Hi,

On Wed, Oct 23, 2024 at 05:47:51PM +0300, Razvan Cojocaru wrote:
> > AUTH_FAILED should do this automatically - invalidate the token, that is.
> > Can you show a log where this is (not) happening?
> 
> Of course:
> 
> 2024-10-23 14:52:06 us=368754 PUSH: Received control message:
> 'PUSH_REPLY,auth-token'
> 2024-10-23 14:52:06 us=368851 UDPv4 WRITE [90] to
> [AF_INET]69.162.107.71:1194: P_ACK_V1 kid=0 pid=[ #13 ] [ 8 7 6 5 4 3 2 1 ]
> DATA len=0
> 2024-10-23 14:52:06 us=368936 UDPv4 READ [163] from
> [AF_INET]69.162.107.71:1194: P_CONTROL_V1 kid=0 pid=[ #12 ] [ 2 3 4 5 ]
> pid=9 DATA len=85
> 2024-10-23 14:52:06 us=368972 AUTH: Received control message: AUTH_FAILED,No
> Stairway to Heaven allowed in this guitar store
> 2024-10-23 14:52:06 us=369228 TCP/UDP: Closing socket
> 2024-10-23 14:52:06 us=369287 SIGUSR1[soft,auth-failure (auth-token)]
> received, process restarting
> 2024-10-23 14:52:06 us=369346 Restart pause, 1 second(s)

OK, so I see what is happening - you're sending an AUTH_FAILED "out of
the blue", not in response to a client handshake, right?

OpenVPN 2 *should* invalidate the token upon the reconnect (and then
getting an AUTH_FAILED)... so what happens in this case if you let it
reconnect?

gert
-- 
"If was one thing all people took for granted, was conviction that if you 
 feed honest figures into a computer, honest figures come out. Never doubted 
 it myself till I met a computer with a sense of humor."
                             Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany                             g...@greenie.muc.de

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to