**NethServer Version: 7.9.2009
**Module:openvpn
Connecting a remote voip phone the LAN. it works well until 64 mins and then drops. Reboot the phone to reconnect. So far have not found the code with the stopwatch!!
`Sat Jul 8 14:06:00 2023 ext522@xyz.com/client:36759
SENT CONTROL [ext522@xyz.com]:
‘PUSH_REPLY,
dhcp-option DOMAIN xyz.com,dhcp-option DNS server,dhcp-option WINS server,dhcp-option NBDD
server,dhcp-option NBT 2,route-gateway server,ping 20,ping-restart 120,ifconfig clientip 255.255.255.0,peer-id 1,cipher AES-256-GCM’ (status=1)
Sat Jul 8 14:06:00 2023 ext522@xyz.com/client:36759 Data Channel: using negotiated cipher ‘AES-256-GCM’
Sat Jul 8 14:06:00 2023 ext522@xyz.com/client:36759 Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
Sat Jul 8 14:06:00 2023 ext522@xyz.com/client:36759 Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
Sat Jul 8 14:06:01 2023 ext522@xyz.com/client:36759 MULTI: Learn: c6:3b:71:f2:68:9a → ext522@xyz.com/client:36759
Sat Jul 8 14:32:17 2023 MANAGEMENT: Client connected from /var/spool/openvpn/host-to-net
Sat Jul 8 14:32:17 2023 MANAGEMENT: CMD ‘status 3’
Sat Jul 8 14:32:17 2023 MANAGEMENT: Client disconnected
Sat Jul 8 14:33:13 2023 MANAGEMENT: Client connected from /var/spool/openvpn/host-to-net
Sat Jul 8 14:33:13 2023 MANAGEMENT: CMD ‘status 3’
Sat Jul 8 14:33:13 2023 MANAGEMENT: Client disconnected
Sat Jul 8 14:33:13 2023 MANAGEMENT: Client connected from /var/spool/openvpn/host-to-net
Sat Jul 8 14:33:13 2023 MANAGEMENT: CMD ‘status 3’
Sat Jul 8 14:33:13 2023 MANAGEMENT: Client disconnected
Sat Jul 8 14:33:13 2023 MANAGEMENT: Client connected from /var/spool/openvpn/host-to-net
Sat Jul 8 14:33:13 2023 MANAGEMENT: CMD ‘status 3’
Sat Jul 8 14:33:13 2023 MANAGEMENT: Client disconnected
Sat Jul 8 14:33:58 2023 MANAGEMENT: Client connected from /var/spool/openvpn/host-to-net
Sat Jul 8 14:33:58 2023 MANAGEMENT: CMD ‘status 3’
Sat Jul 8 14:33:58 2023 MANAGEMENT: Client disconnected
Sat Jul 8 14:38:49 2023 167.94.138.49:42280 TLS: Initial packet from [AF_INET]167.94.138.49:42280 (via [AF_INET]192.168.15.2%eth0), sid=b668660f eb05900e
Sat Jul 8 14:38:51 2023 read UDPv4 [CMSG=8|ECONNREFUSED]: Connection refused (code=111)
Sat Jul 8 14:38:55 2023 read UDPv4 [CMSG=8|ECONNREFUSED]: Connection refused (code=111)
Sat Jul 8 14:39:03 2023 read UDPv4 [CMSG=8|ECONNREFUSED]: Connection refused (code=111)
Sat Jul 8 14:39:19 2023 read UDPv4 [CMSG=8|ECONNREFUSED]: Connection refused (code=111)
Sat Jul 8 14:39:49 2023 167.94.138.49:42280 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Jul 8 14:39:49 2023 167.94.138.49:42280 TLS Error: TLS handshake failed
Sat Jul 8 14:39:49 2023 167.94.138.49:42280 SIGUSR1[soft,tls-error] received, client-instance restarting`
Last connection
“08 Jul 2023, 14:05 08 Jul 2023, 15:09 01h 04m 00s”
The error lines are for ip 167.94.138.49 which is a Censys search engine spider. Could it be upsetting the VPN? Or does someone know of a 64 min timer?