My configuration is very basic with the following : crl-verify file.pem tls-auth ta.key 0
tun-mtu 48000 is cipher BF-CBC As you already found, the crash frequency can be adjusted by the amount of reconnects / key expires. On 03.03.2015 16:10, Brent Cook wrote: > On Tue, Mar 3, 2015 at 5:58 AM, Alexander Haensch > <[email protected]> wrote: >> Today is good day for crashes, as i reinstalled one client, the crash >> happens very fast. > I'm trying to reproduce this by having a client reconnect in a loop > with the sample keys: > > while true; do sudo openvpn --remote 192.168.1.2 --proto tcp-client > --dev tun1 --ifconfig 10.0.0.1 10.0.0.2 --tls-client --ca ca.crt > --cert client.crt --key client.key --inactive 2; sleep 2; done > > with a server listening like so: > > sudo gdb --args openvpn --remote 192.168.1.1 --proto tcp-server --dev > tun1 --ifconfig 10.0.0.2 10.0.0.1 --tls-server --dh dh2048.pem --ca > ca.crt --cert server.crt --key server.key > > but haven't seen anything so far. Valgrind did complain a bit about an > uninitialized variable in blowfish encrypt, but I think this was a > false-postitive. Is there anything I could change above (algorithms, > etc.) that would make this simulation closer to your configuration? -- Dipl. Chem. Alexander Haensch AG Weimar Institute of Theoretical and Physical Chemistry Eberhard Karls University Tübingen Auf der Morgenstelle 15 72076 Tuebingen Germany Tel: +49(0) 7071 2978768 Fax: +49(0) 7071 295960
