No connection (openvpn)

When I run the command openvpn xxxx.ovpn, I get this as a result:
Tue Feb 6 16:41:05 2018 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 10 2017
Tue Feb 6 16:41:05 2018 library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08
Tue Feb 6 16:41:05 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Feb 6 16:41:05 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Feb 6 16:41:05 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]88.198.233.171:1337
Tue Feb 6 16:41:05 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Feb 6 16:41:05 2018 UDP link local: (not bound)
Tue Feb 6 16:41:05 2018 UDP link remote: [AF_INET]88.198.233.171:1337
Tue Feb 6 16:41:05 2018 TLS: Initial packet from [AF_INET]88.198.233.171:1337, sid=648067fb 8ea0e5bd
Tue Feb 6 16:41:05 2018 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected]
Tue Feb 6 16:41:05 2018 VERIFY KU OK
Tue Feb 6 16:41:05 2018 Validating certificate extended key usage
Tue Feb 6 16:41:05 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Feb 6 16:41:05 2018 VERIFY EKU OK
Tue Feb 6 16:41:05 2018 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected]
Tue Feb 6 16:42:05 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Feb 6 16:42:05 2018 TLS Error: TLS handshake failed
Tue Feb 6 16:42:05 2018 SIGUSR1[soft,tls-error] received, process restarting
Tue Feb 6 16:42:05 2018 Restart pause, 5 second(s)
Tue Feb 6 16:42:10 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]88.198.233.171:1337
Tue Feb 6 16:42:10 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Feb 6 16:42:10 2018 UDP link local: (not bound)
Tue Feb 6 16:42:10 2018 UDP link remote: [AF_INET]88.198.233.171:1337
Tue Feb 6 16:42:10 2018 TLS: Initial packet from [AF_INET]88.198.233.171:1337, sid=02712654 4cf7fe4d
Tue Feb 6 16:42:13 2018 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected]
Tue Feb 6 16:42:13 2018 VERIFY KU OK
Tue Feb 6 16:42:13 2018 Validating certificate extended key usage
Tue Feb 6 16:42:13 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Feb 6 16:42:13 2018 VERIFY EKU OK
Tue Feb 6 16:42:13 2018 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected]
Tue Feb 6 16:43:10 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Feb 6 16:43:10 2018 TLS Error: TLS handshake failed
Tue Feb 6 16:43:10 2018 SIGUSR1[soft,tls-error] received, process restarting
Tue Feb 6 16:43:10 2018 Restart pause, 5 second(s)
Tue Feb 6 16:43:15 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]88.198.233.171:1337
Tue Feb 6 16:43:15 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Feb 6 16:43:15 2018 UDP link local: (not bound)
Tue Feb 6 16:43:15 2018 UDP link remote: [AF_INET]88.198.233.171:1337
Tue Feb 6 16:43:15 2018 TLS: Initial packet from [AF_INET]88.198.233.171:1337, sid=690ef0f3 9b2b8671
Tue Feb 6 16:43:17 2018 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected]
Tue Feb 6 16:43:17 2018 VERIFY KU OK
Tue Feb 6 16:43:17 2018 Validating certificate extended key usage
Tue Feb 6 16:43:17 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Feb 6 16:43:17 2018 VERIFY EKU OK
Tue Feb 6 16:43:17 2018 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected]
Tue Feb 6 16:44:15 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Feb 6 16:44:15 2018 TLS Error: TLS handshake failed
Tue Feb 6 16:44:15 2018 SIGUSR1[soft,tls-error] received, process restarting
Tue Feb 6 16:44:15 2018 Restart pause, 5 second(s)
Tue Feb 6 16:44:20 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]88.198.233.171:1337
Tue Feb 6 16:44:20 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Feb 6 16:44:20 2018 UDP link local: (not bound)
Tue Feb 6 16:44:20 2018 UDP link remote: [AF_INET]88.198.233.171:1337
Tue Feb 6 16:44:20 2018 TLS: Initial packet from [AF_INET]88.198.233.171:1337, sid=e1bd0be1 5300e245

Anyone else having the same problem?

Tagged:

Comments

  • Didn't have the same problem, exactly, but it was very similar. I used:
    sudo openvpn --config .ovpn
    Maybe it helps??

  • same problem occurs any solution

  • This is just a note for anyone else that reads this:

    I did this and I got my vpn to connect again:

    pull-filter ignore "route-ipv6"
    pull-filter ignore "ifconfig-ipv6"

  • @sysDom I tried adding those lines to my .ovpn but am still getting the TLS timeout. Does it matter where you put those commands? I tried both TCP and UDP.

  • what happens if you generate a new one ?

    peek

Sign In to comment.