'link-mtu' is used inconsistently
Posted: Sun Jan 26, 2020 11:04 am
Hi,
If an ios client connect to the server, I get an error
Any reason why the link-mtu differs?
server 172.31.252.0 255.255.255.0
topology subnet
user nobody
group nogroup
dev tun0
proto udp6
port 1194
ca /etc/openvpn/keys/ca.crt
cert /etc/openvpn/keys/server.crt
key /etc/openvpn/keys/server.key
dh none
ecdh-curve secp521r1
crl-verify /etc/openvpn/keys/crl.pem
tls-crypt /etc/openvpn/keys/ta.key
auth none
mssfix 1300
sndbuf 393216
rcvbuf 393216
push "sndbuf 393216"
push "rcvbuf 393216"
# https://community.openvpn.net/openvpn/wiki/VORACLE
#compress lz4-v2
status-version 2
push "dhcp-option DISABLE-NBT"
keepalive 10 60
verb 3
auth none
cipher AES-256-GCM
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
tls-version-min 1.2
persist-key
persist-tun
plugin /usr/lib/openvpn/openvpn-auth-ldap.so /etc/openvpn/auth/auth-ldap.conf login
script-security 2
auth-user-pass-verify "/bin/bash -c 'test \"$common_name\" == \"$username\"'" via-env
duplicate-cn
explicit-exit-notify 0
remote-cert-tls client
fast-io
opt-verify
reneg-sec 86400
mute-replay-warnings
client
dev tun
remote server 1194
proto udp
resolv-retry infinite
auth-retry none
auth-user-pass
nobind
persist-key
persist-tun
tun-mtu 1400
auth none
ecdh-curve secp521r1
cipher AES-256-GCM
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
remote-cert-tls server
mute-replay-warnings
explicit-exit-notify 1
verb 3
mute 20
reneg-sec 0
<ca>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</ca>
<tls-crypt>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
-----END OpenVPN Static key V1-----
</tls-crypt>
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
</key>
<cert>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</cert>
Should I disable "opt-verify" when ios clients want to connect?
If an ios client connect to the server, I get an error
Code: Select all
WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1449', remote='link-mtu 1421'
Option inconsistency warnings triggering disconnect due to --opt-verify
server.conf
server 172.31.252.0 255.255.255.0
topology subnet
user nobody
group nogroup
dev tun0
proto udp6
port 1194
ca /etc/openvpn/keys/ca.crt
cert /etc/openvpn/keys/server.crt
key /etc/openvpn/keys/server.key
dh none
ecdh-curve secp521r1
crl-verify /etc/openvpn/keys/crl.pem
tls-crypt /etc/openvpn/keys/ta.key
auth none
mssfix 1300
sndbuf 393216
rcvbuf 393216
push "sndbuf 393216"
push "rcvbuf 393216"
# https://community.openvpn.net/openvpn/wiki/VORACLE
#compress lz4-v2
status-version 2
push "dhcp-option DISABLE-NBT"
keepalive 10 60
verb 3
auth none
cipher AES-256-GCM
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
tls-version-min 1.2
persist-key
persist-tun
plugin /usr/lib/openvpn/openvpn-auth-ldap.so /etc/openvpn/auth/auth-ldap.conf login
script-security 2
auth-user-pass-verify "/bin/bash -c 'test \"$common_name\" == \"$username\"'" via-env
duplicate-cn
explicit-exit-notify 0
remote-cert-tls client
fast-io
opt-verify
reneg-sec 86400
mute-replay-warnings
client.ovpn
client
dev tun
remote server 1194
proto udp
resolv-retry infinite
auth-retry none
auth-user-pass
nobind
persist-key
persist-tun
tun-mtu 1400
auth none
ecdh-curve secp521r1
cipher AES-256-GCM
tls-cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
remote-cert-tls server
mute-replay-warnings
explicit-exit-notify 1
verb 3
mute 20
reneg-sec 0
<ca>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</ca>
<tls-crypt>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
-----END OpenVPN Static key V1-----
</tls-crypt>
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
</key>
<cert>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</cert>
Should I disable "opt-verify" when ios clients want to connect?