-
Notifications
You must be signed in to change notification settings - Fork 327
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSL routines:SSL_CTX_new:library has no ciphers #800
Comments
If the connection dies after 12 hours, I suspect this might be a FortiGate timeout (server side) in which case you cannot do anything about it. But then the question would be why the error message is totally unrelated. We need to clarify a few things:
My suggestion would be to test openfortivpn from a Linux machine. Does openfortivpn die too on Linux? If so does it emit the same cipher-related error messages? |
Correct. Last time it ran for about 18h successfully and then it died with this error message
I run Should I try without the
I do run it on Linux. |
Ah, you're right, I was actually thinking of testing on a desktop or laptop with CentOS or Ubuntu. OpenWRT is a special case, the libraries are minimal libraries with possibly important differences compared to desktop GNU/Linux machines. It's a question of libraries - not kernel. I believe there are two issues here:
I had always considered |
Oh, I thought it kept the 2FA session/token somehow. Does it not? If not, I agree it's useless. |
I understand you are using password authentication, so And you are correct again, in an ideal world openfortivpn should attempt to re-use the existing cookie before attempting a new round of authentication. It currently doesn't and I had opened issue #791 as an enhancement proposal. Anyway, the current implementation (with a new round of authentication) should work if your credentials are a username/password pair. Besides, as pointed out elsewhere the cookie would probably be invalid after a disconnection, especially after a server-side time out. |
Our VPN server is guarded by 2FA. So, when I run
|
OK, then I guess it is expected Even if Finally, the OpenSSL error message doesn't make much sense to me at this point. Perhaps there's an additional issue here, which might be caused by anything such as OpenSSL library mismatches. I really don't know:
The error message originates here, in ssl_connect(): The info message originates here, in run_tunnel(), just after ssl_connect() has failed: |
Please see the attached logs from
|
Initially openfortivpn seems to die upon:
That's a first issue that needs to be investigated. This is not necessarily an openfortivpn error. Then on the first attempt to reconnect after the above failure:
I suppose that's because openfortivpn does not implement the 2FA step. Can you confirm? This probably needs to be investigated and possibly fixed in openfortivpn. The above attempt is repeated 103 times, but the last attempts end differently:
and:
And then the next round goes wrong with the error message you had initially reported:
I suggest we do not investigate this for now. As I said it could be anything, perhaps even an internal OpenSSL error caused by the multiple failures above. |
Again I believe it would help if you could test from a GNU/Linux desktop machine and see if openfortivpn behaves differently. I have a gut feeling this could be related to an OpenSSL library mixup or some other issue with OpenWrt. |
I will try, but I can't promise when exactly. Thanks for your support. |
Reporting back, now without the
|
Still this error:
I suspect this is an OpenWRT issue. You really need to compare with a Linux machine. |
I never hit this issue on Darwin. Though, I haven't tried Linux. |
Is it possible that the server is attempting to re-handshake or re-negotiate the TLS session? Given this line ( |
Hi,
First of all, thank you for the openfortivpn project! Love it. Well done!
Now onto my question: My openfortivpn 1.15.0 (OpenWRT) VPN connection dies with the following error every day after running 12+ hours:
Do you folks have any suggestions how could I make this go away? How can I make sure I have "enough ciphers"?
--cipher-list=
argument, but it didn't help. I got the cipher fromopenssl s_client -connect MY-SERVER-ADDR:443
.--insecure-ssl
argument (I knew it was not the greatest idea) but it didn't help either.Any help appreciated. Thanks!
Vojtech
The text was updated successfully, but these errors were encountered: