I'd like to use a tiny router that acts as a OpenVPN Server. It has very low CPU power (200Mhz), so it has plenty of problems handshaking the initial TLS connection with multiple clients with big keys. So I get so many connection tries that fail on the server with:
Code: Select all
Tue Feb 15 21:43:14 2011 read UDPv4 [ECONNREFUSED]: Connection refused (code=146)
Tue Feb 15 21:43:14 2011 ip:port TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Feb 15 21:43:14 2011 ip:port TLS Error: TLS handshake failed
Tue Feb 15 21:43:14 2011 ip:port SIGUSR1[soft,tls-error] received, client-instance restarting
On the client I get:
Code: Select all
Tue Feb 15 21:48:19 2011 UDPv4 link local: [undef]
Tue Feb 15 21:48:19 2011 UDPv4 link remote: ip:port
Tue Feb 15 21:49:19 2011 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Feb 15 21:49:19 2011 TLS Error: TLS handshake failed
Tue Feb 15 21:49:19 2011 SIGUSR1[soft,tls-error] received, process restarting
Is there some hint to workaround this? Setting a longer TLS timeout? Imposing only one client can establish a connection at a time? I mean, not having a single client all the time, but letting only one do the initial TLS handshake at a time. This function would cure all my matters, because if I stop OpenVPN client on one of the 3 clients, and start it later, it then works as it should and they can communicate and satisfy all my bandwidth needs. Is UDP timeout on the router important? It's 120s now, is it ok?
Thanks.