TLS Error: reading acknowledgement record from packet
Posted: Wed Apr 15, 2015 10:53 pm
I am using OvenVPN android app and this error pops up every time I try connecting to a config. I have added logs please help. This is really pissing me off.
Code: Select all
2015-04-16 04:20:35 Running on condor (MSM8610) motorola, Android API 22, version 0.6.29, official build
2015-04-16 04:20:35 Log cleared.
2015-04-16 04:20:39 Building configuration…
2015-04-16 04:20:41 started Socket Thread
2015-04-16 04:20:41 Current Parameter Settings:
2015-04-16 04:20:41 config = '/data/data/de.blinkt.openvpn/cache/android.conf'
2015-04-16 04:20:41 mode = 0
2015-04-16 04:20:41 show_ciphers = DISABLED
2015-04-16 04:20:41 show_digests = DISABLED
2015-04-16 04:20:41 show_engines = DISABLED
2015-04-16 04:20:41 genkey = DISABLED
2015-04-16 04:20:41 key_pass_file = '[UNDEF]'
2015-04-16 04:20:41 show_tls_ciphers = DISABLED
2015-04-16 04:20:41 connect_retry_max = 5
2015-04-16 04:20:41 Connection profiles [0]:
2015-04-16 04:20:41 proto = udp
2015-04-16 04:20:41 local = '[UNDEF]'
2015-04-16 04:20:41 local_port = '49201'
2015-04-16 04:20:41 remote = 'vpn275654066.opengw.net'
2015-04-16 04:20:41 remote_port = '1322'
2015-04-16 04:20:41 remote_float = DISABLED
2015-04-16 04:20:41 bind_defined = ENABLED
2015-04-16 04:20:41 bind_local = ENABLED
2015-04-16 04:20:41 bind_ipv6_only = DISABLED
2015-04-16 04:20:41 connect_retry_seconds = 5
2015-04-16 04:20:41 connect_timeout = 10
2015-04-16 04:20:41 socks_proxy_server = '[UNDEF]'
2015-04-16 04:20:41 socks_proxy_port = '[UNDEF]'
2015-04-16 04:20:41 socks_proxy_retry = DISABLED
2015-04-16 04:20:41 tun_mtu = 1500
2015-04-16 04:20:41 tun_mtu_defined = ENABLED
2015-04-16 04:20:41 link_mtu = 1500
2015-04-16 04:20:41 link_mtu_defined = DISABLED
2015-04-16 04:20:41 tun_mtu_extra = 0
2015-04-16 04:20:41 tun_mtu_extra_defined = DISABLED
2015-04-16 04:20:41 mtu_discover_type = -1
2015-04-16 04:20:41 fragment = 0
2015-04-16 04:20:41 mssfix = 1450
2015-04-16 04:20:41 explicit_exit_notification = 0
2015-04-16 04:20:41 Connection profiles END
2015-04-16 04:20:41 remote_random = DISABLED
2015-04-16 04:20:41 ipchange = '[UNDEF]'
2015-04-16 04:20:41 dev = 'tun'
2015-04-16 04:20:41 dev_type = '[UNDEF]'
2015-04-16 04:20:41 dev_node = '[UNDEF]'
2015-04-16 04:20:41 lladdr = '[UNDEF]'
2015-04-16 04:20:41 topology = 1
2015-04-16 04:20:41 tun_ipv6 = DISABLED
2015-04-16 04:20:41 ifconfig_local = '[UNDEF]'
2015-04-16 04:20:41 ifconfig_remote_netmask = '[UNDEF]'
2015-04-16 04:20:41 ifconfig_noexec = DISABLED
2015-04-16 04:20:41 ifconfig_nowarn = ENABLED
2015-04-16 04:20:41 ifconfig_ipv6_local = '[UNDEF]'
2015-04-16 04:20:41 ifconfig_ipv6_netbits = 0
2015-04-16 04:20:41 ifconfig_ipv6_remote = '[UNDEF]'
2015-04-16 04:20:41 shaper = 0
2015-04-16 04:20:41 mtu_test = 0
2015-04-16 04:20:41 mlock = DISABLED
2015-04-16 04:20:41 keepalive_ping = 0
2015-04-16 04:20:41 keepalive_timeout = 0
2015-04-16 04:20:41 inactivity_timeout = 0
2015-04-16 04:20:41 ping_send_timeout = 0
2015-04-16 04:20:41 ping_rec_timeout = 0
2015-04-16 04:20:41 ping_rec_timeout_action = 0
2015-04-16 04:20:41 ping_timer_remote = DISABLED
2015-04-16 04:20:41 remap_sigusr1 = 0
2015-04-16 04:20:41 persist_tun = ENABLED
2015-04-16 04:20:41 persist_local_ip = DISABLED
2015-04-16 04:20:41 persist_remote_ip = DISABLED
2015-04-16 04:20:41 persist_key = DISABLED
2015-04-16 04:20:41 passtos = DISABLED
2015-04-16 04:20:41 resolve_retry_seconds = 1000000000
2015-04-16 04:20:41 resolve_in_advance = ENABLED
2015-04-16 04:20:41 username = '[UNDEF]'
2015-04-16 04:20:41 groupname = '[UNDEF]'
2015-04-16 04:20:41 chroot_dir = '[UNDEF]'
2015-04-16 04:20:41 cd_dir = '[UNDEF]'
2015-04-16 04:20:41 writepid = '[UNDEF]'
2015-04-16 04:20:41 up_script = '[UNDEF]'
2015-04-16 04:20:41 down_script = '[UNDEF]'
2015-04-16 04:20:41 down_pre = DISABLED
2015-04-16 04:20:41 up_restart = DISABLED
2015-04-16 04:20:41 up_delay = DISABLED
2015-04-16 04:20:41 daemon = DISABLED
2015-04-16 04:20:41 inetd = 0
2015-04-16 04:20:41 log = DISABLED
2015-04-16 04:20:41 suppress_timestamps = DISABLED
2015-04-16 04:20:41 machine_readable_output = ENABLED
2015-04-16 04:20:41 nice = 0
2015-04-16 04:20:41 verbosity = 4
2015-04-16 04:20:41 mute = 0
2015-04-16 04:20:41 gremlin = 0
2015-04-16 04:20:41 status_file = '[UNDEF]'
2015-04-16 04:20:41 status_file_version = 1
2015-04-16 04:20:41 status_file_update_freq = 60
2015-04-16 04:20:41 occ = ENABLED
2015-04-16 04:20:41 rcvbuf = 65536
2015-04-16 04:20:41 sndbuf = 65536
2015-04-16 04:20:41 sockflags = 0
2015-04-16 04:20:41 fast_io = DISABLED
2015-04-16 04:20:41 comp.alg = 0
2015-04-16 04:20:41 comp.flags = 0
2015-04-16 04:20:41 route_script = '[UNDEF]'
2015-04-16 04:20:41 route_default_gateway = '[UNDEF]'
2015-04-16 04:20:41 route_default_metric = 0
2015-04-16 04:20:41 route_noexec = DISABLED
2015-04-16 04:20:41 route_delay = 0
2015-04-16 04:20:41 route_delay_window = 30
2015-04-16 04:20:41 route_delay_defined = DISABLED
2015-04-16 04:20:41 route_nopull = DISABLED
2015-04-16 04:20:41 route_gateway_via_dhcp = DISABLED
2015-04-16 04:20:41 allow_pull_fqdn = DISABLED
2015-04-16 04:20:41 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'
2015-04-16 04:20:41 management_port = 'unix'
2015-04-16 04:20:41 management_user_pass = '[UNDEF]'
2015-04-16 04:20:41 management_log_history_cache = 250
2015-04-16 04:20:41 management_echo_buffer_size = 100
2015-04-16 04:20:41 management_write_peer_info_file = '[UNDEF]'
2015-04-16 04:20:41 management_client_user = '[UNDEF]'
2015-04-16 04:20:41 management_client_group = '[UNDEF]'
2015-04-16 04:20:41 management_flags = 4390
2015-04-16 04:20:41 shared_secret_file = '[UNDEF]'
2015-04-16 04:20:41 key_direction = 0
2015-04-16 04:20:41 ciphername_defined = ENABLED
2015-04-16 04:20:41 ciphername = 'AES-128-CBC'
2015-04-16 04:20:41 authname_defined = ENABLED
2015-04-16 04:20:41 authname = 'SHA1'
2015-04-16 04:20:41 prng_hash = 'SHA1'
2015-04-16 04:20:41 prng_nonce_secret_len = 16
2015-04-16 04:20:41 keysize = 0
2015-04-16 04:20:41 engine = DISABLED
2015-04-16 04:20:41 replay = ENABLED
2015-04-16 04:20:41 mute_replay_warnings = DISABLED
2015-04-16 04:20:41 replay_window = 64
2015-04-16 04:20:41 replay_time = 15
2015-04-16 04:20:41 packet_id_file = '[UNDEF]'
2015-04-16 04:20:41 use_iv = ENABLED
2015-04-16 04:20:41 test_crypto = DISABLED
2015-04-16 04:20:41 tls_server = DISABLED
2015-04-16 04:20:41 tls_client = ENABLED
2015-04-16 04:20:41 key_method = 2
2015-04-16 04:20:41 ca_file = '[[INLINE]]'
2015-04-16 04:20:41 ca_path = '[UNDEF]'
2015-04-16 04:20:41 dh_file = '[UNDEF]'
2015-04-16 04:20:41 cert_file = '[[INLINE]]'
2015-04-16 04:20:41 priv_key_file = '[[INLINE]]'
2015-04-16 04:20:41 pkcs12_file = '[UNDEF]'
2015-04-16 04:20:41 cipher_list = '[UNDEF]'
2015-04-16 04:20:42 tls_verify = '[UNDEF]'
2015-04-16 04:20:42 tls_export_cert = '[UNDEF]'
2015-04-16 04:20:42 verify_x509_type = 0
2015-04-16 04:20:42 verify_x509_name = '[UNDEF]'
2015-04-16 04:20:42 crl_file = '[UNDEF]'
2015-04-16 04:20:42 ns_cert_type = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_ku[i] = 0
2015-04-16 04:20:42 remote_cert_eku = '[UNDEF]'
2015-04-16 04:20:42 ssl_flags = 0
2015-04-16 04:20:42 tls_timeout = 2
2015-04-16 04:20:42 renegotiate_bytes = 0
2015-04-16 04:20:42 renegotiate_packets = 0
2015-04-16 04:20:42 renegotiate_seconds = 3600
2015-04-16 04:20:42 handshake_window = 60
2015-04-16 04:20:42 transition_window = 3600
2015-04-16 04:20:42 single_session = DISABLED
2015-04-16 04:20:42 push_peer_info = DISABLED
2015-04-16 04:20:42 tls_exit = DISABLED
2015-04-16 04:20:42 tls_auth_file = '[UNDEF]'
2015-04-16 04:20:42 client = ENABLED
2015-04-16 04:20:42 pull = ENABLED
2015-04-16 04:20:42 auth_user_pass_file = '[UNDEF]'
2015-04-16 04:20:42 OpenVPN 2.4-icsopenvpn [git:icsopenvpn_629-4c6f7f0d16e1a6b3] android-14-armeabi-v7a [SSL (OpenSSL)] [LZO] [SNAPPY] [LZ4] [EPOLL] [MH] [IPv6] built on Feb 24 2015
2015-04-16 04:20:42 library versions: OpenSSL 1.0.1l 15 Jan 2015, LZO 2.07
2015-04-16 04:20:42 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket
2015-04-16 04:20:42 MANAGEMENT: CMD 'hold release'
2015-04-16 04:20:42 MANAGEMENT: CMD 'bytecount 2'
2015-04-16 04:20:42 MANAGEMENT: CMD 'proxy NONE'
2015-04-16 04:20:42 MANAGEMENT: CMD 'state on'
2015-04-16 04:20:42 Network Status: CONNECTED HSPA+ to MOBILE airtelfun.com
2015-04-16 04:20:43 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2015-04-16 04:20:43 Control Channel MTU parms [ L:1557 D:138 EF:38 EB:0 ET:0 EL:3 ]
2015-04-16 04:20:43 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
2015-04-16 04:20:43 Local Options String: 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2015-04-16 04:20:43 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2015-04-16 04:20:43 Local Options hash (VER=V4): '8326dbaa'
2015-04-16 04:20:43 Expected Remote Options hash (VER=V4): 'b7f67de4'
2015-04-16 04:20:43 TCP/UDP: Preserving recently used remote address: [AF_INET]112.218.154.132:1322
2015-04-16 04:20:43 Socket Buffers: R=[163840->131072] S=[163840->131072]
2015-04-16 04:20:43 Protecting socket fd 4
2015-04-16 04:20:43 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2015-04-16 04:20:43 UDP link local (bound): [AF_INET][undef]:49201
2015-04-16 04:20:43 UDP link remote: [AF_INET]112.218.154.132:1322
2015-04-16 04:20:43 MANAGEMENT: >STATE:1429138243,WAIT,,,
2015-04-16 04:20:43 MANAGEMENT: >STATE:1429138243,AUTH,,,
2015-04-16 04:20:43 TLS: Initial packet from [AF_INET]112.218.154.132:1322, sid=0f40767c c156c2aa
2015-04-16 04:20:44 VERIFY ERROR: depth=0, error=self signed certificate: CN=vi7.org, O=5z3vge tc3k, C=US
2015-04-16 04:20:44 OpenSSL: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
2015-04-16 04:20:44 TLS_ERROR: BIO read tls_read_plaintext error
2015-04-16 04:20:44 TLS Error: TLS object -> incoming plaintext read error
2015-04-16 04:20:44 TLS Error: TLS handshake failed
2015-04-16 04:20:44 TCP/UDP: Closing socket
2015-04-16 04:20:44 SIGUSR1[soft,tls-error] received, process restarting
2015-04-16 04:20:44 MANAGEMENT: >STATE:1429138244,RECONNECTING,tls-error,,
2015-04-16 04:20:47 MANAGEMENT: CMD 'hold release'
2015-04-16 04:20:47 MANAGEMENT: CMD 'bytecount 2'
2015-04-16 04:20:47 MANAGEMENT: CMD 'state on'
2015-04-16 04:20:47 MANAGEMENT: CMD 'proxy NONE'
2015-04-16 04:20:48 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2015-04-16 04:20:48 Control Channel MTU parms [ L:1557 D:138 EF:38 EB:0 ET:0 EL:3 ]
2015-04-16 04:20:48 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
2015-04-16 04:20:48 Local Options String: 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2015-04-16 04:20:48 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2015-04-16 04:20:48 Local Options hash (VER=V4): '8326dbaa'
2015-04-16 04:20:48 Expected Remote Options hash (VER=V4): 'b7f67de4'
2015-04-16 04:20:48 TCP/UDP: Preserving recently used remote address: [AF_INET]112.218.154.132:1322
2015-04-16 04:20:48 Socket Buffers: R=[163840->131072] S=[163840->131072]
2015-04-16 04:20:48 Protecting socket fd 4
2015-04-16 04:20:48 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2015-04-16 04:20:48 UDP link local (bound): [AF_INET][undef]:49201
2015-04-16 04:20:48 UDP link remote: [AF_INET]112.218.154.132:1322
2015-04-16 04:20:48 MANAGEMENT: >STATE:1429138248,WAIT,,,
2015-04-16 04:20:48 MANAGEMENT: >STATE:1429138248,AUTH,,,
2015-04-16 04:20:48 TLS: Initial packet from [AF_INET]112.218.154.132:1322, sid=0f40767c c156c2aa
2015-04-16 04:20:48 TLS Error: reading acknowledgement record from packet
2015-04-16 04:20:49 TLS Error: reading acknowledgement record from packet
2015-04-16 04:20:50 TLS Error: reading acknowledgement record from packet
2015-04-16 04:20:54 TLS Error: reading acknowledgement record from packet