On Wed, Oct 23, 2024 at 11:03 AM Razvan Cojocaru <rzv...@gmail.com> wrote:
> On 10/23/24 17:50, Gert Doering wrote: > > OK, so I see what is happening - you're sending an AUTH_FAILED "out of > > the blue", not in response to a client handshake, right? > > Exactly. In response to a client handshake there's no problem. > > > OpenVPN 2 *should* invalidate the token upon the reconnect (and then > > getting an AUTH_FAILED)... so what happens in this case if you let it > > reconnect? > > If we let it reconnect, the first re-connection attempt will fail at the > handshake stage as expected. > > But OpenVPN GUI tools will tend to show _two_ failed connections (the > first "out of the blue" AUTH_FAILED one, and the second actual one), > which is confusing for clients. > Wouldn't pushing "HALT" instead of "AUTH_FAILED" work in this case? As in the management command "client-kill {cid} HALT" which calls send_restart() with kill_msg = "HALT". Selva
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel