Package: openvpn
Version: 2.0.9-4
Followup-For: Bug #390697

I have a very similar behaviour here.
It would be great if somebody could look into it, since this bug is uncommented 
in state 'important' for almost one year now. Might it help to increase the 
severity?

Anyhow, let's get to details.
The problem occurs in irregular time intervals. Sometimes it takes a couple of 
days until it occurs again, but I also had days where it happened twice:

Aug 20 20:38:52 gate kernel: openvpn[18803] general protection rip:2b078d49f242 
rsp:7fff1daf0168 error:0
Aug 17 07:51:50 gate kernel: openvpn[15246]: segfault at 0000003100580003 rip 
00002b32a1829242 rsp 00007fff09765ea8 error 4
Aug 16 19:37:13 gate kernel: openvpn[1948]: segfault at 0000003100580003 rip 
00002b46fab0f242 rsp 00007fffb047dab8 error 4
Aug 14 12:53:00 gate kernel: openvpn[30475]: segfault at 0000003100580003 rip 
00002b709b5ca242 rsp 00007fff0f9c5108 error 4
Aug 14 19:35:14 gate kernel: openvpn[32530]: segfault at 0000003100580003 rip 
00002ac0d10cc242 rsp 00007fffd9ec35f8 error 4

Currently testing/unstable have 2.0.9-8, but the changelogs do not look like 
anything of potential significance to this issue has changed.
I am using openvpn in multi-client-mode with Certificates and with PAM 
authentication. 
I already increased verbosity to 4, but nothing of significance shows up in the 
log next to these lines.
Per day, around 20 different users make up to 200 connects to this instance, 
hence I hitherto refrained from further raising the loglevel.

After such an occurrence, OpenVPN does not respond to any packets anymore until 
it gets restarted.

I would assume that this issue is related to amd64, since I recently switched 
this installation from a i386 machine to this amd64 machine and got these 
problems.
If required, I could hand out logs and pcap-style dumps (1 new file each MB) of 
the encrypted packets. I already analysed the pcap-dumps but could not find a 
correlation to a specific client instance or traffic pattern or anything.
I will try to attach my current openvpn config to this bugreport.

Since the issue usually reoccurs after a few days, I am also willing to provide 
assistance in nailing this issue down. 


Regards,
Stefan

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-amd64
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages openvpn depends on:
ii  debconf [debconf-2.0]       1.5.11       Debian configuration management sy
ii  libc6                       2.3.6.ds1-13 GNU C Library: Shared libraries
ii  liblzo1                     1.08-3       data compression library (old vers
ii  libssl0.9.8                 0.9.8c-4     SSL shared libraries

openvpn recommends no packages.

-- debconf information:
  openvpn/change_init: false
  openvpn/change_init2: false
  openvpn/create_tun: false
  openvpn/stop2upgrade: false
  openvpn/default_port:
###we are server
server 42.42.42.128 255.255.255.224
local 42.42.42.248 

#we talk udp on port 1194
proto udp
resolv-retry 10
port 1194
#connect-retry <not used>

#read the 'dynamically' allocated IPs from the file, don't write to it
ifconfig-pool-persist "ippool" 0
#31557600

#verbosity in log
verb 4

#working directory of openvpn
cd "/etc/openvpn"

#become a daemon after startup, log to syslog
daemon 

#certificate and CA-file
ca "keys/ca.crt"
dh "dh1024.pem"
cert "keys/SRV.crt"
key "keys/SRV.key"


#device type
#dev-type tap #only needed if !($dev =~ m/^tap/)
dev tap0


#close the connection after <n> seconds of inactivity
#experimental!
inactive 600

#ping the remote (cryptographically) after 10 seconds of inactivity,
#restart connection after 60s of inactivity
keepalive 10 30


#mlock() openvpns memory, so that it won't be swapped out
mlock


###not needed by now
#up <script>
#up-delay <seconds> #time before running 'up'
#down
#down-pre

###enable proxy arp
up ./script_proxyarp_enable

###give up privileges
##Push-scripts don't work if you specify this!
#user nobody
#group nogroup

###specify link-mtu small enough (1408=1024+256+128), to be safe
link-mtu 1408

###use compression
comp-lzo

###use pam plugin
plugin /usr/lib/openvpn/openvpn-auth-pam.so openvpn 
username-as-common-name
#client-cert-not-required

###allow communication directly between clients, too
#client-to-client

#client configuration directory, e.g. for certificates
#we use this only to push client-specific routes and DNS-settings
client-config-dir "clients/"

###limit maximum number of concurrent clients
max-clients 16

###set the cipher type (see --show-ciphers)
cipher AES-256-CBC

Reply via email to