Re: VPN seems to connect but fails to get a response from the peer

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello again Dan, sorry for the delayed response.

On Thu, Oct 24, 2019 at 2:46 PM Daniel Lenski <dlenski@xxxxxxxxx> wrote:
>
> Interesting. Even in your more verbose log, it appears that
> OpenConnect is totally and entirely failing to receive any response
> over the DTLS channel… except for the MTU DPD probe at the beginning.
>
> This is why I suggest upgrading to a more recent version in which
> David Woodhouse has made the DTLS MTU detection much more robust and…
>

I updated to:

OpenConnect version v8.05
Using GnuTLS. Features present: PKCS#11, HOTP software token, TOTP
software token, System keys, DTLS, ESP
Supported protocols: anyconnect (default), nc, gp, pulse

Unfortunately I appear to be having the same problems.

>
> … and also I'm quite surprised that --no-dtls does not make a
> difference. This option makes OpenConnect communicate entirely over
> the HTTPS/TLS channel which is already used for authentication, and
> not try to open a DTLS channel at all.
>
> You're *sure* it makes no difference? No ability to receive any
> packets the VPN server over the TLS channel? No additional clues in
> the log with `--no-dtls -vvv --dump`?
>

Here is the log from v8.05 using --no-dtls:

POST https://cpvpn.ncep.noaa.gov/cac/
Attempting to connect to server 140.90.73.186:443
Connected to 140.90.73.186:443
Using PKCS#11 certificate <DELETED>
Trying PKCS#11 key URL <DELETED>
Using PKCS#11 key <DELETED>
Using client certificate '<DELETED>
Got no issuer from PKCS#11
Adding supporting CA 'DOD EMAIL CA-51'
SSL negotiation with cpvpn.ncep.noaa.gov
Connected to HTTPS on cpvpn.ncep.noaa.gov
> POST /cac/ HTTP/1.1
> Host: cpvpn.ncep.noaa.gov
> User-Agent: Open AnyConnect VPN Agent v8.05
> Accept: */*
> Accept-Encoding: identity
> X-Transcend-Version: 1
> X-Aggregate-Auth: 1
> X-AnyConnect-Platform: linux-64
> X-Support-HTTP-Auth: true
> X-Pad: 00000000000000000000000000000000000000
> Content-Type: application/x-www-form-urlencoded
> Content-Length: 218
>
> <?xml version="1.0" encoding="UTF-8"?>
> <config-auth client="vpn" type="init"><version who="vpn">v8.05</version><device-id>linux-64</device-id><group-access>https://cpvpn.ncep.noaa.gov/cac/</group-access></config-auth>
Got HTTP response: HTTP/1.0 302 Temporary moved
Set-Cookie: tg=<DELETED>=; path=/; secure
Content-Length: 0
Cache-Control: no-cache
Pragma: no-cache
Connection: Close
Date: Fri, 01 Nov 2019 20:38:10 GMT
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; preload;
Location: /+webvpn+/index.html
HTTP body length:  (0)
GET https://cpvpn.ncep.noaa.gov/cac/
Attempting to connect to server 140.90.73.186:443
Connected to 140.90.73.186:443
SSL negotiation with cpvpn.ncep.noaa.gov
Connected to HTTPS on cpvpn.ncep.noaa.gov
> GET /cac/ HTTP/1.1
> Host: cpvpn.ncep.noaa.gov
> User-Agent: Open AnyConnect VPN Agent v8.05
> Cookie: tg=<DELETED>=
> Accept: */*
> Accept-Encoding: identity
> X-Transcend-Version: 1
> X-Support-HTTP-Auth: true
>
Got HTTP response: HTTP/1.0 302 Temporary moved
Set-Cookie: tg=<DELETED>=; path=/; secure
Content-Length: 0
Cache-Control: no-cache
Pragma: no-cache
Connection: Close
Date: Fri, 01 Nov 2019 20:38:12 GMT
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; preload;
Location: /+webvpn+/index.html
HTTP body length:  (0)
GET https://cpvpn.ncep.noaa.gov/+webvpn+/index.html
SSL negotiation with cpvpn.ncep.noaa.gov
Connected to HTTPS on cpvpn.ncep.noaa.gov
> GET /+webvpn+/index.html HTTP/1.1
> Host: cpvpn.ncep.noaa.gov
> User-Agent: Open AnyConnect VPN Agent v8.05
> Cookie: tg=<DELETED>=
> Accept: */*
> Accept-Encoding: identity
> X-Transcend-Version: 1
> X-Support-HTTP-Auth: true
>
Got HTTP response: HTTP/1.1 200 OK
Strict-Transport-Security: max-age=31536000; preload;
Transfer-Encoding: chunked
Content-Type: text/xml
Cache-Control: max-age=0
Set-Cookie: webvpnlogin=; expires=Thu, 01 Jan 1970 22:00:00 GMT; path=/; secure
Set-Cookie: webvpn_as=; expires=Thu, 01 Jan 1970 22:00:00 GMT; path=/; secure
Set-Cookie: samlPreauthSessionHash=; expires=Thu, 01 Jan 1970 22:00:00
GMT; path=/; secure
Set-Cookie: acSamlv2Token=; expires=Thu, 01 Jan 1970 22:00:00 GMT;
path=/; secure
Set-Cookie: acSamlv2Error=; expires=Thu, 01 Jan 1970 22:00:00 GMT;
path=/; secure
Set-Cookie: tg=<DELETED>=; expires=Sat, 02 Nov 2019 08:38:14 GMT; path=/; secure
Set-Cookie: webvpn=<elided>; path=/; secure
Set-Cookie: webvpnc=bu:/CACHE/stc/&p:t&iu:1/&ch:<DELETED>:/+CSCOT+/translation-table?textdomain%3DAnyConnect%26type%3Dmanifest;
path=/; secure
Set-Cookie: webvpnx=
Set-Cookie: webvpnaac=1; path=/; secure
X-Frame-Options: SAMEORIGIN
X-Transcend-Version: 1
HTTP body chunked (-2)
< <?xml version="1.0" encoding="UTF-8"?>
< <auth id="success">
< <title>SSL VPN Service</title>
< <message>Success</message>
< <success/>
< </auth>
<
<
SSL negotiation with cpvpn.ncep.noaa.gov
Connected to HTTPS on cpvpn.ncep.noaa.gov
TCP_INFO rcv mss 1448, snd mss 1448, adv mss 1448, pmtu 1500
> CONNECT /CSCOSSLC/tunnel HTTP/1.1
> Host: cpvpn.ncep.noaa.gov
> User-Agent: Open AnyConnect VPN Agent v8.05
> Cookie: webvpn=<DELETED>
> X-CSTP-Version: 1
> X-CSTP-Hostname: localhost
> X-CSTP-Accept-Encoding: lzs
> X-CSTP-Base-MTU: 1500
> X-CSTP-MTU: 1390
> X-CSTP-Address-Type: IPv6,IPv4
> X-CSTP-Full-IPv6-Capability: true
>
Got CONNECT response: HTTP/1.1 200 OK
X-CSTP-Version: 1
X-CSTP-Protocol: Copyright (c) 2004 Cisco Systems, Inc.
X-CSTP-Address: 192.168.56.204
X-CSTP-Netmask: 255.255.255.0
X-CSTP-Hostname: NCOFW2.ncep.noaa.gov
X-CSTP-DNS: 10.90.110.51
X-CSTP-DNS: 10.90.110.52
X-CSTP-Lease-Duration: 1209600
X-CSTP-Session-Timeout: none
X-CSTP-Session-Timeout-Alert-Interval: 60
X-CSTP-Session-Timeout-Remaining: none
X-CSTP-Idle-Timeout: 1800
X-CSTP-Disconnected-Timeout: 1800
X-CSTP-Default-Domain: ncepad.noaa.gov
X-CSTP-Keep: true
X-CSTP-Tunnel-All-DNS: false
X-CSTP-DPD: 30
X-CSTP-Keepalive: 20
X-CSTP-MSIE-Proxy-Lockdown: true
X-CSTP-Smartcard-Removal-Disconnect: false
X-CSTP-MTU: 1383
X-CSTP-Routing-Filtering-Ignore: false
X-CSTP-Quarantine: false
X-CSTP-Disable-Always-On-VPN: false
X-CSTP-Client-Bypass-Protocol: false
X-CSTP-TCP-Keepalive: true
CSTP connected. DPD 30, Keepalive 20
CSTP Ciphersuite: (TLS1.2)-(DHE-RSA-1024)-(AES-256-CBC)-(SHA256)
Connected as 192.168.56.204, using SSL, with DTLS disabled
Sending uncompressed data packet of 76 bytes
Sending uncompressed data packet of 60 bytes
Sending uncompressed data packet of 201 bytes
No work to do; sleeping for 20000 ms...
Sending uncompressed data packet of 76 bytes
No work to do; sleeping for 20000 ms...
Sending uncompressed data packet of 201 bytes
... <skipping a lot of this> ...
Sending uncompressed data packet of 52 bytes
No work to do; sleeping for 4000 ms...
Sending uncompressed data packet of 52 bytes
No work to do; sleeping for 4000 ms...
Sending uncompressed data packet of 84 bytes
No work to do; sleeping for 4000 ms...
Sending uncompressed data packet of 87 bytes
No work to do; sleeping for 3000 ms...
Sending uncompressed data packet of 52 bytes
No work to do; sleeping for 3000 ms...
Sending uncompressed data packet of 52 bytes
No work to do; sleeping for 3000 ms...
Sending uncompressed data packet of 60 bytes
Sending uncompressed data packet of 60 bytes
No work to do; sleeping for 3000 ms...
Sending uncompressed data packet of 84 bytes
No work to do; sleeping for 3000 ms...
Sending uncompressed data packet of 60 bytes
No work to do; sleeping for 2000 ms...
Sending uncompressed data packet of 60 bytes
Sending uncompressed data packet of 60 bytes
No work to do; sleeping for 2000 ms...
Sending uncompressed data packet of 84 bytes
No work to do; sleeping for 2000 ms...
Sending uncompressed data packet of 64 bytes
No work to do; sleeping for 1000 ms...
No work to do; sleeping for 1000 ms...
No work to do; sleeping for 1000 ms...
No work to do; sleeping for 1000 ms...
sleep 10s, remaining timeout 300s
sleep 20s, remaining timeout 290s
User cancelled (SIGINT/SIGTERM); exiting.

On the command line, I saw:

avrammeir@localhost:~$ sudo openconnect -vvv --dump --no-dtls -u
adam.allgood --cafile='/home/avrammeir/Downloads/UserNSSDB
6cd262f44f10e19bc2ba48_DOD EMAIL CA-51 - U.S.pem' -c '<DELETED>'
cpvpn.ncep.noaa.gov/cac/ > no-dtls.txt
PIN required for <DELETED>
Enter PIN:
CSTP Dead Peer Detection detected dead peer!
unknown reason 'attempt-reconnect'. Maybe vpnc-script is out of date
Script '/usr/share/vpnc-scripts/vpnc-script' returned error 1
Failed to reconnect to host cpvpn.ncep.noaa.gov: Connection timed out
unknown reason 'attempt-reconnect'. Maybe vpnc-script is out of date
Script '/usr/share/vpnc-scripts/vpnc-script' returned error 1
^CSocket connect canceled

Is there any information in this that can suggest why I'm receiving no
response after connecting? I would assume it's something wrong with
the way my office has configured the VPN, but AnyConnect on Windows
has no problems.

Thanks again!
Adam

_______________________________________________
openconnect-devel mailing list
openconnect-devel@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/openconnect-devel




[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux