On 22-04-15 20:11, jack seth wrote:
> Ok I have been doing some experiments and I can connect using 1 bit DH
> parameters. Any bigger than that up to at least 13824 I get the following
> 'modulus too large' error on the client log:
>
> TLS_ERROR: BIO read tls_read_plaintext error: error:050
o: xenoph...@godshell.com
> CC: janj...@nikhef.nl; openvpn-users@lists.sourceforge.net
> Subject: RE: [Openvpn-users] Testing with large keys
> Date: Thu, 1 Jan 2015 23:28:32 -0600
>
> Well now it timed out in less than 3 minutes. This is the server openvpn.log
>
> Thu
xenoph...@godshell.com
> To: bird_...@hotmail.com
> CC: janj...@nikhef.nl; openvpn-users@lists.sourceforge.net
> Subject: Re: [Openvpn-users] Testing with large keys
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> jack seth wrote:
> > Could possibly be that. I ran your c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
jack seth wrote:
> Could possibly be that. I ran your command below and I get 180
> also. Is there a way to temporarily disable it? Does this happen on
> TCP streams?
That would be for UDP streams. There are a number of parameters for tcp
connec
penvpn-users@lists.sourceforge.net
> Subject: Re: [Openvpn-users] Testing with large keys
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> jack seth wrote:
> > I have tried the 'hand-window' option. It works for the client
> > config but the server side still
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
jack seth wrote:
> I have tried the 'hand-window' option. It works for the client
> config but the server side still times out after about 3 minutes or
> (180 seconds). So it is something on the server side that needs to
> be disabled I think.
Are y
To: bird_...@hotmail.com; openvpn-users@lists.sourceforge.net
Subject: Re: [Openvpn-users] Testing with large keys
On 26/12/14 23:48, jack seth wrote:
I am trying to out my config using 16384 size
keys. I am using my working config except for subst
On 26/12/14 23:48, jack seth wrote:
I am trying to out my config using 16384 size keys. I am using my
working config except for substituting my large keys (still using the
same ta.key though). I am getting a 'inactivity timeout' from the
server after about 3 minutes during the TLS handshake.
Upon further testing the problem seem to be using DH parameters of 16384 size.
Can someone provide some guidance on how I can get the server to extend or
disable the inactivity timeout?
From: bird_...@hotmail.com
To: openvpn-users@lists.sourceforge.net
Subject: Testing with large keys
Date: Fr
I am trying to out my config using 16384 size keys. I am using my working
config except for substituting my large keys (still using the same ta.key
though). I am getting a 'inactivity timeout' from the server after about 3
minutes during the TLS handshake. I have read it will take longer to n
10 matches
Mail list logo