OpenVPN Firmware Bug

HI Teltonika team,

I think you have another bug in the new firmware.

With the new firmware 7.6.13 and 7.6.16 my OpenVPN tunnels no longer work.

OpenVPN - Client:
The Additional HMAC authentication field is no longer there.

It is therefore no longer possible to enter a key. ----> see image

After the firmware update the tunnel no longer worked.
I cannot say whether it is just because of the missing Additional HMAC authentication.

Last Firmware that work ist 7.06

Can you check and fix the firmware.

Hi jonjon,

Please make sure to revert to Advanced Mode to see additional settings in OpenVPN.

Let me know if this helps.

Regards,

@ Janmiguel

sorry my mistakt but in Firmware 6.13 and 6.16 not work.

after firmware update i get the error:

Wed Oct  9 11:58:54 2024 daemon.warn openvpn(sfsff)[17315]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Oct  9 11:58:54 2024 daemon.notice openvpn(sfsff)[17315]: SIGUSR1[soft,private-key-password-failure] received, process restarting
Wed Oct  9 11:58:54 2024 daemon.notice openvpn(sfsff)[17315]: Restart pause, 10 second(s)

if i create an new configuration and safe - i get the error:

Client key is encrypted, please enter decryption password

when i downgrade the firmware to 7.06 all works fine.

i use CA, Client-CA and Cline-Key, NO PASSWORD

i think you have an bug in the firmware.

Hi,

Can you try to generate new certificates and let me know if it works? I have a RUT955 here running on 7.16 FW and OpenVPN works as expected.

Regards,

@ Janmiguel

ok created all new but wont work:

the VPN start, but the state is disconnected, no uptime,
ping is not possible

if i downgrade to 7.6 all works fine

Wed Oct  9 16:11:32 2024 daemon.warn openvpn(sfsff)[8293]: Multiple --down scripts defined.  The previously configured script is overridden.
Wed Oct  9 16:11:32 2024 daemon.warn openvpn(sfsff)[8293]: Multiple --up scripts defined.  The previously configured script is overridden.
Wed Oct  9 16:11:32 2024 daemon.notice openvpn(sfsff)[8293]: OpenVPN 2.5.3 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Oct  9 16:11:32 2024 daemon.notice openvpn(sfsff)[8293]: library versions: OpenSSL 3.0.12 24 Oct 2023, LZO 2.10
Wed Oct  9 16:11:32 2024 daemon.warn openvpn(sfsff)[8293]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxxxxxxxxx
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: UDP link local: (not bound)
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: UDP link remote: [AF_INET]xxxxxxxxxxxxx
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: TLS: Initial packet from [AF_INET]xxxxxxxxxxx, sid=5b03592a 0a32ff21
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: VERIFY OK: depth=1, CN=xxxxxxxxxxxxxxxxxxxxx
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: VERIFY KU OK
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: Validating certificate extended key usage
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: VERIFY EKU OK
Wed Oct  9 16:11:33 2024 daemon.notice openvpn(sfsff)[8293]: VERIFY OK: depth=0, CN=xxxxxxxxxxx
Wed Oct  9 16:11:34 2024 daemon.notice openvpn(sfsff)[8293]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 384 bit EC, curve secp384r1, signature: ecdsa-with-SHA512
Wed Oct  9 16:11:34 2024 daemon.notice openvpn(sfsff)[8293]: [vpn-2024] Peer Connection Initiated with [AF_INET]xxxxxxxxxxxxxxxxxxxxx
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: SENT CONTROL [vpn-2024]: 'PUSH_REQUEST' (status=1)
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: PUSH: Received control message: 'PUSH_REPLY,route-gateway xxxxxxxxxx,topology subnet,ping 40,ping-restart 100,ifconfig xxxxxxxxxxx 255.255.0.0,peer-id 101,cipher AES-256-GCM'
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: OPTIONS IMPORT: timers and/or timeouts modified
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: OPTIONS IMPORT: --ifconfig/up options modified
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: OPTIONS IMPORT: route-related options modified
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: OPTIONS IMPORT: peer-id set
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: OPTIONS IMPORT: adjusting link_mtu to 1624
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: OPTIONS IMPORT: data channel crypto options modified
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: TUN/TAP device tun_c_sfsff opened
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: net_iface_mtu_set: mtu 1500 for tun_c_sfsff
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: net_iface_up: set tun_c_sfsff up
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: net_addr_v4_add: xxxxxxxxxx/16 dev tun_c_sfsff
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: /etc/openvpn/updown.sh tun_c_sfsff 1500 1624 xxxxxxxxxxxx 255.255.0.0 init
Wed Oct  9 16:11:35 2024 daemon.notice openvpn(sfsff)[8293]: Initialization Sequence Completed
Wed Oct  9 16:14:30 2024 daemon.err openvpn(sfsff)[8293]: event_wait : Interrupted system call (code=4)
Wed Oct  9 16:14:30 2024 daemon.notice openvpn(sfsff)[8293]: Closing TUN/TAP interface

Hi, not sure if this is the issue here but a newer version of openvpn is more strict in certs. I’ve been bitten by that upgrading. Forgot the details but give it a try:

openvpn add to client config: tls-cipher “DEFAULT:@SECLEVEL=0”

possibly this will work? Then read in openvpn manuals what is the issue and repair, they have a reason to no longer support weaks certs.

This topic was automatically closed after 15 days. New replies are no longer allowed.