FS#50090 - [openvpn] version 2.3.11-2 fails to connect with long passwords (>128 chars)
Attached to Project:
Arch Linux
Opened by Giancarlo Razzolini (grazzolini) - Monday, 18 July 2016, 18:22 GMT
Last edited by Christian Hesse (eworm) - Friday, 23 September 2016, 13:26 GMT
Opened by Giancarlo Razzolini (grazzolini) - Monday, 18 July 2016, 18:22 GMT
Last edited by Christian Hesse (eworm) - Friday, 23 September 2016, 13:26 GMT
|
Details
Description:
Version 2.3.11-2 fails to establish any connection. The connections hang on the TLS negotiation phase, and fails after 60 seconds, the default timeout. Downgrading the package solve the issue. The only difference on the package is the enabling of pkcs11: https://git.archlinux.org/svntogit/packages.git/commit/trunk?h=packages/openvpn&id=d45bef7c0674e760f30cca45db1fad65c9568b1e Additional info: * version 2.3.11-2 Steps to reproduce: Try to establish any connection. |
This task depends upon
Closed by Christian Hesse (eworm)
Friday, 23 September 2016, 13:26 GMT
Reason for closing: Upstream
Additional comments about closing: Upstream (and remote ISP) issue.
Friday, 23 September 2016, 13:26 GMT
Reason for closing: Upstream
Additional comments about closing: Upstream (and remote ISP) issue.
Logs please...
edit: I've tried "If I remove the --enable-pkcs11 from the PKGBUILD and rebuild it, the issue goes away." but mine kept failing anyway. However the issue doesn't seem to be present on some AirVpn servers, I suspect the issue might be on their side.
And nobody has access to a server where connection failed, no?
Can you please increase verbosity to... let's try 4... and create two logs, one with successful connect, one with error?
I tried playing with link-mtu, tun-mtu and mssfix parameters, but it doesn't seem to be a PMTU issue. And, it happens with all PIA servers I have tested so far.
https://community.openvpn.net/openvpn/ticket/712
I will open a ticket support with them. They recently (very recently) beefed up their security after their russian servers were seized. They changed their CA's and CRL's, and also implemented stronger ciphers and certificates. It is possible that in this revamp, they changed something that interacts badly with PKCS#11.
So when you tested with a shorter password... You changed it on server and client side?
I suppose PIA runs a version with PKCS#11 support disabled, so only passwords up to 128 chars are used. To verify: Set a password with 256 chars on server and client side, try to connect... Should fail. Do not change the password on server but truncate it to 128 chars on client side. Does it connect?
I reopened the upstream bug report. Let's see what happens there...
Is the PIA support ticket still open? You could tell them to limit password length to 128 chars (and give an error otherwise).
Wait for upstream to fix and blame PIA (and others) to deploy a working version.
Closing for now.