I'm using a custom configuration that does works perfectly on Windows/Mac/Android but not on iOS (1.0.5 build 177 32-bit). What am I doing wrong?
Client logs:
Code: Select all
2015-06-22 20:06:29 ----- OpenVPN Start -----
OpenVPN core 3.0 ios armv7s thumb2 32-bit
2015-06-22 20:06:29 UNUSED OPTIONS
3 [pull]
4 [script-security] [2]
10 [auth-nocache]
12 [tls-client]
13 [tls-cipher] [TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256:TLS-ECDHE-ECDSA-WITH-AES-1...]
18 [verb] [3]
2015-06-22 20:06:29 LZO-ASYM init swap=0 asym=0
2015-06-22 20:06:29 EVENT: RESOLVE
2015-06-22 20:06:31 Contacting A.B.C.D:443 via TCP
2015-06-22 20:06:31 EVENT: WAIT
2015-06-22 20:06:31 SetTunnelSocket returned 1
2015-06-22 20:06:31 Connecting to hostname:443 (A.B.C.D) via TCPv4
2015-06-22 20:06:31 EVENT: CONNECTING
2015-06-22 20:07:11 Session invalidated: KEEPALIVE_TIMEOUT
2015-06-22 20:07:11 Client terminated, restarting in 2...
2015-06-22 20:07:13 EVENT: RECONNECTING
2015-06-22 20:07:13 LZO-ASYM init swap=0 asym=0
2015-06-22 20:07:13 EVENT: RESOLVE
2015-06-22 20:07:13 Contacting A.B.C.D:443 via TCP
2015-06-22 20:07:13 EVENT: WAIT
2015-06-22 20:07:13 SetTunnelSocket returned 1
2015-06-22 20:07:14 Connecting to hostname:443 (A.B.C.D) via TCPv4
2015-06-22 20:07:14 EVENT: CONNECTING
2015-06-22 20:07:29 EVENT: CONNECTION_TIMEOUT [ERR]
2015-06-22 20:07:29 EVENT: DISCONNECTED
2015-06-22 20:07:29 Raw stats on disconnect:
BYTES_IN : 568
BYTES_OUT : 568
PACKETS_IN : 6
PACKETS_OUT : 6
REPLAY_ERROR : 2
KEEPALIVE_TIMEOUT : 1
CONNECTION_TIMEOUT : 1
N_RECONNECT : 1
PKTID_TCP_OUT_OF_SEQ : 2
2015-06-22 20:07:29 Performance stats on disconnect:
CPU usage (microseconds): 37247
Network bytes per CPU second: 30499
Tunnel bytes per CPU second: 0
2015-06-22 20:07:29 EVENT: DISCONNECT_PENDING
2015-06-22 20:07:29 ----- OpenVPN Stop -----
Code: Select all
Mon Jun 22 20:06:30 2015 TCP connection established with [AF_INET6]::ffff:A.B.C.D:57104
Mon Jun 22 20:06:30 2015 ::ffff:A.B.C.D(57104) TLS: Initial packet from [AF_INET6]::ffff:A.B.C.D:57104, sid=dc171508 015958ca
Mon Jun 22 20:07:10 2015 ::ffff:A.B.C.D(57104) Connection reset, restarting [0]
Mon Jun 22 20:07:10 2015 ::ffff:A.B.C.D(57104) SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Jun 22 20:07:13 2015 TCP connection established with [AF_INET6]::ffff:A.B.C.D:7955
Mon Jun 22 20:07:13 2015 ::ffff:A.B.C.D(7955) TLS: Initial packet from [AF_INET6]::ffff:A.B.C.D:7955, sid=48ef69ba 8ae10b16
Mon Jun 22 20:07:28 2015 ::ffff:A.B.C.D(7955) Connection reset, restarting [0]
Mon Jun 22 20:07:28 2015 ::ffff:A.B.C.D(7955) SIGUSR1[soft,connection-reset] received, client-instance restarting
Code: Select all
setenv CLIENT_CERT 0
remote hostname 443
proto tcp-client
dev tun
pull
script-security 2
# If redirect-gateway is enabled, the client will redirect it's default network gateway through the VPN.
#redirect-gateway
<ca>
-----BEGIN CERTIFICATE-----
//key
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
//key
-----END CERTIFICATE-----
</ca>
comp-lzo
reneg-sec 0
auth SHA512
auth-user-pass
auth-nocache
cipher AES-256-CBC
tls-client
tls-cipher TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256:TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
//key
-----END OpenVPN Static key V1-----
</tls-auth>
#tls-auth tls-auth.key 1
tls-version-min 1.2
remote-cert-eku "TLS Web Server Authentication"
verify-x509-name 'OU=blabla, CN=hostname' subject
verb 15
Code: Select all
push "route F.G.H.I 255.255.255.0"
push "route R.S.T.U 255.255.255.0"
server R.S.T.U 255.255.255.0
port 443
proto tcp6-server
dev tun
persist-tun
persist-key
comp-lzo
keepalive 10 60
#mode server
reneg-sec 0
#user anonymous
#group anonymous
#management K.L.M.N 1195
dh /usr/syno/etc/packages/VPNCenter/openvpn/keys/dh2048.pem
ca /usr/syno/etc/ssl/ssl.crt/ca.crt
cert /usr/syno/etc/ssl/ssl.crt/server.crt
key /usr/syno/etc/ssl/ssl.key/server.key
#ca /var/packages/VPNCenter/target/etc/openvpn/keys/ca.crt
#cert /var/packages/VPNCenter/target/etc/openvpn/keys/server.crt
#key /var/packages/VPNCenter/target/etc/openvpn/keys/server.key
auth SHA512
client-cert-not-required
cipher AES-256-CBC
tls-auth /usr/syno/etc/packages/VPNCenter/openvpn/keys/tls-auth.key 0
tls-cipher TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256:TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
#tls-cipher ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA256
tls-version-min 1.2
remote-cert-eku "TLS Web Client Authentication"
username-as-common-name
max-clients 2
plugin /var/packages/VPNCenter/target/lib/radiusplugin.so /var/packages/VPNCenter/target/etc/openvpn/radiusplugin.cnf
log-append /var/log/openvpn.log
status /var/log/openvpn-status.log 30
status-version 2
verb 3