About "Session Invalidated: BUFFER_ERROR"
Posted: Wed Mar 18, 2015 3:19 am
Hello, All
As title openvpn connect try to reconnect to the server,
After got "Session Invalidated:BUFFER_ERROR" even there is a connection.
as below OPENVPN CONNECT throw these errors will connect again,
even add
does not work.
but Android Version no problem, working fine.
Any idea?
log
and client.conf
As title openvpn connect try to reconnect to the server,
After got "Session Invalidated:BUFFER_ERROR" even there is a connection.
as below OPENVPN CONNECT throw these errors will connect again,
Code: Select all
2015-03-18 11:47:16 Session invalidated: BUFFER_ERROR
2015-03-18 11:47:16 Client terminated, restarting in 2...
2015-03-18 11:47:16 TUN reassert
2015-03-18 11:47:16 TUN reset routes
Code: Select all
keepalive 60 3600
but Android Version no problem, working fine.
Any idea?
log
Code: Select all
2015-03-18 11:46:42 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2015-03-18 11:46:42 Session is ACTIVE
2015-03-18 11:46:42 EVENT: GET_CONFIG
2015-03-18 11:46:42 Sending PUSH_REQUEST to server...
2015-03-18 11:46:43 Sending PUSH_REQUEST to server...
2015-03-18 11:46:45 Sending PUSH_REQUEST to server...
2015-03-18 11:46:48 Sending PUSH_REQUEST to server...
2015-03-18 11:46:48 OPTIONS:
0 [route-gateway] [192.168.60.1]
1 [topology] [subnet]
2 [ping] [10]
3 [ping-restart] [120]
4 [socket-flags] [TCP_NODELAY]
5 [redirect-gateway] [def1] [bypass-dhcp]
6 [ifconfig] [192.168.60.15] [255.255.255.0]
2015-03-18 11:46:48 LZO-ASYM init swap=0 asym=0
2015-03-18 11:46:48 EVENT: ASSIGN_IP
2015-03-18 11:46:48 Google DNS fallback enabled
2015-03-18 11:46:48 Connected via tun
2015-03-18 11:46:48 EVENT: CONNECTED stanley@10.41.3.31:4886 (10.41.3.31) via /TCPv4 on tun/192.168.60.15/
2015-03-18 11:46:48 NET Internet:ReachableViaWiFi/-R t----l-
2015-03-18 11:46:48 SetStatus Connected
2015-03-18 11:47:01 Session invalidated: BUFFER_ERROR
2015-03-18 11:47:01 Client terminated, restarting in 2...
2015-03-18 11:47:01 TUN reassert
2015-03-18 11:47:01 TUN reset routes
2015-03-18 11:47:01 NET Internet:ReachableViaWiFi/-R -----l-
2015-03-18 11:47:03 EVENT: RECONNECTING
2015-03-18 11:47:03 LZO-ASYM init swap=0 asym=0
2015-03-18 11:47:03 Contacting 10.41.3.31:4886 via TCP
2015-03-18 11:47:03 EVENT: WAIT
2015-03-18 11:47:03 SetTunnelSocket returned 1
2015-03-18 11:47:03 Connecting to 10.41.3.31:4886 (10.41.3.31) via TCPv4
2015-03-18 11:47:03 EVENT: CONNECTING
2015-03-18 11:47:03 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client
2015-03-18 11:47:03 Creds: Username/Password
2015-03-18 11:47:03 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_LZO=1
2015-03-18 11:47:03 VERIFY OK: depth=1
cert. version : 3
serial number : F9:6F:22:F4:25:A9:C7:44
issuer name : C=KR, ST=Seoul, L=Guro, O=Future Systems, OU=RND, CN=sslplus-ca
subject name : C=KR, ST=Seoul, L=Guro, O=Future Systems, OU=RND, CN=sslplus-ca
issued on : 2012-02-18 16:59:23
expires on : 2022-02-15 16:59:23
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true
2015-03-18 11:47:03 VERIFY OK: depth=0
cert. version : 3
serial number : 01
issuer name : C=KR, ST=Seoul, L=Guro, O=Future Systems, OU=RND, CN=sslplus-ca
subject name : C=KR, ST=Seoul, O=Future Systems, OU=RND, CN=marlin
issued on : 2012-02-18 17:05:38
expires on : 2022-02-15 17:05:38
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
2015-03-18 11:47:03 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2015-03-18 11:47:03 Session is ACTIVE
2015-03-18 11:47:03 EVENT: GET_CONFIG
2015-03-18 11:47:03 Sending PUSH_REQUEST to server...
2015-03-18 11:47:04 Sending PUSH_REQUEST to server...
2015-03-18 11:47:06 Sending PUSH_REQUEST to server...
2015-03-18 11:47:06 OPTIONS:
0 [route-gateway] [192.168.60.1]
1 [topology] [subnet]
2 [ping] [10]
3 [ping-restart] [120]
4 [socket-flags] [TCP_NODELAY]
5 [redirect-gateway] [def1] [bypass-dhcp]
6 [ifconfig] [192.168.60.15] [255.255.255.0]
2015-03-18 11:47:06 LZO-ASYM init swap=0 asym=0
2015-03-18 11:47:06 EVENT: ASSIGN_IP
2015-03-18 11:47:06 Google DNS fallback enabled
2015-03-18 11:47:06 Connected via tun
2015-03-18 11:47:06 EVENT: CONNECTED song@10.41.3.31:4886 (10.41.3.31) via /TCPv4 on tun/192.168.60.15/
2015-03-18 11:47:06 NET Internet:ReachableViaWiFi/-R t----l-
2015-03-18 11:47:06 SetStatus Connected <--- connected !!!!
2015-03-18 11:47:16 Session invalidated: BUFFER_ERROR
2015-03-18 11:47:16 Client terminated, restarting in 2...
2015-03-18 11:47:16 TUN reassert
2015-03-18 11:47:16 TUN reset routes
2015-03-18 11:47:16 NET Internet:ReachableViaWiFi/-R -----l-
2015-03-18 11:47:18 EVENT: RECONNECTING <------------------ start reconnect !!!
2015-03-18 11:47:18 LZO-ASYM init swap=0 asym=0
2015-03-18 11:47:18 Contacting 10.41.3.31:4886 via TCP
2015-03-18 11:47:18 EVENT: WAIT
2015-03-18 11:47:18 SetTunnelSocket returned 1
2015-03-18 11:47:18 Connecting to 10.41.3.31:4886 (10.41.3.31) via TCPv4
2015-03-18 11:47:18 EVENT: CONNECTING
2015-03-18 11:47:18 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client
2015-03-18 11:47:18 Creds: Username/Password
2015-03-18 11:47:18 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_LZO=1
2015-03-18 11:47:18 VERIFY OK: depth=1
cert. version : 3
serial number : F9:6F:22:F4:25:A9:C7:44
issuer name : C=KR, ST=Seoul, L=Guro, O=Future Systems, OU=RND, CN=sslplus-ca
subject name : C=KR, ST=Seoul, L=Guro, O=Future Systems, OU=RND, CN=sslplus-ca
issued on : 2012-02-18 16:59:23
expires on : 2022-02-15 16:59:23
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true
and client.conf
Code: Select all
client
dev tun
proto tcp
remote [server-ip][port]
comp-lzo
no-iv
no-replay
nobind
persist-key
persist-tun
auth-user-pass
verb 3
cipher AES-128-CBC
<ca>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----
</key>