For the last year I have had an ASUS AC68U OpenVPN client running Merlin 380.58 connected to an AC68U server running 380.58. Last week I upgraded my client to 380.65_4 and since then I have been experiencing timeouts of the connection after less than 24 hours of operation. The server logs say it is successfully renewing the connection eveyr hour, but the client logs report timeout when trying to renew. Since the server is 2500 miles away and in heavy use, I am reluctant to upgrade its firmware, since if it fails I would have to get on a plane to recover it to operation. Any debugging or recovery suggestions would be welcome.
This is the client log:
Apr 19 07:12:00 openvpn[30730]: VERIFY OK: depth=1, C=US, ST=CA, L=Fremont, O=Mystic Video, OU=server, CN=lab4.mysticvideo.net, name=lab4, emailAddress=thomas@mysticvideo.net
Apr 19 07:12:00 openvpn[30730]: VERIFY OK: depth=0, C=US, ST=CA, L=Fremont, O=Mystic Video, OU=server, CN=lab4, name=lab4, emailAddress=thomas@mysticvideo.net
Apr 19 07:12:00 openvpn[30730]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 19 07:12:00 openvpn[30730]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Apr 19 07:12:00 openvpn[30730]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 19 07:12:00 openvpn[30730]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 19 07:12:00 openvpn[30730]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Apr 19 07:12:00 openvpn[30730]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 19 07:12:00 openvpn[30730]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Apr 19 07:12:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Apr 19 07:12:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS handshake failed
Apr 19 07:12:06 openvpn[30400]: 192.168.157.128 SIGUSR1[soft,tls-error] received, client-instance restarting
Apr 19 07:12:06 openvpn[30400]: 192.168.157.128 TLS: Initial packet from [AF_INET6]::ffff:192.168.157.128:49980, sid=7e6a7e72 d0ed583c
Apr 19 07:13:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Apr 19 07:13:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS handshake failed
Apr 19 07:13:06 openvpn[30400]: 192.168.157.128 SIGUSR1[soft,tls-error] received, client-instance restarting
Apr 19 07:13:06 openvpn[30400]: 192.168.157.128 TLS: Initial packet from [AF_INET6]::ffff:192.168.157.128:52931, sid=3829a638 871d55f8
Apr 19 07:14:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Apr 19 07:14:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS handshake failed
Apr 19 07:14:06 openvpn[30400]: 192.168.157.128 SIGUSR1[soft,tls-error] received, client-instance restarting
Apr 19 07:14:07 openvpn[30400]: 192.168.157.128 TLS: Initial packet from [AF_INET6]::ffff:192.168.157.128:52
This is the client log:
Apr 19 07:12:00 openvpn[30730]: VERIFY OK: depth=1, C=US, ST=CA, L=Fremont, O=Mystic Video, OU=server, CN=lab4.mysticvideo.net, name=lab4, emailAddress=thomas@mysticvideo.net
Apr 19 07:12:00 openvpn[30730]: VERIFY OK: depth=0, C=US, ST=CA, L=Fremont, O=Mystic Video, OU=server, CN=lab4, name=lab4, emailAddress=thomas@mysticvideo.net
Apr 19 07:12:00 openvpn[30730]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 19 07:12:00 openvpn[30730]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Apr 19 07:12:00 openvpn[30730]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 19 07:12:00 openvpn[30730]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 19 07:12:00 openvpn[30730]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Apr 19 07:12:00 openvpn[30730]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 19 07:12:00 openvpn[30730]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Apr 19 07:12:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Apr 19 07:12:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS handshake failed
Apr 19 07:12:06 openvpn[30400]: 192.168.157.128 SIGUSR1[soft,tls-error] received, client-instance restarting
Apr 19 07:12:06 openvpn[30400]: 192.168.157.128 TLS: Initial packet from [AF_INET6]::ffff:192.168.157.128:49980, sid=7e6a7e72 d0ed583c
Apr 19 07:13:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Apr 19 07:13:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS handshake failed
Apr 19 07:13:06 openvpn[30400]: 192.168.157.128 SIGUSR1[soft,tls-error] received, client-instance restarting
Apr 19 07:13:06 openvpn[30400]: 192.168.157.128 TLS: Initial packet from [AF_INET6]::ffff:192.168.157.128:52931, sid=3829a638 871d55f8
Apr 19 07:14:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Apr 19 07:14:06 openvpn[30400]: 192.168.157.128 TLS Error: TLS handshake failed
Apr 19 07:14:06 openvpn[30400]: 192.168.157.128 SIGUSR1[soft,tls-error] received, client-instance restarting
Apr 19 07:14:07 openvpn[30400]: 192.168.157.128 TLS: Initial packet from [AF_INET6]::ffff:192.168.157.128:52