Tue Jan 9 06:05:51 2018 122.23.165.166:53302 TLS error: The server has no TLS ciphersuites in common with the client. Your --tls-cipher setting might be too restrictive.
Tue Jan 9 06:05:51 2018 122.23.165.166:53302 OpenSSL: error:1408A0C1:SSL routines:ssl3_get_client_hello:no shared cipher
Tue Jan 9 06:05:51 2018 122.23.165.166:53302 TLS_ERROR: BIO read tls_read_plaintext error
Tue Jan 9 06:05:51 2018 122.23.165.166:53302 TLS Error: TLS object -> incoming plaintext read error
Tue Jan 9 06:05:51 2018 122.23.165.166:53302 TLS Error: TLS handshake failed
Tue Jan 9 06:05:51 2018 122.23.165.166:53302 SIGUSR1[soft,tls-error] received, client-instance restarting
From the FAQ:
Setting for AES-CBC did not work.I cannot connect to the server (client times out), and the server log file shows "TLS_ERROR: BIO read tls_read_plaintext error: error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared cipher".
This is usually remedied by going to the OpenVPN section of the iOS Settings app and selecting "Force AES-CBC ciphersuites".
Can anybody advise which tls cipher will work for me?
Here's my server config which works on OS X Tunnelblick.
Code: Select all
dev tun
proto udp
port 1194
user ovpn
group ovpn
ca ca.crt
cert server.crt
key server.key
server 10.3.255.0 255.255.255.0
ifconfig-pool-persist ipp.txt
ncp-disable
cipher AES-256-GCM
auth SHA512
tls-version-min 1.2
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
dh none
ecdh-curve secp521r1
keepalive 10 120
persist-key
persist-tun
tls-server
tls-crypt /etc/openvpn/server/tls-auth.key
Code: Select all
client
proto udp
dev tun
persist-key
persist-tun
remote vpn.mydomain.com 1194
resolv-retry infinite
nobind
explicit-exit-notify 1
remote-cert-tls server
auth SHA512
cipher AES-256-GCM
tls-version-min 1.2
tls-client
ping 15
ping-restart 120