netware5
Very Senior Member
Hello again in a new year
I am reviving this thread with a question, please:
Is someone able to help me make some iptables rules for my AX88U to block access to the OpenVPN server from intranet and from VPN clients themselves, please?
I'm asking this because my syslog is continuously flooded by unnecessary messages:
Jan 14 14:14:59 ovpn-server1[16876]: 192.168.1.2:65089 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Jan 14 14:14:59 ovpn-server1[16876]: 192.168.1.2:65089 Connection reset, restarting [0]
Jan 14 14:14:59 ovpn-server1[16876]: 192.168.1.2:65089 SIGUSR1[soft,connection-reset] received, client-instance restarting
Jan 14 14:15:01 ovpn-server1[16876]: TCP connection established with [AF_INET]192.168.1.2:65092
Jan 14 14:15:01 ovpn-server1[16876]: 192.168.1.2:65092 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Jan 14 14:15:01 ovpn-server1[16876]: 192.168.1.2:65092 Connection reset, restarting [0]
Jan 14 14:15:01 ovpn-server1[16876]: 192.168.1.2:65092 SIGUSR1[soft,connection-reset] received, client-instance restarting
Any help is greatly appreciated.
Cheers
This is not normal - I am using OpenVPN server listening on TCP port 443 on my router since 2013. These messages appear frequently in syslog, but from external IP addresses. This is the price we pay to run OpenVPN server on TCP port 443.
But continuous connection attempts from internal devices are not normal. You should check what is wrong device by device, i.e. WHY a particular LAN device wants to connect to TCP port 443 on the router. You may have a malware infected device in your network. A possible scenario is a malware expecting that TCP port 443 is the router's admin interface. Then probing to connect to it by spoofing source IP addresses of the whole LAN 192.168.1.2/24. The other possibility is that all your LAN devices are infected by the same malware. The third possibility is that you have specific antivirus software installed on one of you LAN devices - I have some memories that somebody reported here in the forums some years ago, so do search the forum about similar cases.
You also may wish to check if the messages' appearance is tied to the physical presence and on/off state of each particular LAN device, i.e. if switching off a particular device leads to disappearance of the messages from its IP address or all 255 IPs are present constantly, which means an IP spoofing takes place.