Your message dated Fri, 07 Dec 2018 20:45:17 +0000 with message-id <[email protected]> and subject line Bug#910937: fixed in openvpn 2.4.0-6+deb9u3 has caused the Debian Bug report #910937, regarding openvpn: AED decrypt error between 2 Debian stretch server when client server was restarted to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 910937: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910937 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: openvpn Version: 2.4.0-6+deb9u2 Severity: normal Dear Maintainer, 2 servers are connected in tun mode, both running stable version. After a kernel upgrade we reboot the master server, 1/2 hour or more after the client one when the master already rebooted and the client correctly reopened the VPN link. Here raise the problem. To solve the problem we have to restart master openvpn daemon. On the client side we have in logs: Sat Oct 13 17:17:17 2018 Initialization Sequence Completed Sat Oct 13 17:17:21 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:22 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:23 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:24 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:25 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:25 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:26 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:31 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:35 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:36 2018 Authenticate/Decrypt packet error: packet HMAC authentication failed Sat Oct 13 17:17:37 2018 NOTE: --mute triggered... On the server side: Sat Oct 13 17:17:17 2018 kumquat/xx.xx.xx.138:1194 PUSH: Received control message: 'PUSH_REQUEST' Sat Oct 13 17:17:17 2018 kumquat/xx.xx.xx.138:1194 PUSH: client wants to negotiate cipher (NCP), but server has already generated data channel keys, ignoring client request Sat Oct 13 17:17:17 2018 kumquat/xx.xx.xx.138:1194 SENT CONTROL [kumquat]: 'PUSH_REPLY,route 10.0.70.0 255.255.255.0,route 10.2.70.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 192.168.12.0 255.255.255.0,topology p2p,ping 10,ping-restart 120,ifconfig 10.99.0.54 10.99.0.49,peer-id 0' (status=1) Sat Oct 13 17:17:18 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:19 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:29 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:29 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:30 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:31 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:32 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:33 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:43 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:43 2018 kumquat/xx.xx.xx.138:1194 AEAD Decrypt error: cipher final failed Sat Oct 13 17:17:44 2018 kumquat/xx.xx.xx.138:1194 NOTE: --mute triggered... -- System Information: Debian Release: 9.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-8-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openvpn depends on: ii debconf [debconf-2.0] 1.5.61 ii init-system-helpers 1.48 ii iproute2 4.9.0-1+deb9u1 ii libc6 2.24-11+deb9u3 ii liblz4-1 0.0~r131-2+b1 ii liblzo2-2 2.08-1.2+b2 ii libpam0g 1.1.8-3.6 ii libpkcs11-helper1 1.21-1 ii libssl1.0.2 1.0.2l-2+deb9u3 ii libsystemd0 232-25+deb9u4 ii lsb-base 9.20161125 Versions of packages openvpn recommends: ii easy-rsa 2.2.2-2 Versions of packages openvpn suggests: ii openssl 1.1.0f-3+deb9u2 pn resolvconf <none> -- Configuration Files: /etc/default/openvpn changed: AUTOSTART="mango" OPTARGS="" OMIT_SENDSIGS=0 /etc/openvpn/update-resolv-conf changed: [ -x /sbin/resolvconf ] || exit 0 case $script_type in up) for optionname in ${!foreign_option_*} ; do option="${!optionname}" echo $option part1=$(echo "$option" | cut -d " " -f 1) if [ "$part1" == "dhcp-option" ] ; then part2=$(echo "$option" | cut -d " " -f 2) part3=$(echo "$option" | cut -d " " -f 3) if [ "$part2" == "DNS" ] ; then IF_DNS_NAMESERVERS="$IF_DNS_NAMESERVERS $part3" fi if [ "$part2" == "DOMAIN" ] ; then IF_DNS_SEARCH="$IF_DNS_SEARCH $part3" fi fi done R="" for SS in $IF_DNS_SEARCH ; do R="${R}search $SS " done for NS in $IF_DNS_NAMESERVERS ; do R="${R}nameserver $NS " done echo -n "$R" | /sbin/resolvconf -a "${dev}.inet" ;; down) /sbin/resolvconf -d "${dev}.inet" ;; esac -- debconf information: openvpn/create_tun: false
--- End Message ---
--- Begin Message ---Source: openvpn Source-Version: 2.4.0-6+deb9u3 We believe that the bug you reported is fixed in the latest version of openvpn, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bernhard Schmidt <[email protected]> (supplier of updated openvpn package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 14 Oct 2018 22:55:44 +0200 Source: openvpn Binary: openvpn Architecture: source Version: 2.4.0-6+deb9u3 Distribution: stretch Urgency: medium Maintainer: Alberto Gonzalez Iniesta <[email protected]> Changed-By: Bernhard Schmidt <[email protected]> Description: openvpn - virtual private network daemon Closes: 909430 910937 Changes: openvpn (2.4.0-6+deb9u3) stretch; urgency=medium . * Fix NCP behaviour on TLS reconnect, causing "AEAD Decrypt error: cipher final failed" errors (Closes: #909430, #910937) Checksums-Sha1: f4a1a4e1180a2451e0e7ea15df6153cac3a907a8 2120 openvpn_2.4.0-6+deb9u3.dsc ddd83c6b28e239a8e90d9bdc96fed51c0f40fd86 61316 openvpn_2.4.0-6+deb9u3.debian.tar.xz 22f2d4527af1cec6e505a225bacc6827e7abf434 6988 openvpn_2.4.0-6+deb9u3_amd64.buildinfo Checksums-Sha256: d2cecba7848f5cbbbe32123e599c2917deb85a109282fb78f3e44f348c7ab183 2120 openvpn_2.4.0-6+deb9u3.dsc 59a6898aa2fa3223f129a7721c5ef4267ea57ecbcd652a54b3a6d66ff207c85a 61316 openvpn_2.4.0-6+deb9u3.debian.tar.xz f5c7c9bbd05d0d4a3379e0e99cebb2516baf8d958753bc04e844d82a18c55eca 6988 openvpn_2.4.0-6+deb9u3_amd64.buildinfo Files: 10904d24c8f87c19ccb5d7d2e3b8a8de 2120 net optional openvpn_2.4.0-6+deb9u3.dsc cd38536d7e6507e8517664ebed2053b4 61316 net optional openvpn_2.4.0-6+deb9u3.debian.tar.xz e73fab65052a2886fc211d22375bf9e8 6988 net optional openvpn_2.4.0-6+deb9u3_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQJFBAEBCgAvFiEE1uAexRal3873GVbTd1B55bhQvJMFAlwFoR4RHGJlcm5pQGRl Ymlhbi5vcmcACgkQd1B55bhQvJOc2BAAj/BnmmeXF16PRb6OSmld4dIB3Aq+kv2m 0S2XnTHrW5lv4JFQM+Up8IwMR+JmOMKEXOgV8e119PW4Mc0A4KgiKVh9Q30UBo5s DMbpyzBFYjmmrssm88tC3kv+u/Wbk3o0YMZeTkn4paiIAneM08MV6aA6ZtkNl7ro UX8hVtR7P0RZPk53Ic3bun/iu7SVZNlKVtIDoRAxwcAwRCMsXDeDE55kSteJn2uT FXsmo6MP0AOFM+DhYbh4ngNMOaxtx1ugq5AZNL91kzD0pVH/3ExXBtEXhnRQhb9d NL4/WB0uYXvWjai1vboIH8LNqHBihaFcUc1glreAUsoHcihqSg9B1jmlQIjUI9P8 iXM7xMvARYvLMCUs34eDR7bYcBKzTPqzsi3cho2zHsPqiD1jAKqywmcqOuYytWdd hOWMyj5tlcx2AxwZtvAUeXbrYd664dFzsFvG4kKBrzonurfxjUzpM6ci4nLpa1jJ hqtUNmem9AEcJib6nRE/XZJLYnrPuAkjkN1fvhN6IyLS1WftYDxtFXbfnfShEPeL ZvyOahwJAJIITogW/hqIUH7wNTgFCAGKFSia8KYAfRAx3IiY/+ZjSRM12snZycZK +P9v/vcpU53DjSWhABTtEX2MLVlY36oWR1Nk5VsVMDjF0mT4SA+03wCjouZXaHat 6LBS+RvW8IQ= =hUf3 -----END PGP SIGNATURE-----
--- End Message ---

