Import *.ovpn ignores <tlscrypt-v2>
Posted: Tue Jul 26, 2022 1:40 pm
can you help me? Commenting out the "tlscrypt-v2" line on the server, the client works normally with this .ovpn profile file. My server is debian OpenVPN 2.6_git
Thanks a lot for the help
My log:
[Jul 25, 2022, 19:34:11] OpenVPN core 3.git::d3f8b18b win x86_64 64-bit built on Mar 17 2022 11:42:02
⏎[Jul 25, 2022, 19:34:11] Frame=512/2048/512 mssfix-ctrl=1250
⏎[Jul 25, 2022, 19:34:11] UNUSED OPTIONS
0 [tls-client]
2 [verify-client-cert] [require]
9 [resolv-retry] [infinite]
10 [nobind]
11 [persist-key]
12 [persist-tun]
13 [mute-replay-warnings]
18 [tlscrypt-v2] [-----BEGIN OpenVPN tls-crypt-v2 client key----- JV/lVob7sdGcPOIB...]
20 [auth-nocache]
22 [verb] [3]
23 [mute] [10]
⏎[Jul 25, 2022, 19:34:11] EVENT: RESOLVE ⏎[Jul 25, 2022, 19:34:11] Contacting xxx.xxx.xxx.xxx:1194 via UDP
⏎[Jul 25, 2022, 19:34:11] EVENT: WAIT ⏎[Jul 25, 2022, 19:34:11] WinCommandAgent: transmitting bypass route to xxx.xxx.xxx.xxx
{
"host" : "xxx.xxx.xxx.xxx",
"ipv6" : false
}
⏎[Jul 25, 2022, 19:34:11] Connecting to [lalalalala.com]:1194 (xxx.xxx.xxx.xxx) via UDPv4
⏎[Jul 25, 2022, 19:34:11] EVENT: CONNECTING ⏎[Jul 25, 2022, 19:34:12] Tunnel Options:V4,dev-type tun,link-mtu 1521,tun-mtu 1500,proto UDPv4,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client
⏎[Jul 25, 2022, 19:34:12] Creds: UsernameEmpty/PasswordEmpty
⏎[Jul 25, 2022, 19:34:12] Peer Info:
IV_VER=3.git::d3f8b18b
IV_PLAT=win
IV_NCP=2
IV_TCPNL=1
IV_PROTO=30
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
IV_AUTO_SESS=1
IV_GUI_VER=OCWindows_3.3.6-2752
IV_SSO=webauth,openurl,crtext
⏎[Jul 25, 2022, 19:34:12] SSL Handshake: peer certificate: CN=Server, 384 bit EC, curve:secp384r1, cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
Thanks a lot for the help
My log:
[Jul 25, 2022, 19:34:11] OpenVPN core 3.git::d3f8b18b win x86_64 64-bit built on Mar 17 2022 11:42:02
⏎[Jul 25, 2022, 19:34:11] Frame=512/2048/512 mssfix-ctrl=1250
⏎[Jul 25, 2022, 19:34:11] UNUSED OPTIONS
0 [tls-client]
2 [verify-client-cert] [require]
9 [resolv-retry] [infinite]
10 [nobind]
11 [persist-key]
12 [persist-tun]
13 [mute-replay-warnings]
18 [tlscrypt-v2] [-----BEGIN OpenVPN tls-crypt-v2 client key----- JV/lVob7sdGcPOIB...]
20 [auth-nocache]
22 [verb] [3]
23 [mute] [10]
⏎[Jul 25, 2022, 19:34:11] EVENT: RESOLVE ⏎[Jul 25, 2022, 19:34:11] Contacting xxx.xxx.xxx.xxx:1194 via UDP
⏎[Jul 25, 2022, 19:34:11] EVENT: WAIT ⏎[Jul 25, 2022, 19:34:11] WinCommandAgent: transmitting bypass route to xxx.xxx.xxx.xxx
{
"host" : "xxx.xxx.xxx.xxx",
"ipv6" : false
}
⏎[Jul 25, 2022, 19:34:11] Connecting to [lalalalala.com]:1194 (xxx.xxx.xxx.xxx) via UDPv4
⏎[Jul 25, 2022, 19:34:11] EVENT: CONNECTING ⏎[Jul 25, 2022, 19:34:12] Tunnel Options:V4,dev-type tun,link-mtu 1521,tun-mtu 1500,proto UDPv4,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client
⏎[Jul 25, 2022, 19:34:12] Creds: UsernameEmpty/PasswordEmpty
⏎[Jul 25, 2022, 19:34:12] Peer Info:
IV_VER=3.git::d3f8b18b
IV_PLAT=win
IV_NCP=2
IV_TCPNL=1
IV_PROTO=30
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
IV_AUTO_SESS=1
IV_GUI_VER=OCWindows_3.3.6-2752
IV_SSO=webauth,openurl,crtext
⏎[Jul 25, 2022, 19:34:12] SSL Handshake: peer certificate: CN=Server, 384 bit EC, curve:secp384r1, cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD