This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSL VPN Stopped Working - SFOS 16.05.1 MR-1

I recently updated my Sophos XG Firewall to the latest firmware SFOS 16.05.1 MR-1 from v15.  After updating, I noticed my SSL VPN stopped working.  After trying everything I could read to get it to work, I started from scratch, and recreated the SSL VPN, following the guide published here:  https://community.sophos.com/products/xg-firewall/f/vpn/86979/i-need-instructions-step-by-step-setting-up-xg-105-ssl-vpn-remote-access

 

After having everything setup as per the guide, each time I try and connect, I get the same error: 

tls error: tls key negotiation failed to occur within 60 seconds.

 

I have tried both the Sophos SSL client, as well as SecurePoint SSL, and receive the same issue when trying to connect over UDP.

I'm not sure what to try next.

Thanks,

Shawn



This thread was automatically locked due to age.
Parents
  • I had the same problem on 3 different appliances, in each scenario all I had to do was go into the SSL VPN settings, turn on debugging mode and apply changes.  Almost instantly the SSL VPN clients would connect and then when turning debug back off the clients would disconnect and reconnect but would continue to work afterwards.  I initially found this as I was going to use debugging to troubleshoot the issue.  I would be interested to know if it worked for you as well because when I opened support cases they stated they had no other instances of this.

Reply
  • I had the same problem on 3 different appliances, in each scenario all I had to do was go into the SSL VPN settings, turn on debugging mode and apply changes.  Almost instantly the SSL VPN clients would connect and then when turning debug back off the clients would disconnect and reconnect but would continue to work afterwards.  I initially found this as I was going to use debugging to troubleshoot the issue.  I would be interested to know if it worked for you as well because when I opened support cases they stated they had no other instances of this.

Children
  • I tried to enable debugging in the VPN settings, and it produced not difference, I'm still receiving the same problem/error.

    Fri Mar 03 11:28:40 2017 OpenVPN 2.3.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Dec 9 2016
    Fri Mar 03 11:28:40 2017 library versions: OpenSSL 1.0.1u 22 Sep 2016, LZO 2.09
    Fri Mar 03 11:28:40 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
    Fri Mar 03 11:28:40 2017 Need hold release from management interface, waiting...
    Fri Mar 03 11:28:40 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
    Fri Mar 03 11:28:40 2017 MANAGEMENT: CMD 'state on'
    Fri Mar 03 11:28:40 2017 MANAGEMENT: CMD 'log all on'
    Fri Mar 03 11:28:40 2017 MANAGEMENT: CMD 'hold off'
    Fri Mar 03 11:28:40 2017 MANAGEMENT: CMD 'hold release'
    Fri Mar 03 11:28:47 2017 MANAGEMENT: CMD 'username "Auth" "aiden07"'
    Fri Mar 03 11:28:47 2017 MANAGEMENT: CMD 'password [...]'
    Fri Mar 03 11:28:47 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Fri Mar 03 11:28:47 2017 Attempting to establish TCP connection with [AF_INET]76.189.XXX.XXX:8443 [nonblock]
    Fri Mar 03 11:28:47 2017 MANAGEMENT: >STATE:1488558527,TCP_CONNECT,,,,,,
    Fri Mar 03 11:28:57 2017 TCP: connect to [AF_INET]76.189.XXX.XXX:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
    Fri Mar 03 11:29:02 2017 MANAGEMENT: >STATE:1488558542,TCP_CONNECT,,,,,,
    Fri Mar 03 11:29:12 2017 TCP: connect to [AF_INET]76.189.XXX.XXX:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
    Fri Mar 03 11:29:17 2017 MANAGEMENT: >STATE:1488558557,TCP_CONNECT,,,,,,
    Fri Mar 03 11:29:27 2017 TCP: connect to [AF_INET]76.189.XXX.XXX:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
    Fri Mar 03 11:29:32 2017 MANAGEMENT: >STATE:1488558572,TCP_CONNECT,,,,,,

  • Hi all,

     

    I am experiencing a similar problem but slightly different. I am able to start the VPN on both windows10 (used windows vpn, sophos client, and openvpn client) and on TunnelBlick on a MAC and iot produces the error on both. The process seems to go all the way to authentication on the AD side (even local on the Sophos XG) and the VPN services authenticates and when it sends back the data to the client to connect the client then suddenly terminates the connection and restarts then process over again. Happens with any client/system. results same.

     

    Here is some log detail:

    The IP is made up to protect the names of the innocent......

     

    As you can see it looks like it just goes into a loop. Watching the interfaces on both the Sopgos XG and my end user (via a dump) I can see the VPN server is sending back an authentication response but client still resets and re-loops.

    This was working before and I even regressed the Sophos firmware thinking the last upgrade was an issue but it didn't matter. I am using the latest version of firmware.

     


    2019-04-25 20:06:35.759297 *Tunnelblick: macOS 10.14.4; Tunnelblick 3.7.9beta06 (build 5250); prior version 3.7.9beta05 (build 5240)
    2019-04-25 20:06:36.084795 *Tunnelblick: Attempting connection with cpettit@encase.com__ssl_vpn_config; Set nameserver = 769; monitoring connection
    2019-04-25 20:06:36.085537 *Tunnelblick: openvpnstart start cpettit@encase.com__ssl_vpn_config.tblk 64586 769 0 3 0 1065264 -ptADGNWradsgnw 2.4.7-openssl-1.0.2r
    2019-04-25 20:06:36.153168 *Tunnelblick: openvpnstart starting OpenVPN
    2019-04-25 20:06:36.315986 OpenVPN 2.4.7 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 25 2019
    2019-04-25 20:06:36.316075 library versions: OpenSSL 1.0.2r 26 Feb 2019, LZO 2.10
    2019-04-25 20:06:36.317770 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:64586
    2019-04-25 20:06:36.317820 Need hold release from management interface, waiting...
    2019-04-25 20:06:36.708512 *Tunnelblick: openvpnstart log:
    OpenVPN started successfully.
    Command used to start OpenVPN (one argument per displayed line):
    /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.7-openssl-1.0.2r/openvpn
    --daemon
    --log /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-Scpettit@encase.com__ssl_vpn_config.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_1065264.64586.openvpn.log
    --cd /Library/Application Support/Tunnelblick/Shared/cpettit@encase.com__ssl_vpn_config.tblk/Contents/Resources
    --machine-readable-output
    --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5250 3.7.9beta06 (build 5250)"
    --verb 3
    --config /Library/Application Support/Tunnelblick/Shared/cpettit@encase.com__ssl_vpn_config.tblk/Contents/Resources/config.ovpn
    --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Shared/cpettit@encase.com__ssl_vpn_config.tblk/Contents/Resources
    --verb 3
    --cd /Library/Application Support/Tunnelblick/Shared/cpettit@encase.com__ssl_vpn_config.tblk/Contents/Resources
    --management 127.0.0.1 64586 /Library/Application Support/Tunnelblick/iopflaoeeabphfjhhfdgnghdhfagcchpnbadmchd.mip
    --management-query-passwords
    --management-hold
    --script-security 2
    --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
    --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
    2019-04-25 20:06:36.722088 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:64586
    2019-04-25 20:06:36.768073 MANAGEMENT: CMD 'pid'
    2019-04-25 20:06:36.768181 MANAGEMENT: CMD 'auth-retry interact'
    2019-04-25 20:06:36.768222 MANAGEMENT: CMD 'state on'
    2019-04-25 20:06:36.768293 MANAGEMENT: CMD 'state'
    2019-04-25 20:06:36.768360 MANAGEMENT: CMD 'bytecount 1'
    2019-04-25 20:06:36.776395 *Tunnelblick: Established communication with OpenVPN
    2019-04-25 20:06:36.790933 *Tunnelblick: >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
    2019-04-25 20:06:36.792439 MANAGEMENT: CMD 'hold release'
    2019-04-25 20:06:46.272877 MANAGEMENT: CMD 'username "Auth" "cpettit"'
    2019-04-25 20:06:46.272963 MANAGEMENT: CMD 'password [...]'
    2019-04-25 20:06:46.275574 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    2019-04-25 20:06:46.290287 TCP/UDP: Preserving recently used remote address: [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:46.290372 Socket Buffers: R=[131072->131072] S=[131072->131072]
    2019-04-25 20:06:46.290390 Attempting to establish TCP connection with [AF_INET]204.204.204.204:8443 [nonblock]
    2019-04-25 20:06:46.290404 MANAGEMENT: >STATE:1556237206,TCP_CONNECT,,,,,,
    2019-04-25 20:06:47.362357 TCP connection established with [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:47.362409 TCP_CLIENT link local: (not bound)
    2019-04-25 20:06:47.362427 TCP_CLIENT link remote: [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:47.362506 MANAGEMENT: >STATE:1556237207,WAIT,,,,,,
    2019-04-25 20:06:47.422094 MANAGEMENT: >STATE:1556237207,AUTH,,,,,,
    2019-04-25 20:06:47.422223 TLS: Initial packet from [AF_INET]204.204.204.204:8443, sid=dc325532 ac63c5f0
    2019-04-25 20:06:47.422997 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    2019-04-25 20:06:47.465073 Connection reset, restarting [-1]
    2019-04-25 20:06:47.465281 SIGUSR1[soft,connection-reset] received, process restarting
    2019-04-25 20:06:47.465327 MANAGEMENT: >STATE:1556237207,RECONNECTING,connection-reset,,,,,
    2019-04-25 20:06:47.469489 MANAGEMENT: CMD 'hold release'
    2019-04-25 20:06:47.469547 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    2019-04-25 20:06:47.469707 TCP/UDP: Preserving recently used remote address: [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:47.469762 Socket Buffers: R=[131072->131072] S=[131072->131072]
    2019-04-25 20:06:47.469791 Attempting to establish TCP connection with [AF_INET]204.204.204.204:8443 [nonblock]
    2019-04-25 20:06:47.469824 MANAGEMENT: >STATE:1556237207,TCP_CONNECT,,,,,,
    2019-04-25 20:06:47.469987 MANAGEMENT: CMD 'hold release'
    2019-04-25 20:06:48.539963 TCP connection established with [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:48.540023 TCP_CLIENT link local: (not bound)
    2019-04-25 20:06:48.540094 TCP_CLIENT link remote: [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:48.540164 MANAGEMENT: >STATE:1556237208,WAIT,,,,,,
    2019-04-25 20:06:48.585177 MANAGEMENT: >STATE:1556237208,AUTH,,,,,,
    2019-04-25 20:06:48.585297 TLS: Initial packet from [AF_INET]204.204.204.204:8443, sid=c76c4729 a6bb9548
    2019-04-25 20:06:48.635125 Connection reset, restarting [-1]
    2019-04-25 20:06:48.635287 SIGUSR1[soft,connection-reset] received, process restarting
    2019-04-25 20:06:48.635340 MANAGEMENT: >STATE:1556237208,RECONNECTING,connection-reset,,,,,
    2019-04-25 20:06:48.639089 MANAGEMENT: CMD 'hold release'
    2019-04-25 20:06:48.639146 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    2019-04-25 20:06:48.639339 TCP/UDP: Preserving recently used remote address: [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:48.639399 Socket Buffers: R=[131072->131072] S=[131072->131072]
    2019-04-25 20:06:48.639415 Attempting to establish TCP connection with [AF_INET]204.204.204.204:8443 [nonblock]
    2019-04-25 20:06:48.639430 MANAGEMENT: >STATE:1556237208,TCP_CONNECT,,,,,,
    2019-04-25 20:06:48.639596 MANAGEMENT: CMD 'hold release'
    2019-04-25 20:06:49.708492 TCP connection established with [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:49.708986 TCP_CLIENT link local: (not bound)
    2019-04-25 20:06:49.709055 TCP_CLIENT link remote: [AF_INET]204.204.204.204:8443
    2019-04-25 20:06:49.709102 MANAGEMENT: >STATE:1556237209,WAIT,,,,,,
    2019-04-25 20:06:49.763140 MANAGEMENT: >STATE:1556237209,AUTH,,,,,,
    2019-04-25 20:06:49.763286 TLS: Initial packet from [AF_INET]204.204.204.204:8443, sid=1d7e2ea3 088e14d6
    2019-04-25 20:06:49.805421 Connection reset, restarting [-1]
    2019-04-25 20:06:49.805721 SIGUSR1[soft,connection-reset] received, process restarting
    2019-04-25 20:06:49.805748 MANAGEMENT: >STATE:1556237209,RECONNECTING,connection-reset,,,,,
    2019-04-25 20:06:49.809596 MANAGEMENT: CMD 'hold release'
    2019-04-25 20:06:49.809655 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

     

    I am sure someone has probably experienced this but this thread looks close to my issue.

     

    Thanks.

     

    Christopher Pettit

    XOR Security, LLC