My configuration is very basic with the following :

crl-verify file.pem
tls-auth ta.key 0

tun-mtu 48000
is cipher BF-CBC 

As you already found, the crash frequency can be adjusted by the amount
of reconnects / key expires.




On 03.03.2015 16:10, Brent Cook wrote:
> On Tue, Mar 3, 2015 at 5:58 AM, Alexander Haensch
> <[email protected]> wrote:
>> Today is good day for crashes, as i reinstalled one client, the crash
>> happens very fast.
> I'm trying to reproduce this by having a client reconnect in a loop
> with the sample keys:
>
>  while true; do sudo openvpn --remote 192.168.1.2 --proto tcp-client
> --dev tun1 --ifconfig 10.0.0.1 10.0.0.2 --tls-client --ca ca.crt
> --cert client.crt --key client.key --inactive 2; sleep 2; done
>
> with a server listening like so:
>
> sudo gdb --args openvpn --remote 192.168.1.1 --proto tcp-server --dev
> tun1 --ifconfig 10.0.0.2 10.0.0.1 --tls-server --dh dh2048.pem --ca
> ca.crt --cert server.crt --key server.key
>
> but haven't seen anything so far. Valgrind did complain a bit about an
> uninitialized variable in blowfish encrypt, but I think this was a
> false-postitive. Is there anything I could change above (algorithms,
> etc.) that would make this simulation closer to your configuration?

-- 

Dipl. Chem. Alexander Haensch
AG Weimar
Institute of Theoretical and Physical Chemistry
Eberhard Karls University Tübingen
Auf der Morgenstelle 15
72076 Tuebingen
Germany
Tel: +49(0) 7071 2978768
Fax: +49(0) 7071 295960 

Reply via email to