SIGUSR1[soft,connection-reset] received, process restarting. constantly! every 5 seconds
Posted: Mon Aug 07, 2023 6:51 pm
I have a good working Openvpn Server 2.5.5. on Ubuntu 22.04.1 LTS and a lot of clients (Ubuntu 18.04 Openvpn 2.4.4) with the same key.
All clients are good, but one client stopped working accidentally
it constantly change ip from server
ip addr | grep 'inet.*tun0' | cut -d ' ' -f 6 - every some seconds - new ip
I don't know how to fix, HELP!!
persist-remote-ip
persist-local-ip - not helped
##.##.##.## - real server ip
client.log: <during 5 sec> (--verb 5)
TCP connection established with [AF_INET]##.##.##.##:1194
TCP_CLIENT link local: (not bound)
TCP_CLIENT link remote: [AF_INET]##.##.##.##:1194
TLS: Initial packet from [AF_INET]##.##.##.##:1194, sid=86b15108 ccdb6028
VERIFY OK: depth=1, CN=server
VERIFY KU OK
Validating certificate extended key usage
++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
VERIFY EKU OK
VERIFY OK: depth=0, CN=server
Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
[server] Peer Connection Initiated with [AF_INET]##.##.##.##:1194
SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
PUSH: Received control message: 'PUSH_REPLY,route 10.100.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.100.4.174 10.100.4.173,peer-id 0,ci
OPTIONS IMPORT: timers and/or timeouts modified
OPTIONS IMPORT: --ifconfig/up options modified
OPTIONS IMPORT: route options modified
OPTIONS IMPORT: peer-id set
OPTIONS IMPORT: adjusting link_mtu to 1627
OPTIONS IMPORT: data channel crypto options modified
Data Channel: using negotiated cipher 'AES-256-GCM'
Data Channel MTU parms [ L:1555 D:1450 EF:55 EB:406 ET:0 EL:3 ]
Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Preserving previous TUN/TAP instance: tun0
NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
/sbin/ip route del 10.100.0.0/16
Closing TUN/TAP interface
/sbin/ip addr del dev tun0 local 10.100.4.134 peer 10.100.4.133
ROUTE_GATEWAY 192.168.8.1/255.255.255.0 IFACE=enx0c5b8f279a64 HWADDR=0c:5b:8f:27:9a:64
TUN/TAP device tun0 opened
TUN/TAP TX queue length set to 100
do_ifconfig, tt->did_ifconfig_ipv6_setup=0
/sbin/ip link set dev tun0 up mtu 1500
/sbin/ip addr add dev tun0 local 10.100.4.174 peer 10.100.4.173
/sbin/ip route add 10.100.0.0/16 via 10.100.4.173
Initialization Sequence Completed
Connection reset, restarting [-1]
TCP/UDP: Closing socket
SIGUSR1[soft,connection-reset] received, process restarting
Restart pause, 5 second(s)
server.log:<every 9 seconds> (--verb 5)
WRwRwrWRRwrWR2023-08-07 19:55:05 us=271626 pak/##.##.##.##:42742 [pak] Inactivity timeout (--ping-restart), restarting
2023-08-07 19:55:05 us=271656 pak/##.##.##.##:42742 SIGUSR1[soft,ping-restart] received, client-instance restarting
All clients are good, but one client stopped working accidentally
it constantly change ip from server
ip addr | grep 'inet.*tun0' | cut -d ' ' -f 6 - every some seconds - new ip
I don't know how to fix, HELP!!
persist-remote-ip
persist-local-ip - not helped
##.##.##.## - real server ip
client.log: <during 5 sec> (--verb 5)
TCP connection established with [AF_INET]##.##.##.##:1194
TCP_CLIENT link local: (not bound)
TCP_CLIENT link remote: [AF_INET]##.##.##.##:1194
TLS: Initial packet from [AF_INET]##.##.##.##:1194, sid=86b15108 ccdb6028
VERIFY OK: depth=1, CN=server
VERIFY KU OK
Validating certificate extended key usage
++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
VERIFY EKU OK
VERIFY OK: depth=0, CN=server
Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
[server] Peer Connection Initiated with [AF_INET]##.##.##.##:1194
SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
PUSH: Received control message: 'PUSH_REPLY,route 10.100.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.100.4.174 10.100.4.173,peer-id 0,ci
OPTIONS IMPORT: timers and/or timeouts modified
OPTIONS IMPORT: --ifconfig/up options modified
OPTIONS IMPORT: route options modified
OPTIONS IMPORT: peer-id set
OPTIONS IMPORT: adjusting link_mtu to 1627
OPTIONS IMPORT: data channel crypto options modified
Data Channel: using negotiated cipher 'AES-256-GCM'
Data Channel MTU parms [ L:1555 D:1450 EF:55 EB:406 ET:0 EL:3 ]
Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Preserving previous TUN/TAP instance: tun0
NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
/sbin/ip route del 10.100.0.0/16
Closing TUN/TAP interface
/sbin/ip addr del dev tun0 local 10.100.4.134 peer 10.100.4.133
ROUTE_GATEWAY 192.168.8.1/255.255.255.0 IFACE=enx0c5b8f279a64 HWADDR=0c:5b:8f:27:9a:64
TUN/TAP device tun0 opened
TUN/TAP TX queue length set to 100
do_ifconfig, tt->did_ifconfig_ipv6_setup=0
/sbin/ip link set dev tun0 up mtu 1500
/sbin/ip addr add dev tun0 local 10.100.4.174 peer 10.100.4.173
/sbin/ip route add 10.100.0.0/16 via 10.100.4.173
Initialization Sequence Completed
Connection reset, restarting [-1]
TCP/UDP: Closing socket
SIGUSR1[soft,connection-reset] received, process restarting
Restart pause, 5 second(s)
server.log:<every 9 seconds> (--verb 5)
WRwRwrWRRwrWR2023-08-07 19:55:05 us=271626 pak/##.##.##.##:42742 [pak] Inactivity timeout (--ping-restart), restarting
2023-08-07 19:55:05 us=271656 pak/##.##.##.##:42742 SIGUSR1[soft,ping-restart] received, client-instance restarting
client.conf
#
client
dev tun
proto tcp
remote ##.##.##.## 1194
resolv-retry infinite
user nobody
group nobody
persist-key
persist-tun
ca ca.crt
cert pak.crt
key pak.key
remote-cert-tls server
tls-auth ta.key 1
cipher AES-256-CBC
comp-lzo
verb 5
mute 10
client
dev tun
proto tcp
remote ##.##.##.## 1194
resolv-retry infinite
user nobody
group nobody
persist-key
persist-tun
ca ca.crt
cert pak.crt
key pak.key
remote-cert-tls server
tls-auth ta.key 1
cipher AES-256-CBC
comp-lzo
verb 5
mute 10
server.conf
#
port 1194
proto tcp
dev tun
ca ca.crt
cert server.crt
key server.key
dh dh.pem
server 10.100.0.0 255.255.0.0
ifconfig-pool-persist /var/log/openvpn/ipp.txt
client-to-client
duplicate-cn
keepalive 10 120
tls-auth ta.key 0
cipher AES-256-CBC
comp-lzo
max-clients 2048
user nobody
group nogroup
persist-key
persist-tun
status /var/log/openvpn/openvpn-status.log
log /var/log/openvpn/openvpn.log
verb 5
port 1194
proto tcp
dev tun
ca ca.crt
cert server.crt
key server.key
dh dh.pem
server 10.100.0.0 255.255.0.0
ifconfig-pool-persist /var/log/openvpn/ipp.txt
client-to-client
duplicate-cn
keepalive 10 120
tls-auth ta.key 0
cipher AES-256-CBC
comp-lzo
max-clients 2048
user nobody
group nogroup
persist-key
persist-tun
status /var/log/openvpn/openvpn-status.log
log /var/log/openvpn/openvpn.log
verb 5