Re: [Openvpn-users] Testing with large keys

2015-04-23 Thread Steffan Karger
On 22-04-15 20:11, jack seth wrote: > Ok I have been doing some experiments and I can connect using 1 bit DH > parameters. Any bigger than that up to at least 13824 I get the following > 'modulus too large' error on the client log: > > TLS_ERROR: BIO read tls_read_plaintext error: error:050

Re: [Openvpn-users] Testing with large keys

2015-04-22 Thread jack seth
o: xenoph...@godshell.com > CC: janj...@nikhef.nl; openvpn-users@lists.sourceforge.net > Subject: RE: [Openvpn-users] Testing with large keys > Date: Thu, 1 Jan 2015 23:28:32 -0600 > > Well now it timed out in less than 3 minutes. This is the server openvpn.log > > Thu

Re: [Openvpn-users] Testing with large keys

2015-01-01 Thread jack seth
xenoph...@godshell.com > To: bird_...@hotmail.com > CC: janj...@nikhef.nl; openvpn-users@lists.sourceforge.net > Subject: Re: [Openvpn-users] Testing with large keys > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > jack seth wrote: > > Could possibly be that. I ran your c

Re: [Openvpn-users] Testing with large keys

2015-01-01 Thread Jason Frisvold
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 jack seth wrote: > Could possibly be that. I ran your command below and I get 180 > also. Is there a way to temporarily disable it? Does this happen on > TCP streams? That would be for UDP streams. There are a number of parameters for tcp connec

Re: [Openvpn-users] Testing with large keys

2015-01-01 Thread jack seth
penvpn-users@lists.sourceforge.net > Subject: Re: [Openvpn-users] Testing with large keys > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > jack seth wrote: > > I have tried the 'hand-window' option. It works for the client > > config but the server side still

Re: [Openvpn-users] Testing with large keys

2015-01-01 Thread Jason Frisvold
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 jack seth wrote: > I have tried the 'hand-window' option. It works for the client > config but the server side still times out after about 3 minutes or > (180 seconds). So it is something on the server side that needs to > be disabled I think. Are y

Re: [Openvpn-users] Testing with large keys

2015-01-01 Thread jack seth
To: bird_...@hotmail.com; openvpn-users@lists.sourceforge.net Subject: Re: [Openvpn-users] Testing with large keys On 26/12/14 23:48, jack seth wrote: I am trying to out my config using 16384 size keys. I am using my working config except for subst

Re: [Openvpn-users] Testing with large keys

2015-01-01 Thread Jan Just Keijser
On 26/12/14 23:48, jack seth wrote: I am trying to out my config using 16384 size keys. I am using my working config except for substituting my large keys (still using the same ta.key though). I am getting a 'inactivity timeout' from the server after about 3 minutes during the TLS handshake.

Re: [Openvpn-users] Testing with large keys

2014-12-31 Thread jack seth
Upon further testing the problem seem to be using DH parameters of 16384 size. Can someone provide some guidance on how I can get the server to extend or disable the inactivity timeout? From: bird_...@hotmail.com To: openvpn-users@lists.sourceforge.net Subject: Testing with large keys Date: Fr

[Openvpn-users] Testing with large keys

2014-12-26 Thread jack seth
I am trying to out my config using 16384 size keys. I am using my working config except for substituting my large keys (still using the same ta.key though). I am getting a 'inactivity timeout' from the server after about 3 minutes during the TLS handshake. I have read it will take longer to n