Jump to content
  • 0

OpenVPN problem


newvier21

Question

Hello everyone! I need help with OpenVPN.
Problem is going about 2-3 weeks since trying to make OpenVPN work properly on Keenetic and Mikrotik
Once OpenVPN isn't working because off "TLS Error: TLS handshake failed" i trying to fix that with guides that i ever can find.
After that OpenVPN on Keenitc can't connect and appear even more failure:

  • VERIFY ERROR: depth=0, error=unsupported certificate purpose: C=XX, O=XX, OU=IT, CN=ca
  • OpenSSL: error:1416F086:lib(20):func(367):reason(134)
  • TLS_ERROR: BIO read tls_read_plaintext error
  • TLS Error: TLS object -> incoming plaintext read error
  • TLS Error: TLS handshake failed
  • Fatal TLS error (check_tls_errors_co), restarting
  • Service: "OpenVPN0": unexpectedly stopped.

Here is the configuration on Keenetic

  • client
  • dev tun
  • proto tcp
  • remote 9X.XXX.XXX.XXX 1194
  • nobind
  • persist-key
  • persist-tun
  • <ca>
  • -----BEGIN CERTIFICATE-----
  • XXX
  • -----END CERTIFICATE-----
  • </cert>
  • <key>
  • -----BEGIN ENCRYPTED PRIVATE KEY-----
  • XXXX
  • -----END ENCRYPTED PRIVATE KEY-----
  • </key>
  • <auth-user-pass>
  • username
  • password
  • </auth-user-pass>
  • remote-cert-tls server
  • verb 3

Does it even possible to make Mikrotic and Keenetic working properly with each other?
I hope i described my problem normaly and can get help with that problem

P.S.Configuration was taken from: https://habr.com/ru/post/269679/
(2tun)

Edited by newvier21
Link to comment
Share on other sites

1 answer to this question

Recommended Posts

  • 0

if it help you.

This is my configs:

client(Keenetic):

Spoiler

dev tun
proto udp
remote ***.***.***.*** ????
client
resolv-retry infinite
remote-cert-tls server
auth SHA256
auth-nocache
cipher AES-256-CBC
data-ciphers AES-256-CBC
persist-key
persist-tun
nobind
comp-lzo
verb 3
<ca>
-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----

-----END PRIVATE KEY-----
</key>
<tls-crypt>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----

-----END OpenVPN Static key V1-----
</tls-crypt>

server (Centos7):

Spoiler

port ????
proto udp 
dev tun

crl-verify /etc/openvpn/server/crl.pem # my revoked certs list # real revoked certs list /etc/openvpn/keys/easyrsa/pki/crl.pem

sndbuf 393216
rcvbuf 393216
push "sndbuf 393216"
push "rcvbuf 393216"

ca /etc/openvpn/server/ca.crt
cert /etc/openvpn/server/ASvps.crt
key /etc/openvpn/server/ASvps.key
dh /etc/openvpn/server/dh.pem

auth SHA256 
cipher AES-256-CBC 
tls-version-min 1.2 
tls-crypt tc.key 

server ***.***.***.0 255.255.255.0 
topology subnet

local ***.***.***.*** # Internet server IP

ifconfig-pool-persist ipp.txt #  clinet - ip
client-to-client # 
client-config-dir /etc/openvpn/ccd 

keepalive 10 120
comp-lzo 
explicit-exit-notify 1 # if tcp, change for "0"
persist-key
persist-tun
status /var/log/openvpn/openvpn-status.log
log /var/log/openvpn/openvpn.log
user nobody
group nobody

verb 3

 

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Answer this question...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...