Search the Community
Showing results for tags 'TLS rekeying'.
Found 1 result
-
Hi experts, i have a issue i wish to get enlightened a bit. Every time openvpn does a TLS rekeying once a hour. Do I lose connection for 5-6 sek, can you guys explane to me why this happens and what i can do to avoid this?? The system is a dual core 1300Mhz running linux those specs shouldnt be a problem.. I have add the logfile for the rekeying process. LOG: Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: Validating certificate key usage Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: ++ Certificate has key usage 00a0, expects 00a0 Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY KU OK Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: Validating certificate extended key usage Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY EKU OK Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA Best Regards, TM