One client keeps getting timeout error

Need help configuring your VPN? Just post here and you'll get that help.
Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

One client keeps getting timeout error

Post by mafiaboy01 » Sun Oct 21, 2018 7:00 pm

I'm trying to connect a computer to my Asus ac87 using OpenVPN but running into some issues. One of my computers keeps disconnecting form the VPN connection giving me error:

Inactivity timeout (--ping-restart), restarting

It'll connected for about 30 seconds then lose connection.

I've tested on another computer on the same network and it has no issues keeping a connection with the same settings. The client is running on a Windows Server 2012r2 machine. I feel like its maybe a problem with the TAP adapter but I'm not sure.

Client settings

Code: Select all

client
dev tap
# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel
# if you have more than one.  On XP SP2,
# you may need to disable the firewall
# for the TAP adapter.
;dev-node MyTap
proto udp
remote xxx.xxx.xxx.xxx 1194
float
ncp-ciphers AES-128-GCM:AES-256-GCM:AES-128-CBC:AES-256-CBC
cipher AES-128-CBC
auth SHA1
comp-lzo adaptive
keepalive 15 60
auth-user-pass
remote-cert-tls server
<ca>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</ca>
resolv-retry infinite
nobind
verb 4

The computer is running Windows Server 2012R2, I've tried turning the firewall on and off but nothing seems to make any difference.

Here are the logs

Client

Code: Select all

Sun Oct 21 14:46:12 2018 us=240379 Current Parameter Settings:
Sun Oct 21 14:46:12 2018 us=240379   config = 'Condo.ovpn'
Sun Oct 21 14:46:12 2018 us=240379   mode = 0
Sun Oct 21 14:46:12 2018 us=240379   show_ciphers = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   show_digests = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   show_engines = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   genkey = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   key_pass_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   show_tls_ciphers = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   connect_retry_max = 0
Sun Oct 21 14:46:12 2018 us=240379 Connection profiles [0]:
Sun Oct 21 14:46:12 2018 us=240379   proto = udp
Sun Oct 21 14:46:12 2018 us=240379   local = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   local_port = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   remote = 'xxx..xxx.xxx.xxx'
Sun Oct 21 14:46:12 2018 us=240379   remote_port = '1194'
Sun Oct 21 14:46:12 2018 us=240379   remote_float = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   bind_defined = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   bind_local = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   bind_ipv6_only = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   connect_retry_seconds = 5
Sun Oct 21 14:46:12 2018 us=240379   connect_timeout = 120
Sun Oct 21 14:46:12 2018 us=240379   socks_proxy_server = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   socks_proxy_port = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   tun_mtu = 1500
Sun Oct 21 14:46:12 2018 us=240379   tun_mtu_defined = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   link_mtu = 1500
Sun Oct 21 14:46:12 2018 us=240379   link_mtu_defined = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   tun_mtu_extra = 32
Sun Oct 21 14:46:12 2018 us=240379   tun_mtu_extra_defined = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   mtu_discover_type = -1
Sun Oct 21 14:46:12 2018 us=240379   fragment = 0
Sun Oct 21 14:46:12 2018 us=240379   mssfix = 1450
Sun Oct 21 14:46:12 2018 us=240379   explicit_exit_notification = 0
Sun Oct 21 14:46:12 2018 us=240379 Connection profiles END
Sun Oct 21 14:46:12 2018 us=240379   remote_random = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   ipchange = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   dev = 'tap'
Sun Oct 21 14:46:12 2018 us=240379   dev_type = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   dev_node = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   lladdr = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   topology = 1
Sun Oct 21 14:46:12 2018 us=240379   ifconfig_local = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   ifconfig_remote_netmask = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   ifconfig_noexec = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   ifconfig_nowarn = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   ifconfig_ipv6_local = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   ifconfig_ipv6_netbits = 0
Sun Oct 21 14:46:12 2018 us=240379   ifconfig_ipv6_remote = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   shaper = 0
Sun Oct 21 14:46:12 2018 us=240379   mtu_test = 0
Sun Oct 21 14:46:12 2018 us=240379   mlock = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   keepalive_ping = 15
Sun Oct 21 14:46:12 2018 us=240379   keepalive_timeout = 60
Sun Oct 21 14:46:12 2018 us=240379   inactivity_timeout = 0
Sun Oct 21 14:46:12 2018 us=240379   ping_send_timeout = 15
Sun Oct 21 14:46:12 2018 us=240379   ping_rec_timeout = 60
Sun Oct 21 14:46:12 2018 us=240379   ping_rec_timeout_action = 2
Sun Oct 21 14:46:12 2018 us=240379   ping_timer_remote = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   remap_sigusr1 = 0
Sun Oct 21 14:46:12 2018 us=240379   persist_tun = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   persist_local_ip = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   persist_remote_ip = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   persist_key = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   passtos = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   resolve_retry_seconds = 1000000000
Sun Oct 21 14:46:12 2018 us=240379   resolve_in_advance = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   username = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   groupname = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   chroot_dir = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   cd_dir = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   writepid = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   up_script = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   down_script = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   down_pre = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   up_restart = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   up_delay = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   daemon = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   inetd = 0
Sun Oct 21 14:46:12 2018 us=240379   log = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   suppress_timestamps = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   machine_readable_output = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   nice = 0
Sun Oct 21 14:46:12 2018 us=240379   verbosity = 4
Sun Oct 21 14:46:12 2018 us=240379   mute = 0
Sun Oct 21 14:46:12 2018 us=240379   gremlin = 0
Sun Oct 21 14:46:12 2018 us=240379   status_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   status_file_version = 1
Sun Oct 21 14:46:12 2018 us=240379   status_file_update_freq = 60
Sun Oct 21 14:46:12 2018 us=240379   occ = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   rcvbuf = 0
Sun Oct 21 14:46:12 2018 us=240379   sndbuf = 0
Sun Oct 21 14:46:12 2018 us=240379   sockflags = 0
Sun Oct 21 14:46:12 2018 us=240379   fast_io = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   comp.alg = 2
Sun Oct 21 14:46:12 2018 us=240379   comp.flags = 1
Sun Oct 21 14:46:12 2018 us=240379   route_script = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   route_default_gateway = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   route_default_metric = 0
Sun Oct 21 14:46:12 2018 us=240379   route_noexec = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   route_delay = 5
Sun Oct 21 14:46:12 2018 us=240379   route_delay_window = 30
Sun Oct 21 14:46:12 2018 us=240379   route_delay_defined = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   route_nopull = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   route_gateway_via_dhcp = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   allow_pull_fqdn = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   management_addr = '127.0.0.1'
Sun Oct 21 14:46:12 2018 us=240379   management_port = '25340'
Sun Oct 21 14:46:12 2018 us=240379   management_user_pass = 'stdin'
Sun Oct 21 14:46:12 2018 us=240379   management_log_history_cache = 250
Sun Oct 21 14:46:12 2018 us=240379   management_echo_buffer_size = 100
Sun Oct 21 14:46:12 2018 us=240379   management_write_peer_info_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   management_client_user = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   management_client_group = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   management_flags = 6
Sun Oct 21 14:46:12 2018 us=240379   shared_secret_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   key_direction = not set
Sun Oct 21 14:46:12 2018 us=240379   ciphername = 'AES-128-CBC'
Sun Oct 21 14:46:12 2018 us=240379   ncp_enabled = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   ncp_ciphers = 'AES-128-GCM:AES-256-GCM:AES-128-CBC:AES-256-CBC'
Sun Oct 21 14:46:12 2018 us=240379   authname = 'SHA1'
Sun Oct 21 14:46:12 2018 us=240379   prng_hash = 'SHA1'
Sun Oct 21 14:46:12 2018 us=240379   prng_nonce_secret_len = 16
Sun Oct 21 14:46:12 2018 us=240379   keysize = 0
Sun Oct 21 14:46:12 2018 us=240379   engine = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   replay = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   mute_replay_warnings = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   replay_window = 64
Sun Oct 21 14:46:12 2018 us=240379   replay_time = 15
Sun Oct 21 14:46:12 2018 us=240379   packet_id_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   use_iv = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   test_crypto = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   tls_server = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   tls_client = ENABLED
Sun Oct 21 14:46:12 2018 us=240379   key_method = 2
Sun Oct 21 14:46:12 2018 us=240379   ca_file = '[[INLINE]]'
Sun Oct 21 14:46:12 2018 us=240379   ca_path = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   dh_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   cert_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   extra_certs_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   priv_key_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   pkcs12_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   cryptoapi_cert = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   cipher_list = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   tls_cert_profile = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   tls_verify = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   tls_export_cert = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   verify_x509_type = 0
Sun Oct 21 14:46:12 2018 us=240379   verify_x509_name = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   crl_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   ns_cert_type = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 65535
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_ku[i] = 0
Sun Oct 21 14:46:12 2018 us=240379   remote_cert_eku = 'TLS Web Server Authentication'
Sun Oct 21 14:46:12 2018 us=240379   ssl_flags = 0
Sun Oct 21 14:46:12 2018 us=240379   tls_timeout = 2
Sun Oct 21 14:46:12 2018 us=240379   renegotiate_bytes = -1
Sun Oct 21 14:46:12 2018 us=240379   renegotiate_packets = 0
Sun Oct 21 14:46:12 2018 us=240379   renegotiate_seconds = 3600
Sun Oct 21 14:46:12 2018 us=240379   handshake_window = 60
Sun Oct 21 14:46:12 2018 us=240379   transition_window = 3600
Sun Oct 21 14:46:12 2018 us=240379   single_session = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   push_peer_info = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   tls_exit = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   tls_auth_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   tls_crypt_file = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_protected_authentication = DISABLED
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=240379   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_private_mode = 00000000
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_cert_private = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_pin_cache_period = -1
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_id = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   pkcs11_id_management = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   server_network = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   server_netmask = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   server_network_ipv6 = ::
Sun Oct 21 14:46:12 2018 us=256003   server_netbits_ipv6 = 0
Sun Oct 21 14:46:12 2018 us=256003   server_bridge_ip = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   server_bridge_netmask = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   server_bridge_pool_start = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   server_bridge_pool_end = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_pool_defined = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_pool_start = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_pool_end = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_pool_netmask = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_pool_persist_filename = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_pool_persist_refresh_freq = 600
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_ipv6_pool_defined = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_ipv6_pool_base = ::
Sun Oct 21 14:46:12 2018 us=256003   ifconfig_ipv6_pool_netbits = 0
Sun Oct 21 14:46:12 2018 us=256003   n_bcast_buf = 256
Sun Oct 21 14:46:12 2018 us=256003   tcp_queue_limit = 64
Sun Oct 21 14:46:12 2018 us=256003   real_hash_size = 256
Sun Oct 21 14:46:12 2018 us=256003   virtual_hash_size = 256
Sun Oct 21 14:46:12 2018 us=256003   client_connect_script = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   learn_address_script = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   client_disconnect_script = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   client_config_dir = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   ccd_exclusive = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   tmp_dir = 'C:\Users\ADMINI~1\AppData\Local\Temp\2\'
Sun Oct 21 14:46:12 2018 us=256003   push_ifconfig_defined = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   push_ifconfig_local = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   push_ifconfig_remote_netmask = 0.0.0.0
Sun Oct 21 14:46:12 2018 us=256003   push_ifconfig_ipv6_defined = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   push_ifconfig_ipv6_local = ::/0
Sun Oct 21 14:46:12 2018 us=256003   push_ifconfig_ipv6_remote = ::
Sun Oct 21 14:46:12 2018 us=256003   enable_c2c = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   duplicate_cn = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   cf_max = 0
Sun Oct 21 14:46:12 2018 us=256003   cf_per = 0
Sun Oct 21 14:46:12 2018 us=256003   max_clients = 1024
Sun Oct 21 14:46:12 2018 us=256003   max_routes_per_client = 256
Sun Oct 21 14:46:12 2018 us=256003   auth_user_pass_verify_script = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   auth_user_pass_verify_script_via_file = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   auth_token_generate = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   auth_token_lifetime = 0
Sun Oct 21 14:46:12 2018 us=256003   client = ENABLED
Sun Oct 21 14:46:12 2018 us=256003   pull = ENABLED
Sun Oct 21 14:46:12 2018 us=256003   auth_user_pass_file = 'stdin'
Sun Oct 21 14:46:12 2018 us=256003   show_net_up = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   route_method = 0
Sun Oct 21 14:46:12 2018 us=256003   block_outside_dns = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   ip_win32_defined = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   ip_win32_type = 3
Sun Oct 21 14:46:12 2018 us=256003   dhcp_masq_offset = 0
Sun Oct 21 14:46:12 2018 us=256003   dhcp_lease_time = 31536000
Sun Oct 21 14:46:12 2018 us=256003   tap_sleep = 0
Sun Oct 21 14:46:12 2018 us=256003   dhcp_options = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   dhcp_renew = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   dhcp_pre_release = DISABLED
Sun Oct 21 14:46:12 2018 us=256003   domain = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   netbios_scope = '[UNDEF]'
Sun Oct 21 14:46:12 2018 us=256003   netbios_node_type = 0
Sun Oct 21 14:46:12 2018 us=256003   disable_nbt = DISABLED
Sun Oct 21 14:46:12 2018 us=256003 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Sun Oct 21 14:46:12 2018 us=256003 Windows version 6.2 (Windows 8 or greater) 64bit
Sun Oct 21 14:46:12 2018 us=256003 library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
Enter Management Password:
Sun Oct 21 14:46:12 2018 us=256003 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sun Oct 21 14:46:12 2018 us=256003 Need hold release from management interface, waiting...
Sun Oct 21 14:46:12 2018 us=709144 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sun Oct 21 14:46:12 2018 us=818522 MANAGEMENT: CMD 'state on'
Sun Oct 21 14:46:12 2018 us=818522 MANAGEMENT: CMD 'log all on'
Sun Oct 21 14:46:13 2018 us=177914 MANAGEMENT: CMD 'echo all on'
Sun Oct 21 14:46:13 2018 us=177914 MANAGEMENT: CMD 'bytecount 5'
Sun Oct 21 14:46:13 2018 us=177914 MANAGEMENT: CMD 'hold off'
Sun Oct 21 14:46:13 2018 us=193537 MANAGEMENT: CMD 'hold release'
Sun Oct 21 14:46:14 2018 us=193586 MANAGEMENT: CMD 'username "Auth" "test"'
Sun Oct 21 14:46:14 2018 us=209205 MANAGEMENT: CMD 'password [...]'
Sun Oct 21 14:46:14 2018 us=209205 LZO compression initializing
Sun Oct 21 14:46:14 2018 us=209205 Control Channel MTU parms [ L:1654 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sun Oct 21 14:46:14 2018 us=209205 MANAGEMENT: >STATE:1540147574,RESOLVE,,,,,,
Sun Oct 21 14:46:14 2018 us=474843 Data Channel MTU parms [ L:1654 D:1450 EF:122 EB:411 ET:32 EL:3 ]
Sun Oct 21 14:46:14 2018 us=474843 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1590,tun-mtu 1532,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Sun Oct 21 14:46:14 2018 us=474843 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1590,tun-mtu 1532,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Sun Oct 21 14:46:14 2018 us=474843 TCP/UDP: Preserving recently used remote address: [AF_INET]76.69.37.18:1194
Sun Oct 21 14:46:14 2018 us=474843 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Oct 21 14:46:14 2018 us=474843 UDP link local: (not bound)
Sun Oct 21 14:46:14 2018 us=474843 UDP link remote: [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Oct 21 14:46:14 2018 us=474843 MANAGEMENT: >STATE:1540147574,WAIT,,,,,,
Sun Oct 21 14:46:14 2018 us=490466 MANAGEMENT: >STATE:1540147574,AUTH,,,,,,
Sun Oct 21 14:46:14 2018 us=490466 TLS: Initial packet from [AF_INET]xxx.xxx.xxx.xxx, sid=d9104a49 959e9fce
Sun Oct 21 14:46:14 2018 us=490466 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Oct 21 14:46:14 2018 us=521717 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC87U, emailAddress=me@myhost.mydomain
Sun Oct 21 14:46:14 2018 us=537343 VERIFY KU OK
Sun Oct 21 14:46:14 2018 us=537343 Validating certificate extended key usage
Sun Oct 21 14:46:14 2018 us=537343 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Oct 21 14:46:14 2018 us=537343 VERIFY EKU OK
Sun Oct 21 14:46:14 2018 us=537343 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC87U, emailAddress=me@myhost.mydomain
Sun Oct 21 14:46:14 2018 us=615471 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Sun Oct 21 14:46:14 2018 us=615471 [RT-AC87U] Peer Connection Initiated with [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Oct 21 14:46:15 2018 us=678017 MANAGEMENT: >STATE:1540147575,GET_CONFIG,,,,,,
Sun Oct 21 14:46:15 2018 us=678017 SENT CONTROL [RT-AC87U]: 'PUSH_REQUEST' (status=1)
Sun Oct 21 14:46:15 2018 us=693642 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 192.168.2.1,route-gateway 192.168.2.1,ping 15,ping-restart 60,ifconfig 192.168.2.252 255.255.255.0,peer-id 0,cipher AES-128-GCM'
Sun Oct 21 14:46:15 2018 us=693642 OPTIONS IMPORT: timers and/or timeouts modified
Sun Oct 21 14:46:15 2018 us=693642 OPTIONS IMPORT: --ifconfig/up options modified
Sun Oct 21 14:46:15 2018 us=693642 OPTIONS IMPORT: route-related options modified
Sun Oct 21 14:46:15 2018 us=693642 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Oct 21 14:46:15 2018 us=693642 OPTIONS IMPORT: peer-id set
Sun Oct 21 14:46:15 2018 us=693642 OPTIONS IMPORT: adjusting link_mtu to 1657
Sun Oct 21 14:46:15 2018 us=693642 OPTIONS IMPORT: data channel crypto options modified
Sun Oct 21 14:46:15 2018 us=693642 Data Channel: using negotiated cipher 'AES-128-GCM'
Sun Oct 21 14:46:15 2018 us=693642 Data Channel MTU parms [ L:1585 D:1450 EF:53 EB:411 ET:32 EL:3 ]
Sun Oct 21 14:46:15 2018 us=693642 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Sun Oct 21 14:46:15 2018 us=693642 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Sun Oct 21 14:46:15 2018 us=693642 interactive service msg_channel=0
Sun Oct 21 14:46:15 2018 us=693642 open_tun
Sun Oct 21 14:46:15 2018 us=693642 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5B488702-127C-4074-9D41-68E9D4C0175C}.tap
Sun Oct 21 14:46:15 2018 us=693642 TAP-Windows Driver Version 9.21
Sun Oct 21 14:46:15 2018 us=693642 TAP-Windows MTU=1500
Sun Oct 21 14:46:15 2018 us=693642 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.2.252/255.255.255.0 on interface {5B488702-127C-4074-9D41-68E9D4C0175C} [DHCP-serv: 192.168.2.0, lease-time: 31536000]
Sun Oct 21 14:46:15 2018 us=693642 DHCP option string: 0604c0a8 0201
Sun Oct 21 14:46:15 2018 us=693642 Successful ARP Flush on interface [29] {5B488702-127C-4074-9D41-68E9D4C0175C}
Sun Oct 21 14:46:15 2018 us=724895 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sun Oct 21 14:46:15 2018 us=724895 MANAGEMENT: >STATE:1540147575,ASSIGN_IP,,192.168.2.252,,,,
Sun Oct 21 14:46:20 2018 us=6323 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Sun Oct 21 14:46:20 2018 us=6323 Initialization Sequence Completed
Sun Oct 21 14:46:20 2018 us=6323 MANAGEMENT: >STATE:1540147580,CONNECTED,SUCCESS,192.168.2.252,xxx.xxx.xxx.xxx,1194,,
Sun Oct 21 14:47:35 2018 us=604848 [RT-AC87U] Inactivity timeout (--ping-restart), restarting
Sun Oct 21 14:47:35 2018 us=604848 TCP/UDP: Closing socket
Sun Oct 21 14:47:35 2018 us=604848 Closing TUN/TAP interface
Sun Oct 21 14:47:36 2018 us=667394 TAP: DHCP address released
Server

Code: Select all

Oct 21 14:46:14 ovpn-server1[3592]: MULTI: multi_create_instance called
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx Re-using SSL/TLS context
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx LZO compression initializing
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx Control Channel MTU parms [ L:1654 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx Data Channel MTU parms [ L:1654 D:1450 EF:122 EB:411 ET:32 EL:3 ]
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1590,tun-mtu 1532,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1590,tun-mtu 1532,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx TLS: Initial packet from [AF_INET6]::ffff:xxx.xxx.xxx.xxx:55902, sid=abccd618 28e888b5
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_VER=2.4.6
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_PLAT=win
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_PROTO=2
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_NCP=2
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_LZ4=1
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_LZ4v2=1
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_LZO=1
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_COMP_STUB=1
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_COMP_STUBv2=1
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_TCPNL=1
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx peer info: IV_GUI_VER=OpenVPN_GUI_11
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx TLS: Username/Password authentication succeeded for username 'test' [CN SET]
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384
Oct 21 14:46:14 ovpn-server1[3592]: xxx.xxx.xxx.xxx [test] Peer Connection Initiated with [AF_INET6]::ffff:xxx.xxx.xxx.xxx:55902
Oct 21 14:46:14 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx MULTI_sva: pool returned IPv4=192.168.2.252, IPv6=(Not enabled)
Oct 21 14:46:15 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx PUSH: Received control message: 'PUSH_REQUEST'
Oct 21 14:46:15 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx SENT CONTROL [test]: 'PUSH_REPLY,dhcp-option DNS 192.168.2.1,route-gateway 192.168.2.1,ping 15,ping-restart 60,ifconfig 192.168.2.252 255.255.255.0,peer-id 0,cipher AES-128-GCM' (status=1)
Oct 21 14:46:15 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx Data Channel: using negotiated cipher 'AES-128-GCM'
Oct 21 14:46:15 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx Data Channel MTU parms [ L:1582 D:1450 EF:50 EB:411 ET:32 EL:3 ]
Oct 21 14:46:15 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Oct 21 14:46:15 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Oct 21 14:46:15 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx MULTI: Learn: 00:ff:5b:48:87:02 -> test/xxx.xxx.xxx.xxx
Oct 21 14:49:28 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx [test] Inactivity timeout (--ping-restart), restarting
Oct 21 14:49:28 ovpn-server1[3592]: test/xxx.xxx.xxx.xxx SIGUSR1[soft,ping-restart] received, client-instance restarting

User avatar
TinCanTech
OpenVPN Protagonist
Posts: 5006
Joined: Fri Jun 03, 2016 1:17 pm

Re: One client keeps getting timeout error

Post by TinCanTech » Sun Oct 21, 2018 9:31 pm

Can the client ping the server VPN IP ?

mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

Re: One client keeps getting timeout error

Post by mafiaboy01 » Mon Oct 22, 2018 12:03 am

TinCanTech wrote:
Sun Oct 21, 2018 9:31 pm
Can the client ping the server VPN IP ?

Code: Select all

Pinging yyy.com [xxx.xxx.xxx.xxx] with 32 bytes of data:
Reply from xxx.xxx.xxx.xxx: bytes=32 time=26ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=52ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=13ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=11ms TTL=53

Ping statistics for xxx.xxx.xxx.xxx:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 11ms, Maximum = 52ms, Average = 25ms
It seems to be able to ping no problem. I tried testing on another client on the same network and it had not problem staying connected.

User avatar
TinCanTech
OpenVPN Protagonist
Posts: 5006
Joined: Fri Jun 03, 2016 1:17 pm

Re: One client keeps getting timeout error

Post by TinCanTech » Mon Oct 22, 2018 12:39 am

mafiaboy01 wrote:
Mon Oct 22, 2018 12:03 am
TinCanTech wrote:
Sun Oct 21, 2018 9:31 pm
Can the client ping the server VPN IP ?

Code: Select all

Pinging yyy.com [xxx.xxx.xxx.xxx] with 32 bytes of data:
Reply from xxx.xxx.xxx.xxx: bytes=32 time=26ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=52ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=13ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=11ms TTL=53

Ping statistics for xxx.xxx.xxx.xxx:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 11ms, Maximum = 52ms, Average = 25ms
It seems to be able to ping no problem. I tried testing on another client on the same network and it had not problem staying connected.
I mean the server VPN IP. 192.168.2.1 from the client ..

mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

Re: One client keeps getting timeout error

Post by mafiaboy01 » Mon Oct 22, 2018 1:21 pm

TinCanTech wrote:
Mon Oct 22, 2018 12:39 am
mafiaboy01 wrote:
Mon Oct 22, 2018 12:03 am
TinCanTech wrote:
Sun Oct 21, 2018 9:31 pm
Can the client ping the server VPN IP ?

Code: Select all

Pinging yyy.com [xxx.xxx.xxx.xxx] with 32 bytes of data:
Reply from xxx.xxx.xxx.xxx: bytes=32 time=26ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=52ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=13ms TTL=53
Reply from xxx.xxx.xxx.xxx: bytes=32 time=11ms TTL=53

Ping statistics for xxx.xxx.xxx.xxx:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 11ms, Maximum = 52ms, Average = 25ms
It seems to be able to ping no problem. I tried testing on another client on the same network and it had not problem staying connected.
I mean the server VPN IP. 192.168.2.1 from the client ..
At first I was able to. In that 30sec window while the connection held up I would continue to ping until it dropped. I've messed around with it since and now I can't seem to ping it at all. But my other client has no issues.

User avatar
TinCanTech
OpenVPN Protagonist
Posts: 5006
Joined: Fri Jun 03, 2016 1:17 pm

Re: One client keeps getting timeout error

Post by TinCanTech » Mon Oct 22, 2018 2:37 pm

mafiaboy01 wrote:
Mon Oct 22, 2018 1:21 pm
At first I was able to. In that 30sec window while the connection held up I would continue to ping until it dropped
Sounds to me like some hardware problem at this client only.

You can try higher --verb value (maybe 7) to see if anything is reported (unlikely)
and a lower --ping (like 5) IE. --keepalive 5 60

mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

Re: One client keeps getting timeout error

Post by mafiaboy01 » Mon Oct 22, 2018 4:56 pm

TinCanTech wrote:
Mon Oct 22, 2018 2:37 pm
mafiaboy01 wrote:
Mon Oct 22, 2018 1:21 pm
At first I was able to. In that 30sec window while the connection held up I would continue to ping until it dropped
Sounds to me like some hardware problem at this client only.

You can try higher --verb value (maybe 7) to see if anything is reported (unlikely)
and a lower --ping (like 5) IE. --keepalive 5 60
Its possible, I can put in another NIC and see if that works better. I find that the TAP Adapter responds very slowly, for example when I try and disconnect it takes a long time for it to become available again.

User avatar
TinCanTech
OpenVPN Protagonist
Posts: 5006
Joined: Fri Jun 03, 2016 1:17 pm

Re: One client keeps getting timeout error

Post by TinCanTech » Mon Oct 22, 2018 5:00 pm

mafiaboy01 wrote:
Mon Oct 22, 2018 4:56 pm
I find that the TAP Adapter responds very slowly, for example when I try and disconnect it takes a long time for it to become available again
That sounds quite unusual .. maybe something with anti-virus ?

mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

Re: One client keeps getting timeout error

Post by mafiaboy01 » Mon Oct 22, 2018 5:39 pm

TinCanTech wrote:
Mon Oct 22, 2018 5:00 pm
mafiaboy01 wrote:
Mon Oct 22, 2018 4:56 pm
I find that the TAP Adapter responds very slowly, for example when I try and disconnect it takes a long time for it to become available again
That sounds quite unusual .. maybe something with anti-virus ?
I've tried disabling the antivirus(Sophos Endpoint Security and Control) and the Windows Firewall neither seems to make any difference.

Code: Select all

$ ping -t 192.168.2.1

Pinging 192.168.2.1 with 32 bytes of data:
Request timed out.
Reply from 192.168.2.1: bytes=32 time=20ms TTL=64
Reply from 192.168.2.1: bytes=32 time=29ms TTL=64
Reply from 192.168.2.1: bytes=32 time=10ms TTL=64
Reply from 192.168.2.1: bytes=32 time=15ms TTL=64
Reply from 192.168.2.1: bytes=32 time=14ms TTL=64
Reply from 192.168.2.1: bytes=32 time=12ms TTL=64
Reply from 192.168.2.1: bytes=32 time=15ms TTL=64
Reply from 192.168.2.1: bytes=32 time=17ms TTL=64
Reply from 192.168.2.1: bytes=32 time=20ms TTL=64
Reply from 192.168.2.1: bytes=32 time=12ms TTL=64
Reply from 192.168.2.1: bytes=32 time=14ms TTL=64
Reply from 192.168.2.1: bytes=32 time=12ms TTL=64
Reply from 192.168.2.1: bytes=32 time=26ms TTL=64
Reply from 192.168.2.1: bytes=32 time=14ms TTL=64
Reply from 192.168.2.1: bytes=32 time=12ms TTL=64
Reply from 192.168.2.1: bytes=32 time=37ms TTL=64
Reply from 192.168.2.1: bytes=32 time=13ms TTL=64
Reply from 192.168.2.1: bytes=32 time=25ms TTL=64
Reply from 192.168.2.1: bytes=32 time=28ms TTL=64
Reply from 192.168.2.1: bytes=32 time=12ms TTL=64
Reply from 192.168.2.1: bytes=32 time=15ms TTL=64
Reply from 192.168.2.1: bytes=32 time=30ms TTL=64
Reply from 192.168.2.1: bytes=32 time=22ms TTL=64
Reply from 192.168.2.1: bytes=32 time=23ms TTL=64
Reply from 192.168.2.1: bytes=32 time=38ms TTL=64
Reply from 192.168.2.1: bytes=32 time=17ms TTL=64
Request timed out.
Request timed out.
It says connected for a bit but then drops out. I've tried connecting the client to another vpn server and it has the same issue so it's definitely something on the client.

mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

Re: One client keeps getting timeout error

Post by mafiaboy01 » Mon Oct 22, 2018 5:54 pm

Solved the problem. I was using the latest version of OpenVPN 2.4.6 with Tap Adapter 9.21.2. I downgraded the Tap Adapter to version 9.9.2 and now I have a stable connecting with no drops.

Possibly a compatibility issue with Tap Adapter 9.21.2 and Windows Server 2012r2?

User avatar
TinCanTech
OpenVPN Protagonist
Posts: 5006
Joined: Fri Jun 03, 2016 1:17 pm

Re: One client keeps getting timeout error

Post by TinCanTech » Mon Oct 22, 2018 8:01 pm

It is good that you have isolated what is a possible cause ..

It is also interesting that the older TAP driver works better in your case than the new driver.

Is it possible for you to try a VPN between two Windows machines in order to compare the results to connecting to your router ?

User avatar
TinCanTech
OpenVPN Protagonist
Posts: 5006
Joined: Fri Jun 03, 2016 1:17 pm

Re: One client keeps getting timeout error

Post by TinCanTech » Wed Oct 24, 2018 1:21 pm

I have been informed that TAP version 9.9.2 is NDIS5 and Windows 2012 does not support NDIS5.

So, I don't know what you have actually done but I don't think you have what you are expecting.

mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

Re: One client keeps getting timeout error

Post by mafiaboy01 » Sat Oct 27, 2018 9:48 pm

TinCanTech wrote:
Wed Oct 24, 2018 1:21 pm
I have been informed that TAP version 9.9.2 is NDIS5 and Windows 2012 does not support NDIS5.

So, I don't know what you have actually done but I don't think you have what you are expecting.
Hmm, the VPN connection has been holding strong for a week now and I've transferred over 100gb over it with no problems.

The setup is my router at my condo is running the server. The Windows Server 2012r2 PC is at my parents house and is VPNing into my network so I can backup my computers to it.

User avatar
TinCanTech
OpenVPN Protagonist
Posts: 5006
Joined: Fri Jun 03, 2016 1:17 pm

Re: One client keeps getting timeout error

Post by TinCanTech » Sat Oct 27, 2018 10:31 pm

mafiaboy01 wrote:
Mon Oct 22, 2018 5:54 pm
Solved the problem. I was using the latest version of OpenVPN 2.4.6 with Tap Adapter 9.21.2. I downgraded the Tap Adapter to version 9.9.2 and now I have a stable connecting with no drops.

Possibly a compatibility issue with Tap Adapter 9.21.2 and Windows Server 2012r2?
TinCanTech wrote:
Wed Oct 24, 2018 1:21 pm
I have been informed that TAP version 9.9.2 is NDIS5 and Windows 2012 does not support NDIS5.

So, I don't know what you have actually done but I don't think you have what you are expecting.
Which means .. you do not have the version of TAP installed that you think you do.

mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

Re: One client keeps getting timeout error

Post by mafiaboy01 » Sat Oct 27, 2018 10:39 pm

TinCanTech wrote:
Sat Oct 27, 2018 10:31 pm
mafiaboy01 wrote:
Mon Oct 22, 2018 5:54 pm
Solved the problem. I was using the latest version of OpenVPN 2.4.6 with Tap Adapter 9.21.2. I downgraded the Tap Adapter to version 9.9.2 and now I have a stable connecting with no drops.

Possibly a compatibility issue with Tap Adapter 9.21.2 and Windows Server 2012r2?
TinCanTech wrote:
Wed Oct 24, 2018 1:21 pm
I have been informed that TAP version 9.9.2 is NDIS5 and Windows 2012 does not support NDIS5.

So, I don't know what you have actually done but I don't think you have what you are expecting.
Which means .. you do not have the version of TAP installed that you think you do.
I'll double check in device manager and see what version it's showing there. It's really odd that it's working lol.

mafiaboy01
OpenVpn Newbie
Posts: 9
Joined: Sun Oct 21, 2018 6:58 pm

Re: One client keeps getting timeout error

Post by mafiaboy01 » Sun Oct 28, 2018 12:59 am

This is what it shows that I have installed

Image Image

User avatar
TinCanTech
OpenVPN Protagonist
Posts: 5006
Joined: Fri Jun 03, 2016 1:17 pm

Re: One client keeps getting timeout error

Post by TinCanTech » Sun Oct 28, 2018 10:54 am

I meant Windows 2016 .. so maybe 2012 still supports NDIS5 ..

Post Reply