Problem with establishing VPN connections with client

Tony Zhou tonytzhou at gmail.com
Thu Nov 14 13:12:39 EST 2013


I don't think the problem is from ipv6 since neither my box nor my phone 
has ipv6 connection. And ipv6 entries were commented out in the conf file.

I'm not quite sure about what does this log tell, does it look legit?

Nov 15 03:07:00 hostname ocserv[2861]: [client.ip.addr]:31328 passed UDP 
socket
Nov 15 03:07:00 hostname ocserv[2864]: [client.ip.addr]:31328 TCP MSS is 499
Nov 15 03:07:00 hostname ocserv[2864]: [client.ip.addr]:31328 reducing 
MTU due to TCP MSS to 470
Nov 15 03:07:00 hostname ocserv[2864]: [client.ip.addr]:31328 setting 
MTU to 470
Nov 15 03:07:00 hostname ocserv[2861]: [client.ip.addr]:31328 setting 
vpns0 MTU to 469
Nov 15 03:07:00 hostname ocserv[2864]: [client.ip.addr]:31328 received 
new UDP fd and connected to peer
Nov 15 03:07:00 hostname ocserv[2864]: [client.ip.addr]:31328 setting up 
DTLS connection
Nov 15 03:07:00 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Allocating epoch #0
Nov 15 03:07:00 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_constate.c:581
Nov 15 03:07:00 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Allocating epoch #1
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_buffers.c:1022
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: SSL 1.0 
Handshake packet received. Epoch 0, length: 101
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Expected Packet Handshake(22)
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Received Packet Handshake(22) with length: 101
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Decrypted Packet[0.0] Handshake(22) with length: 101
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: HSK[0x8919a00]: CLIENT 
HELLO (1) was received. Length 89[89], frag offset 0, frag length: 89, 
sequence: 0
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: HSK[0x8919a00]: 
Client's version: 1.0
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: EXT[0x8919a00]: Found 
extension 'STATUS REQUEST/5'
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: EXT[0x8919a00]: Parsing 
extension 'SESSION TICKET/35' (0 bytes)
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
safe_renegotiation.c:100
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
safe_renegotiation.c:374
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: HSK[0x8919a00]: 
SessionID: session-id
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: HSK[0x8919a00]: SERVER 
HELLO was queued [82 bytes]
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: REC[0x8919a00]: Sent 
ChangeCipherSpec
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: INT: PREMASTER 
SECRET[48]: premaster-secret
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: INT: CLIENT RANDOM[32]: 
client-random
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: INT: SERVER RANDOM[32]: 
server-random
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: INT: MASTER SECRET: 
master-secret
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Initializing epoch #1
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: INT: KEY BLOCK[104]: 
key-block
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: INT: CLIENT WRITE KEY 
[16]: client-write-key
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: INT: SERVER WRITE KEY 
[16]: server-write-key
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: Epoch 
#1 ready
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: HSK[0x8919a00]: Cipher 
Suite: RSA_AES_128_CBC_SHA1
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: HSK[0x8919a00]: 
Initializing internal [write] cipher sessions
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: HSK[0x8919a00]: 
recording tls-unique CB (send)
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<3>]: HSK[0x8919a00]: 
FINISHED was queued [24 bytes]
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<6>]: DTLS[0x8919a00]: Start 
of flight transmission.
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<6>]: DTLS[0x8919a00]: 
Sending Packet[0] fragment SERVER HELLO(2) with length: 70, offset: 0, 
fragment length: 70
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Preparing Packet Handshake(22) with length: 82 and target length: 82
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: ENC[0x8919a00]: cipher: 
NULL, MAC: MAC-NULL, Epoch: 0
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: Sent 
Packet[1] Handshake(22) in epoch 0 and length: 95
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<6>]: DTLS[0x8919a00]: 
Sending Packet[1] fragment CHANGE CIPHER SPEC(254)
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Preparing Packet ChangeCipherSpec(20) with length: 3 and target length: 3
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: ENC[0x8919a00]: cipher: 
NULL, MAC: MAC-NULL, Epoch: 0
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: Sent 
Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 16
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<6>]: DTLS[0x8919a00]: 
Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, 
fragment length: 12
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: 
Preparing Packet Handshake(22) with length: 24 and target length: 24
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<9>]: ENC[0x8919a00]: cipher: 
AES-128-CBC, MAC: SHA1, Epoch: 1
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: mac.c:253
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<4>]: REC[0x8919a00]: Sent 
Packet[1] Handshake(22) in epoch 1 and length: 77
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_buffers.c:171
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_buffers.c:511
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_record.c:1046
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_record.c:1158
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_record.c:1295
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_record.c:1388
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_handshake.c:2996
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_buffers.c:515
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_record.c:1046
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_record.c:1158
Nov 15 03:07:01 hostname ocserv[2864]: TLS[<2>]: ASSERT: 
gnutls_record.c:1388
Nov 15 03:07:01 hostname ocserv[2864]: [client.ip.addr]:31328 received 
-110 byte(s) (TLS)
Nov 15 03:07:01 hostname ocserv[2864]: GnuTLS error (at 
worker-vpn.c:1161): The TLS connection was non-properly terminated.

Thanks,
TZ


On 11/14/2013 12:13 PM, Nikos Mavrogiannopoulos wrote:
> On Thu, 2013-11-14 at 11:19 -0500, Tony Zhou wrote:
>> Hi Nikos,
>> SmoothConnect is based on Openconnect (as it claims), so I guess it
>> behaves similarly... It prompts in client log after connected:
>> Connected (null) as 192.168.1.1+ipv6 addr, using SSL
>> Error: opening vpnc socket
>
> I downloaded that smoothconnect app, and I could connect to ocserv with
> the default sample.conf included in the distribution. You could start
> with that and find out which option smoothconnect doesn't like (could it
> be ipv6?).
>
> regards,
> Nikos
>
>



More information about the openconnect-devel mailing list