Assertion failed at crypto.c:162
Posted: Wed Feb 23, 2011 3:41 pm
Could some one help me with this failure
I am connecting a Windows 7 PC to openvpn running on a Debian linux box, using the 2.2 beta windows client
It connects quite happily - I get a connected notification on the Windows 7 box - but almost immediately the connection drops, and on the linux box the server exits. Has to be restarted
Config and log files follow:
Log file (the log on the windows box looks similar)
Wed Feb 23 12:17:47 2011 OpenVPN 2.1_rc11 powerpc-unknown-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] built on Sep 18 2008
Wed Feb 23 12:17:47 2011 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Wed Feb 23 12:17:47 2011 WARNING: file 'keys/sloth/serverkey.key' is group or others accessible
Wed Feb 23 12:17:47 2011 /usr/bin/openssl-vulnkey -q -b 1024 -m <modulus omitted>
Wed Feb 23 12:17:48 2011 WARNING: file 'servers/LinuxServer/ta.key' is group or others accessible
Wed Feb 23 12:17:48 2011 Control Channel Authentication: using 'servers/LinuxServer/ta.key' as a OpenVPN static key file
Wed Feb 23 12:17:48 2011 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 23 12:17:48 2011 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 23 12:17:48 2011 TLS-Auth MTU parms [ L:1539 D:166 EF:66 EB:0 ET:0 EL:0 ]
Wed Feb 23 12:17:48 2011 TUN/TAP device tun0 opened
Wed Feb 23 12:17:48 2011 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Wed Feb 23 12:17:48 2011 Data Channel MTU parms [ L:1539 D:1450 EF:39 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Feb 23 12:17:48 2011 GID set to nogroup
Wed Feb 23 12:17:48 2011 UID set to nobody
Wed Feb 23 12:17:48 2011 UDPv4 link local (bound): [undef]:1194
Wed Feb 23 12:17:48 2011 UDPv4 link remote: [undef]
Wed Feb 23 12:17:48 2011 Initialization Sequence Completed
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Re-using SSL/TLS context
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 LZO compression initialized
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Control Channel MTU parms [ L:1539 D:166 EF:66 EB:0 ET:0 EL:0 ]
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Data Channel MTU parms [ L:1539 D:1450 EF:39 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Local Options hash (VER=V4): '2cc7a368'
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Expected Remote Options hash (VER=V4): 'f8941acb'
Wed Feb 23 12:20:16 2011 109.181.121.74:57937 CRL CHECK OK: /C=UK/ST=England/L=London/O=sloth/emailAddress=server@localhost
Wed Feb 23 12:20:16 2011 109.181.121.74:57937 VERIFY OK: depth=1, /C=UK/ST=England/L=London/O=sloth/emailAddress=server@localhost
Wed Feb 23 12:20:16 2011 109.181.121.74:57937 CRL CHECK OK: /C=UK/ST=England/L=London/O=sloth/OU=Vaio_Notebook/CN=notebook/emailAddress=server@localhost
Wed Feb 23 12:20:16 2011 109.181.121.74:57937 VERIFY OK: depth=0, /C=UK/ST=England/L=London/O=sloth/OU=Vaio_Notebook/CN=notebook/emailAddress=server@localhost
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Data Channel Encrypt: Cipher 'DES-CFB' initialized with 64 bit key
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Data Channel Decrypt: Cipher 'DES-CFB' initialized with 64 bit key
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 [notebook] Peer Connection Initiated with 109.181.121.74:57937
Wed Feb 23 12:20:29 2011 notebook/109.181.121.74:57937 Assertion failed at crypto.c:162
Wed Feb 23 12:20:29 2011 notebook/109.181.121.74:57937 Exiting
Server configuration:
port 1194
proto udp
dev tun0
ca keys/sloth/ca.crt
cert keys/sloth/serverkey.crt
key keys/sloth/serverkey.key
dh keys/sloth/dh1024.pem
server 10.8.0.0 255.255.255.0
crl-verify keys/sloth/crl.pem
ifconfig-pool-persist servers/LinuxServer/logs/ipp.txt
tls-auth servers/LinuxServer/ta.key 0
cipher DES-CFB
user nobody
group nogroup
status servers/LinuxServer/logs/openvpn-status.log
log-append servers/LinuxServer/logs/openvpn.log
verb 2
mute 20
max-clients 2
keepalive 10 120
client-config-dir /etc/openvpn/servers/LinuxServer/ccd
tls-server
comp-lzo
persist-key
persist-tun
ccd-exclusive
push "route 192.168.1.0 255.255.255.0"
client configuration (from the linux box)
client
proto udp
dev tun
ca ca.crt
dh dh1024.pem
cert notebook.crt
key notebook.key
remote hoj.dyndns.org 1194
tls-auth ta.key 1
cipher DES-CFB
user nobody
group nogroup
verb 2
mute 20
keepalive 10 120
comp-lzo
persist-key
persist-tun
float
resolv-retry infinite
nobind
I am connecting a Windows 7 PC to openvpn running on a Debian linux box, using the 2.2 beta windows client
It connects quite happily - I get a connected notification on the Windows 7 box - but almost immediately the connection drops, and on the linux box the server exits. Has to be restarted
Config and log files follow:
Log file (the log on the windows box looks similar)
Wed Feb 23 12:17:47 2011 OpenVPN 2.1_rc11 powerpc-unknown-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] built on Sep 18 2008
Wed Feb 23 12:17:47 2011 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Wed Feb 23 12:17:47 2011 WARNING: file 'keys/sloth/serverkey.key' is group or others accessible
Wed Feb 23 12:17:47 2011 /usr/bin/openssl-vulnkey -q -b 1024 -m <modulus omitted>
Wed Feb 23 12:17:48 2011 WARNING: file 'servers/LinuxServer/ta.key' is group or others accessible
Wed Feb 23 12:17:48 2011 Control Channel Authentication: using 'servers/LinuxServer/ta.key' as a OpenVPN static key file
Wed Feb 23 12:17:48 2011 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 23 12:17:48 2011 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 23 12:17:48 2011 TLS-Auth MTU parms [ L:1539 D:166 EF:66 EB:0 ET:0 EL:0 ]
Wed Feb 23 12:17:48 2011 TUN/TAP device tun0 opened
Wed Feb 23 12:17:48 2011 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Wed Feb 23 12:17:48 2011 Data Channel MTU parms [ L:1539 D:1450 EF:39 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Feb 23 12:17:48 2011 GID set to nogroup
Wed Feb 23 12:17:48 2011 UID set to nobody
Wed Feb 23 12:17:48 2011 UDPv4 link local (bound): [undef]:1194
Wed Feb 23 12:17:48 2011 UDPv4 link remote: [undef]
Wed Feb 23 12:17:48 2011 Initialization Sequence Completed
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Re-using SSL/TLS context
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 LZO compression initialized
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Control Channel MTU parms [ L:1539 D:166 EF:66 EB:0 ET:0 EL:0 ]
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Data Channel MTU parms [ L:1539 D:1450 EF:39 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Local Options hash (VER=V4): '2cc7a368'
Wed Feb 23 12:20:11 2011 109.181.121.74:57937 Expected Remote Options hash (VER=V4): 'f8941acb'
Wed Feb 23 12:20:16 2011 109.181.121.74:57937 CRL CHECK OK: /C=UK/ST=England/L=London/O=sloth/emailAddress=server@localhost
Wed Feb 23 12:20:16 2011 109.181.121.74:57937 VERIFY OK: depth=1, /C=UK/ST=England/L=London/O=sloth/emailAddress=server@localhost
Wed Feb 23 12:20:16 2011 109.181.121.74:57937 CRL CHECK OK: /C=UK/ST=England/L=London/O=sloth/OU=Vaio_Notebook/CN=notebook/emailAddress=server@localhost
Wed Feb 23 12:20:16 2011 109.181.121.74:57937 VERIFY OK: depth=0, /C=UK/ST=England/L=London/O=sloth/OU=Vaio_Notebook/CN=notebook/emailAddress=server@localhost
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Data Channel Encrypt: Cipher 'DES-CFB' initialized with 64 bit key
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Data Channel Decrypt: Cipher 'DES-CFB' initialized with 64 bit key
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Feb 23 12:20:17 2011 109.181.121.74:57937 [notebook] Peer Connection Initiated with 109.181.121.74:57937
Wed Feb 23 12:20:29 2011 notebook/109.181.121.74:57937 Assertion failed at crypto.c:162
Wed Feb 23 12:20:29 2011 notebook/109.181.121.74:57937 Exiting
Server configuration:
port 1194
proto udp
dev tun0
ca keys/sloth/ca.crt
cert keys/sloth/serverkey.crt
key keys/sloth/serverkey.key
dh keys/sloth/dh1024.pem
server 10.8.0.0 255.255.255.0
crl-verify keys/sloth/crl.pem
ifconfig-pool-persist servers/LinuxServer/logs/ipp.txt
tls-auth servers/LinuxServer/ta.key 0
cipher DES-CFB
user nobody
group nogroup
status servers/LinuxServer/logs/openvpn-status.log
log-append servers/LinuxServer/logs/openvpn.log
verb 2
mute 20
max-clients 2
keepalive 10 120
client-config-dir /etc/openvpn/servers/LinuxServer/ccd
tls-server
comp-lzo
persist-key
persist-tun
ccd-exclusive
push "route 192.168.1.0 255.255.255.0"
client configuration (from the linux box)
client
proto udp
dev tun
ca ca.crt
dh dh1024.pem
cert notebook.crt
key notebook.key
remote hoj.dyndns.org 1194
tls-auth ta.key 1
cipher DES-CFB
user nobody
group nogroup
verb 2
mute 20
keepalive 10 120
comp-lzo
persist-key
persist-tun
float
resolv-retry infinite
nobind