Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Problems connecting with SSL VPN

Hello,

I keep having problems with road warriors connecting via SSL VPN to the Sophos device. They cannot connect to it. A part of the log file from the client side, captured with the program Viscosity, is here:

Nov 04 16:44:57: OpenVPN 2.3.8 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [PKCS11] [MH] [IPv6] built on Sep 23 2015

Nov 04 16:44:57: library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.09

Nov 04 16:45:00: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

Nov 04 16:45:00: Attempting to establish TCP connection with [AF_INET]A.B.C.242:443 [nonblock]

Nov 04 16:45:01: TCP connection established with [AF_INET]A.B.C.242:443

Nov 04 16:45:01: TCPv4_CLIENT link local: [undef]

Nov 04 16:45:01: TCPv4_CLIENT link remote: [AF_INET]A.B.C.242:443

Nov 04 16:45:01: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this

Nov 04 16:45:01: VERIFY ERROR: could not extract CN from X509 subject string ('C=nl, L=Wassenaar, O=Calmus BV') -- note that the username length is limited to 64 characters

Nov 04 16:45:01: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed

Nov 04 16:45:01: TLS Error: TLS object -> incoming plaintext read error

Nov 04 16:45:01: TLS Error: TLS handshake failed

Nov 04 16:45:01: Fatal TLS error (check_tls_errors_co), restarting

Nov 04 16:45:01: SIGUSR1[soft,tls-error] received, process restarting

I posted this on the "former bulletin board" (which btw is far easier to use etc. than this one) and was suggested to contact Viscosity about it.

Today I got a message back from James Bekkema from Viscosity, stating:

"It appears the OpenVPN server certificate was created without a Common Name (CN) set. Modern versions of OpenVPN will reject this when attempting to perform name verification of the certificate. You’ll want to re-generate your server’s certificate and ensure that a CN is set: Sophos should be able to assist you in this regard.

Otherwise you could remove the "verify-x509-name” command to turn off name verification. This option is off by default, however it appears Sophos devices have it enabled. Again, Sophos should be able to advise how to not use this option.=

The following thread on the Sophos forums also appears to contain some more information:

http://webcache.googleusercontent.com/search?q=cache:fP6AWSahWuAJ:https://www.astaro.org/gateway-products/vpn-site-site-remote-access/43865-ssl-vpn-not-working-after-upgrade-utm-9-a-4.html"

Before doing anything I downloaded and opened the signing CA cert, etc. All have a CN in them, so I'm lost to what's going wrong and what to do next. I know regenerating a signing CA cert is very intrusive, because I have to reissue every other cert on the Sophos after that and for every user. So is there a way or a command I can issue to disable the "verify-x509-name" on the Sophos UTM. That seems the quickest way to solve things (until Sophos solves these issues), because our employees cannot get into the network for several days now.



This thread was automatically locked due to age.
Parents
  • Hi all,

    I've found a solution with the help of James Bekkema from Viscosity. I created a new WebAdmin certificate and made sure I filled in the CN parameter. Then exchanged the old WebAdmin cert with the new on all the places where it was used. Fortunately that's easy to see in the Sophos UTM. Then downloaded the new OVPN files from the user portal and imported them into Viscosity.

    Everything Works like a charm after that. Connections are made and stable. The only thing I can see in the logs is a warning that the "-- tls-remote" setting is obsolete and should be removed. So I guess that's something for the developers of Sophos.
Reply
  • Hi all,

    I've found a solution with the help of James Bekkema from Viscosity. I created a new WebAdmin certificate and made sure I filled in the CN parameter. Then exchanged the old WebAdmin cert with the new on all the places where it was used. Fortunately that's easy to see in the Sophos UTM. Then downloaded the new OVPN files from the user portal and imported them into Viscosity.

    Everything Works like a charm after that. Connections are made and stable. The only thing I can see in the logs is a warning that the "-- tls-remote" setting is obsolete and should be removed. So I guess that's something for the developers of Sophos.
Children
No Data