Hi,

On 14/06/2021 03:07, Arne Schwabe wrote:
> Am 14.06.21 um 03:01 schrieb Antonio Quartulli:
>> Hi,
>>
>> On 14/06/2021 02:56, Arne Schwabe wrote:
>>> Am 14.06.21 um 02:24 schrieb Antonio Quartulli:
>>>> @Arne, ideas?
>>>>
>>>
>>> Yes. When reneg-sec is below 60 or 120 (would need to double check), you
>>> need that value on both server and client since otherwise the timeouts
>>> for changing active keys mismatch as the value is 60s normally but
>>> changes if reneg-sec goes below that value.
>>
>> Isn't it relevant that the server is able to fix itself in around 5/6
>> seconds? It does not need to wait for the full 60s to get back in sync.
>>
>> From the log it also seems like the key with the new ID has been
>> installed, but the state has not been switched.
>>
> 
> From the logs it looks like the key is still in deferred auth
> (uth=KS_AUTH_DEFERRED), as you can see from the state, so the server
> cannot use it for decryption yet.
> 
> reneg-sec 20 on client means that the client will switch to the new key
> after 10s. With deferred auth in the mix on the server side that is a
> bit tight.  If the server has not authenticated that key yet, you will
> see the out of sync messages.

Ok, after clarifying in chat, I understood that the time needed by a
peer to elect a key as "usable" is defined by auth_deferred_expire_window().

If reneg-sec is smaller than hand-window (which is 60s by default) then
we can have this particular situation.

Now, we are assuming that hand-window is always the same on both peers
(client and server), but actually this value may also be customized and
mess everything up.

Changing hand-window on one peer only is not a good idea in any case.

At this point I'd ask, why not re-moving/ignoring --hand-window entirely
and live with the 60s default?


Regards,



-- 
Antonio Quartulli


_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to