn[3051]: Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 12 17:24:21 openvpn[3051]: Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 12 17:24:21 openvpn[3051]: TUN/TAP device tun11 opened
Dec 12 17:24:21 openvpn[3051]: TUN/TAP TX queue length set to 100
Dec 12 17:24:21 openvpn[3051]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Dec 12 17:24:21 openvpn[3051]: /usr/sbin/ip link set dev tun11 up mtu 1500
Dec 12 17:24:21 openvpn[3051]: /usr/sbin/ip addr add dev tun11 10.8.8.96/24 broadcast 10.8.8.255
Dec 12 17:24:24 openvpn[3051]: /usr/sbin/ip route add 95.143.193.6/32 via 78.63.255.254
Dec 12 17:24:24 openvpn[3051]: /usr/sbin/ip route add 0.0.0.0/1 via 10.8.8.1
Dec 12 17:24:24 openvpn[3051]: /usr/sbin/ip route add 128.0.0.0/1 via 10.8.8.1
Dec 12 17:24:24 openvpn-routing: Configuring policy rules for client 1
Dec 12 17:24:24 openvpn-routing: Tunnel re-established, restoring WAN access to clients
Dec 12 17:24:24 openvpn[3051]: Initialization Sequence Completed

However, after exactly one more hour connection couldn't be re-established and log shows:

Code:
Dec 12 18:24:20 openvpn[3051]: VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=se23.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Dec 12 18:24:20 openvpn[3051]: VERIFY KU OK
Dec 12 18:24:20 openvpn[3051]: Validating certificate extended key usage
Dec 12 18:24:20 openvpn[3051]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 12 18:24:20 openvpn[3051]: VERIFY EKU OK
Dec 12 18:24:20 openvpn[3051]: VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=se23.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Dec 12 18:24:22 openvpn[3051]: Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 12 18:24:22 openvpn[3051]: Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 12 18:24:22 openvpn[3051]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA

At this time, connection goes down and I need to Disable/Enable VPN. Could anyone advice me on this? Maybe it's just some option from VPN server itself, which drops connection after one hour, and client needs to re-establish it? If so, how can I prevent this? It happens no matter if I'm online or offline - connection gets re-established every single hour at the same second.

I also found new version to act strange with VPN. I configured VPN client to block traffic if tunnel goes down, and it works. However! Connection went down again several minutes ago, and I couldn't re-connection because of AUTH_FAILED error again. This time, I configured my VPN client NOT to block traffic if tunnel goes down and disabled VPN, so I could connect to the Internet.

While this trick always worked on previous versions, it didn't work this time. Even after VPN client is Disabled, AUTH_FAILED error is still displayed next to "Service State" field every time I open VPN client. Furthermore, looking at logs, I see router tries to connect to disabled VPN every single time I open VPN client section. The only way to get my Internet connection back this time was to factory reset OpenVPN settings.

What am I missing here?
 
In case someone has the same issue too... I did 2nd hard-reset yesterday, and everything works fine for last 12+ hours. No AUTH_FAILED errors or connection drops so far.
 

Similar threads

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top