Hi,

David Raison wrote:
> Hi all,
>
> We're seeing some connection-resets to one of our clients since this
> morning that we do not quite understand.
> The client, which is behind a NAT, connected just fine until it went
> down this morning around 04:30.
>
>   
the log output you're seeing normally happens when the TCP connection is 
interrupted, either by the server (which you should see in the logs) or 
by a firewall or buggy router between the client and the server. If the 
client happens to be in a country like China, Iran or Russia then these 
things tend to happen as well.

HTH,

JJK

> It came back up around 06:00, at which time establishing a VPN
> connection no longer works. Instead, we're seeing this repeat itself
> indefinitely on verbosity level 5:
>
> Thu Oct  1 09:40:08 2015 us=92076 MULTI: multi_create_instance called
> Thu Oct  1 09:40:08 2015 us=92127 Re-using SSL/TLS context
> Thu Oct  1 09:40:08 2015 us=92160 LZO compression initialized
> Thu Oct  1 09:40:08 2015 us=92292 Control Channel MTU parms [ L:1576
> D:140 EF:40 EB:0 ET:0 EL:0 ]
> Thu Oct  1 09:40:08 2015 us=92324 Data Channel MTU parms [ L:1576 D:1450
> EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
> Thu Oct  1 09:40:08 2015 us=92364 Local Options String: 'V4,dev-type
> tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher
> BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
> Thu Oct  1 09:40:08 2015 us=92377 Expected Remote Options String:
> 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto
> TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method
> 2,tls-client'
> Thu Oct  1 09:40:08 2015 us=92400 Local Options hash (VER=V4): '3e6d1056'
> Thu Oct  1 09:40:08 2015 us=92419 Expected Remote Options hash (VER=V4):
> '31fdf004'
> Thu Oct  1 09:40:08 2015 us=92446 TCP connection established with
> [AF_INET]83.xx.xx.89:32949
> Thu Oct  1 09:40:08 2015 us=92459 TCPv4_SERVER link local: [undef]
> Thu Oct  1 09:40:08 2015 us=92472 TCPv4_SERVER link remote:
> [AF_INET]83.xx.xx.89:32949
> RThu Oct  1 09:40:09 2015 us=76404 83.xx.xx.89:32949 TLS: Initial packet
> from [AF_INET]83.xx.xx.89:32949, sid=d31598eb 072b702e
> WRRWRWRWWWWRWRWWWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWThu Oct  1
> 09:40:09 2015 us=445899 83.xx.xx.89:32949 Connection reset, restarting [0]
> Thu Oct  1 09:40:09 2015 us=445946 83.xx.xx.89:32949
> SIGUSR1[soft,connection-reset] received, client-instance restarting
> Thu Oct  1 09:40:09 2015 us=446013 TCP/UDP: Closing socket
>
> Connecting to the server with any other client works, it seems to be
> only that one client that does not connect.
>
> The WRRWR… chars are short for what is more detailed on verbosity level
> 6 (just an excerpt):
>
> Thu Oct  1 09:36:31 2015 us=92983 TCP connection established with
> [AF_INET]83.xx.xx.89:6821
> Thu Oct  1 09:36:31 2015 us=92991 TCPv4_SERVER link local: [undef]
> Thu Oct  1 09:36:31 2015 us=93002 TCPv4_SERVER link remote:
> [AF_INET]83.xx.xx.89:6821
> Thu Oct  1 09:36:32 2015 us=80231 83.xx.xx.89:6821 TCPv4_SERVER READ
> [14] from [AF_INET]83.xx.xx.89:6821: P_CONTROL_HARD_RESET_CLIENT_V2
> kid=0 [ ] pid=0 DATA len=0
> Thu Oct  1 09:36:32 2015 us=80289 83.xx.xx.89:6821 TLS: Initial packet
> from [AF_INET]83.xx.xx.89:6821, sid=e5e2123c aaf16c13
> Thu Oct  1 09:36:32 2015 us=80344 83.xx.xx.89:6821 TCPv4_SERVER WRITE
> [26] to [AF_INET]83.xx.xx.89:6821: P_CONTROL_HARD_RESET_SERVER_V2 kid=0
> [ 0 ] pid=0 DATA len=0
> Thu Oct  1 09:36:32 2015 us=94308 83.xx.xx.89:6821 TCPv4_SERVER READ
> [22] from [AF_INET]83.xx.xx.89:6821: P_ACK_V1 kid=0 [ 0 ]
> Thu Oct  1 09:36:32 2015 us=146026 83.xx.xx.89:6821 TCPv4_SERVER READ
> [114] from [AF_INET]83.xx.xx.89:6821: P_CONTROL_V1 kid=0 [ ] pid=1 DATA
> len=100
> Thu Oct  1 09:36:32 2015 us=146096 83.xx.xx.89:6821 TCPv4_SERVER WRITE
> [22] to [AF_INET]83.xx.xx.89:6821: P_ACK_V1 kid=0 [ 1 ]
> Thu Oct  1 09:36:32 2015 us=146242 83.xx.xx.89:6821 TCPv4_SERVER READ
> [114] from [AF_INET]83.xx.xx.89:6821: P_CONTROL_V1 kid=0 [ ] pid=2 DATA
> len=100
> Thu Oct  1 09:36:32 2015 us=146284 83.xx.xx.89:6821 TCPv4_SERVER WRITE
> [22] to [AF_INET]83.xx.xx.89:6821: P_ACK_V1 kid=0 [ 2 ]
> Thu Oct  1 09:36:32 2015 us=444922 83.xx.xx.89:6821 TCPv4_SERVER READ
> [22] from [AF_INET]83.xx.xx.89:6821: P_ACK_V1 kid=0 [ 24 ]
> Thu Oct  1 09:36:32 2015 us=444981 83.xx.xx.89:6821 TCPv4_SERVER WRITE
> [114] to [AF_INET]83.xx.xx.89:6821: P_CONTROL_V1 kid=0 [ ] pid=28 DATA
> len=100
> […]
>
>
> Server and client do seem to be communicating, yet, the server resets
> the connection. Or are we misinterpreting the ACKs we're seeing?
>
> We'd be grateful for any help or idea on what might be the cause of
> this. Unfortunately, we don't have physical access to the client, so we
> cannot, at least not at the current point in time, hard-reset the client
> device.
>
> Best regards,
> David Raison
>
>   
> ------------------------------------------------------------------------
>
> ------------------------------------------------------------------------------
>   
> ------------------------------------------------------------------------
>
> _______________________________________________
> Openvpn-users mailing list
> Openvpn-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openvpn-users
>   


------------------------------------------------------------------------------
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to