Question about server/client version compatibility

This forum is for admins who are looking to build or expand their OpenVPN setup.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
aldomoro
OpenVpn Newbie
Posts: 3
Joined: Tue Mar 02, 2021 12:33 pm

Question about server/client version compatibility

Post by aldomoro » Fri Sep 16, 2022 10:07 am

Hello

I use OpenVPN server version 2.5.4 - which versions of clients are compatible with that version of server?
Is there any pattern used for this? For example all 2.5.X versions are always compatible but if the second number in the version is changed, then it is imcompatible?
Or is there any documentation for that?

Thank you

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Question about server/client version compatibility

Post by ordex » Fri Sep 16, 2022 11:19 am

The goal has always been to keep compatibility with older clients for as much as possible.
If you are using some new feature, some old clients may not be able to connect anymore.

There is no predefined pattern though.

However, a server running 2.5.4 should be able to accept connection from 2.3+, as long as you're not using some unsupported setting.

Vuoto66
OpenVpn Newbie
Posts: 1
Joined: Tue Jan 30, 2024 4:01 pm

Re: Question about server/client version compatibility

Post by Vuoto66 » Tue Jan 30, 2024 4:03 pm

So, if I understand, using a server 2.5.8 I can connect with a client 2.6.8 that is actually the new one !

Am I right?
Vuoto66

zxcgn
OpenVpn Newbie
Posts: 2
Joined: Fri Jun 30, 2023 10:50 am

Re: Question about server/client version compatibility

Post by zxcgn » Mon Apr 28, 2025 12:33 pm

I apologizing, because this is probably not the right place to ask, but i hope moderator will correct it, because i don't have right to create new topic yet.

I have very weird problem with new versions of OpenVPN 2.6.x - at least 2.6.13 and 2.6.14 behaved the same way. I have server with public IPv4 with updated Debian 12, where is OpenVPN 2.6.3 and attached configuration. For while everything worked just fine. Users with mostly W10 and W11 (and one or two MACs) can access SMB and RDP services inside VPN.

One of users told me, he cannot connect from home, but from office he can. I tested it thoroughly on my computers, but from other places with different provider and everything worked. One of my clients was PC with W10 and OpenVPN client 2.6.14.

In user locality, we tested two different computers, second was with freshly installed W11 (without MS account...), second W10, both with OpenVPN 2.6.14 (we tested 2.6.13 and before it i thing it was 2.6.10) - with both computers was problem exactly same.

- i can connect with OpenVPN GUI, no errors, everything seems to be working
- i can ping through VPN to the server, answer in 3 - 4ms, very stable, no packet loss (i can see it with tcpdump on server too)
- i cannot connect to the Samba server (SMB version 3.11) or RDP on another server inside VPN
- DNS inside VPN works
- PC is trying connect to the SMB, but it sometimes succeeded once or twice (i can see it in Samba log or with smbstatus), sometimes i could display folder content, but MS Explorer often hangs in second attempt until time outs.

Weird thing is - with exactly same configuration i can connect from other localities.

Weirder thig is - when i downgraded to latest OpenVPN 2.5.10 it started working again, even SMB and RDP passing through VPN.

My question is - how can ping through VPN work, but other services not? How it can depend on internet provider? Can it have something with different virtual network device? I can see OpenVPN 2.5.x is using "OpenVPN TAP", but OpenVPN 2.6.x is using "OpenVPN Wintun".

Obviously i don't have idea what internet provider can do wrong. I only know he doesn't give public IPv4 to the users, his router have private IPv4 on WAN interface, but different from out networks. I am intentionally trying choose unusual range to minimize risk of collision.

Do you have any idea what i can try and check? I cannot diagnose it at whim anytime, it depends on user when he will have time for it, because in all my networks this problem will not occur. But i can then connect to his PC remotely and try some diagnostics...

server config
dev tun0

mode server
tls-server

keepalive 10 60

port xxxxx
proto udp

persist-key

topology "subnet"
push "topology subnet"

ifconfig 10.aa.bb.1 255.255.255.0
ifconfig-pool 10.aa.bb.100 10.aa.bb.199 255.255.255.0
client-config-dir /etc/openvpn/vpn-users

push "route-gateway 10.aa.bb.1"
push "route 10.aa.bb.0 255.255.255.0"
push "route ccc.ddd.eee.0 255.255.255.0"
push "dhcp-option DNS 10.aa.bb.1"

cipher AES-256-GCM

user nobody
group nogroup

persist-tun

ca /usr/share/easy-rsa/pki/ca.crt
cert /usr/share/easy-rsa/pki/issued/servername.crt
key /usr/share/easy-rsa/pki/private/servername.key
dh /usr/share/easy-rsa/pki/dh.pem

crl-verify /usr/share/easy-rsa/pki/crl.pem

log /var/log/openvpn/openvpn-clients.log
log-append /var/log/openvpn/openvpn-clients-append.log

Post Reply