TLS Error: TLS key negotiation failed to occur within 60 seconds
Posted: Fri Dec 23, 2022 1:23 pm
I happen to get this error when trying to connect to my windows 2019 server with open vpn
The VPN works great but sometimes this error suddenly appears
Often restarting the server fixes it but I can't always restart an operational server.
I tried to reinstall open vpn, restart the service, restart the tap tab, but I can't get it to work I have to restart the whole server.
Fri Dec 23 14:16:06 2022 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Dec 23 14:16:06 2022 TLS Error: TLS handshake failed
_client log
Fri Dec 23 14:15:06 2022 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Fri Dec 23 14:15:06 2022 OpenVPN 2.5.6 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Mar 16 2022
Fri Dec 23 14:15:06 2022 Windows version 10.0 (Windows 10 or greater) 64bit
Fri Dec 23 14:15:06 2022 library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10
Fri Dec 23 14:15:06 2022 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Fri Dec 23 14:15:06 2022 Need hold release from management interface, waiting...
Fri Dec 23 14:15:06 2022 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'state on'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'log all on'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'echo all on'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'bytecount 5'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'hold off'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'hold release'
Fri Dec 23 14:15:06 2022 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Dec 23 14:15:06 2022 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Dec 23 14:15:06 2022 TCP/UDP: Preserving recently used remote address: [AF_INET]XXX.XXX.XXX.XXX:61195
Fri Dec 23 14:15:06 2022 Socket Buffers: R=[65333->65333] S=[65333->65333]
Fri Dec 23 14:15:06 2022 UDP link local: (not bound)
Fri Dec 23 14:15:06 2022 UDP link remote: [AF_INET]XXX.XXX.XXX.XXX:61195
Fri Dec 23 14:15:06 2022 MANAGEMENT: >STATE:1671801306,WAIT,,,,,,
Fri Dec 23 14:16:06 2022 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Dec 23 14:16:06 2022 TLS Error: TLS handshake failed
Fri Dec 23 14:16:06 2022 SIGUSR1[soft,tls-error] received, process restarting
Fri Dec 23 14:16:06 2022 MANAGEMENT: >STATE:1671801366,RECONNECTING,tls-error,,,,,
Fri Dec 23 14:16:06 2022 Restart pause, 5 second(s)
The VPN works great but sometimes this error suddenly appears
Often restarting the server fixes it but I can't always restart an operational server.
I tried to reinstall open vpn, restart the service, restart the tap tab, but I can't get it to work I have to restart the whole server.
Fri Dec 23 14:16:06 2022 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Dec 23 14:16:06 2022 TLS Error: TLS handshake failed
_client log
Fri Dec 23 14:15:06 2022 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Fri Dec 23 14:15:06 2022 OpenVPN 2.5.6 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Mar 16 2022
Fri Dec 23 14:15:06 2022 Windows version 10.0 (Windows 10 or greater) 64bit
Fri Dec 23 14:15:06 2022 library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10
Fri Dec 23 14:15:06 2022 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Fri Dec 23 14:15:06 2022 Need hold release from management interface, waiting...
Fri Dec 23 14:15:06 2022 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'state on'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'log all on'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'echo all on'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'bytecount 5'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'hold off'
Fri Dec 23 14:15:06 2022 MANAGEMENT: CMD 'hold release'
Fri Dec 23 14:15:06 2022 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Dec 23 14:15:06 2022 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Dec 23 14:15:06 2022 TCP/UDP: Preserving recently used remote address: [AF_INET]XXX.XXX.XXX.XXX:61195
Fri Dec 23 14:15:06 2022 Socket Buffers: R=[65333->65333] S=[65333->65333]
Fri Dec 23 14:15:06 2022 UDP link local: (not bound)
Fri Dec 23 14:15:06 2022 UDP link remote: [AF_INET]XXX.XXX.XXX.XXX:61195
Fri Dec 23 14:15:06 2022 MANAGEMENT: >STATE:1671801306,WAIT,,,,,,
Fri Dec 23 14:16:06 2022 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Dec 23 14:16:06 2022 TLS Error: TLS handshake failed
Fri Dec 23 14:16:06 2022 SIGUSR1[soft,tls-error] received, process restarting
Fri Dec 23 14:16:06 2022 MANAGEMENT: >STATE:1671801366,RECONNECTING,tls-error,,,,,
Fri Dec 23 14:16:06 2022 Restart pause, 5 second(s)