Hello everyone,
I am trying to connect to different VPN services, I use the openvpn plugin to import .ovpn files, but I always get this message "The connection attempt to the VPN service timed out. "
I tried to stop the firewall but nothing changed.
this is the output of journalctl -f
ahmose@susie:~> journalctl -f
Hint: You are currently not seeing messages from other users and the system.
Users in the 'systemd-journal' group can see all messages. Pass -q to
turn off this notice.
Feb 07 10:46:54 susie polkit-kde-authentication-agent-1[2416]: Finishing obtaining privileges
Feb 07 10:46:54 susie polkit-kde-authentication-agent-1[2416]: Listener adapter polkit_qt_listener_initiate_authentication_finish
Feb 07 10:46:54 susie polkit-kde-authentication-agent-1[2416]: polkit_qt_listener_initiate_authentication_finish callback for 0x557ebfdbbc00
Feb 07 10:46:54 susie polkit-kde-authentication-agent-1[2416]: Finish obtain authorization: true
Feb 07 10:46:54 susie kwin_x11[2320]: kwin_core: XCB error: 152 (BadDamage), sequence: 30838, resource id: 10618703, major code: 143 (DAMAGE), minor code: 3 (Subtract)
Feb 07 10:46:54 susie kded5[2317]: kf.networkmanagerqt: void NetworkManager::ConnectionPrivate::onPropertiesChanged(const QVariantMap&) Unhandled property "VersionId"
Feb 07 10:46:54 susie kded5[2317]: org.kde.plasma.nm.kded: Unhandled VPN connection state change: NetworkManager::VpnConnection::Connecting
Feb 07 10:46:54 susie plasmashell[2379]: kf.networkmanagerqt: void NetworkManager::ConnectionPrivate::onPropertiesChanged(const QVariantMap&) Unhandled property "VersionId"
Feb 07 10:47:54 susie plasmashell[2379]: Could not find the Plasmoid for Plasma::FrameSvgItem(0x557b88c65100) QQmlContext(0x557b85869650) QUrl("file:///usr/share/plasma/plasmoids/org.kde.plasma.notifications/contents/ui/global/Globals.qml")
Feb 07 10:47:54 susie plasmashell[2379]: Could not find the Plasmoid for Plasma::FrameSvgItem(0x557b88c65100) QQmlContext(0x557b85869650) QUrl("file:///usr/share/plasma/plasmoids/org.kde.plasma.notifications/contents/ui/global/Globals.qml")
Hi,
I really appreciate your time, thank you!
here is the output:
ahmose@susie:~/Downloads> sudo openvpn --config credentials.ovpn
[sudo] password for root:
2024-02-07 23:49:24 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2024-02-07 23:49:24 OpenVPN 2.6.8 x86_64-suse-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD]
2024-02-07 23:49:24 library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10
Enter Auth Username: xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Enter Auth Password: ********************************
2024-02-07 23:50:15 TCP/UDP: Preserving recently used remote address: [AF_INET]89.33.246.54:1194
2024-02-07 23:50:15 UDPv4 link local: (not bound)
2024-02-07 23:50:15 UDPv4 link remote: [AF_INET]89.33.246.54:1194
2024-02-07 23:50:15 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2024-02-07 23:51:15 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2024-02-07 23:51:15 TLS Error: TLS handshake failed
2024-02-07 23:51:15 SIGUSR1[soft,tls-error] received, process restarting
2024-02-07 23:51:17 TCP/UDP: Preserving recently used remote address: [AF_INET]89.46.102.98:1194
Can you check the content of the .ovpn file and check the address after the line starting with “remote”, does it respond to ping? Unless you do not want to share which VPN you are using, can you share that address?
If pinging the host is working can you repeat the openvpn command but now with “–verb 3” added? That should give additional debug output on the TLS negotiations & route info.
ahmose@susie:~> ping location-pub-kl--moldova-chisinau.aura-servers.com
PING location-pub-kl--moldova-chisinau.aura-servers.com (89.33.246.54) 56(84) bytes of data.
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=1 ttl=54 time=113 ms
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=2 ttl=54 time=109 ms
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=3 ttl=54 time=109 ms
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=4 ttl=54 time=111 ms
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=5 ttl=54 time=110 ms
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=6 ttl=54 time=109 ms
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=7 ttl=54 time=142 ms
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=8 ttl=54 time=140 ms
64 bytes from secret.unitoros.com (89.33.246.54): icmp_seq=9 ttl=54 time=111 ms
and this is the command with --verb 3
ahmose@susie:~/Downloads> sudo openvpn --verb 3 --config credentials.ovpn
2024-02-08 00:39:12 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2024-02-08 00:39:12 OpenVPN 2.6.8 x86_64-suse-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD]
2024-02-08 00:39:12 library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10
Enter Auth Username: 11ef75d5db3833cd8a580557e1b05b3a
Enter Auth Password: ********************************
2024-02-08 00:39:58 TCP/UDP: Preserving recently used remote address: [AF_INET]89.33.246.54:1194
2024-02-08 00:39:58 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-02-08 00:39:58 UDPv4 link local: (not bound)
2024-02-08 00:39:58 UDPv4 link remote: [AF_INET]89.33.246.54:1194
2024-02-08 00:39:58 TLS: Initial packet from [AF_INET]89.33.246.54:1194, sid=82040a5a fd228932
2024-02-08 00:39:58 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2024-02-08 00:40:58 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2024-02-08 00:40:58 TLS Error: TLS handshake failed
2024-02-08 00:40:58 SIGUSR1[soft,tls-error] received, process restarting
2024-02-08 00:40:58 Restart pause, 1 second(s)
2024-02-08 00:41:00 TCP/UDP: Preserving recently used remote address: [AF_INET]89.46.102.98:1194
2024-02-08 00:41:00 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-02-08 00:41:00 UDPv4 link local: (not bound)
2024-02-08 00:41:00 UDPv4 link remote: [AF_INET]89.46.102.98:1194
2024-02-08 00:41:00 TLS: Initial packet from [AF_INET]89.46.102.98:1194, sid=6dde77ed d0006542
2024-02-08 00:42:00 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2024-02-08 00:42:00 TLS Error: TLS handshake failed
2024-02-08 00:42:00 SIGUSR1[soft,tls-error] received, process restarting
2024-02-08 00:42:00 Restart pause, 1 second(s)
2024-02-08 00:42:02 TCP/UDP: Preserving recently used remote address: [AF_INET]89.33.246.54:1194
2024-02-08 00:42:02 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-02-08 00:42:02 UDPv4 link local: (not bound)
2024-02-08 00:42:02 UDPv4 link remote: [AF_INET]89.33.246.54:1194
2024-02-08 00:42:02 TLS: Initial packet from [AF_INET]89.33.246.54:1194, sid=f1482d72 3e15eb40
2024-02-08 00:43:02 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2024-02-08 00:43:02 TLS Error: TLS handshake failed
2024-02-08 00:43:02 SIGUSR1[soft,tls-error] received, process restarting
2024-02-08 00:43:02 Restart pause, 1 second(s)
2024-02-08 00:43:04 TCP/UDP: Preserving recently used remote address: [AF_INET]89.33.246.54:1194
2024-02-08 00:43:04 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-02-08 00:43:04 UDPv4 link local: (not bound)
2024-02-08 00:43:04 UDPv4 link remote: [AF_INET]89.33.246.54:1194
2024-02-08 00:43:04 TLS: Initial packet from [AF_INET]89.33.246.54:1194, sid=2d27bffb 4878e968
2024-02-08 00:44:04 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2024-02-08 00:44:04 TLS Error: TLS handshake failed
2024-02-08 00:44:04 SIGUSR1[soft,tls-error] received, process restarting
2024-02-08 00:44:04 Restart pause, 1 second(s)
2024-02-08 00:44:06 TCP/UDP: Preserving recently used remote address: [AF_INET]185.210.218.86:1194
2024-02-08 00:44:06 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-02-08 00:44:06 UDPv4 link local: (not bound)
2024-02-08 00:44:06 UDPv4 link remote: [AF_INET]185.210.218.86:1194
2024-02-08 00:44:06 TLS: Initial packet from [AF_INET]185.210.218.86:1194, sid=6c9d93db 2d6e5ddb
by the way, The vpn works well on windows and mobile phone, I have this problem only with Linux!
If the same VPN works with Windows/Mobile phone (also ovpn I assume) I think the problem could have to do with what the first line of debug output is try to say:
Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Likely tumbleweed is using this newer version of OpenVPN while Windows uses on older version.
Actually it was the kaspersky vpn application for windows and android, didn’t try an openvpn application though, however making it work on opensuse is the most important for me.
i have checked if i can downgrade openvpn to older versions but i found nothing but a 2.4 version on a home repository which i’m scared to try!
ahmose@susie:~/Downloads> sudo openvpn --data-ciphers-fallback BF-CBC --config credentials.ovpn
[sudo] password for root:
2024-02-08 10:29:03 OpenVPN 2.6.8 x86_64-suse-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD]
2024-02-08 10:29:03 library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10
Enter Auth Username: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Enter Auth Password: ********************************
2024-02-08 10:29:41 Cipher BF-CBC not supported
2024-02-08 10:29:41 Exiting due to fatal error
I used kaspersky products because it is the easiest to access in Egypt as we suffer from vpn websites being blocked, lots of websites are blocked, cannot purchase online products with any of hard currencies but kaspersky accepts EGP, that’s why!
please tell me if you have a suggestion of a vpn that i could just try to make sure it will work.
something came to my mind now as i heard that many vpn services are not working here
could my ISP be able to block the openvpn protocol meanwhile it didn’t block the Catapuly hydra!!!
Okay, you tried data-ciphers-fallback, would be good to mention that discussing things, I can not see what you are doing. Likely OpenVPN on Tumbleweed is not going to work
Apparently it is a fight between “let’s have a default that works” and “let’s not weaken security too easily”.
Checking the log you provided I see UDP is used, one thing you can also try is TCP.
You can find that in the .ovpn file, change “proto upd” to “proto tcp”. If that also does not work, please post once more the output but with --verb 5 so that packets are logged using the R and W characters.
Bitcoin and crypto is illegal here, and maybe the main reason for wanting a vpn is to reach binance and kucoin websites etc…
wireguard is connected but no data received!