Page 1 of 1

client and server handshake in openvpn

Posted: Thu Jul 29, 2021 6:58 am
by wahabraja
Hi everyone,

I want to know how the OpenVPN server handshake with its clients, wanted to verify the handshake process through wireshark but didn't find any packet containing client or server hello. Is there any other process or underlying protocol is used?

Any help in this regard would be highly appreciated.

Regards

Re: client and server handshake in openvpn

Posted: Mon Mar 21, 2022 4:08 pm
by openvpn_inc
I know this is a very old post (and the poster never came back since 2 days after registering), but in case someone else wonders the same thing, it simply is not possible in network sniffing, because all packets are encrypted.

I suppose you could turn off encryption and sniff that traffic, but it might be quicker to just Read The Fine Source Code.

regards, rob0

Re: client and server handshake in openvpn

Posted: Tue Apr 05, 2022 11:53 am
by bekzclz11
The SSL or TLS handshake enables the SSL or TLS client and server to establish the secret keys with which they communicate. This section provides a summary of the steps that enable the SSL or TLS client and server to communicate with each other: Agree on the version of the protocol to use.

Re: client and server handshake in openvpn

Posted: Mon May 02, 2022 10:44 am
by bekzclz11
OpenVPN is a full-featured SSL VPN which implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or username/password credentials, and allows user or group-specific access control policies ...

To fix this issue, you must add remote-cert-tls server to the OpenVPN file that is generated from the BR500. Changing this file allows the server to check the certificate again when connecting to the OpenVPN.