Closed
Bug 901999
Opened 11 years ago
Closed 11 years ago
please give jmaher@mozilla.com access to foopy53.p3.releng.scl1.mozilla.com
Categories
(Infrastructure & Operations :: Infrastructure: OpenVPN, task)
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: Callek, Assigned: jabba)
References
Details
Joel should already have access to VPN, we just need to add the foopy to the loaner LDAP category
Reporter | ||
Comment 1•11 years ago
|
||
Sorry, foopy33 is actually not able to be used for what I was hoping, foopy53 it is
Summary: please give jmaher@mozilla.com access to foopy33.build.scl1.mozilla.com → please give jmaher@mozilla.com access to foopy53.p3.releng.scl1.mozilla.com
Assignee | ||
Comment 2•11 years ago
|
||
Done
Assignee: infra → jdow
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
Comment 3•11 years ago
|
||
I am having trouble authenticating during intial connection: openvpn --config ~/Downloads/vpn/MozillaVPN/MozillaVPN.ovpn --script-security 2Tue Aug 6 13:07:11 2013 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Feb 13 2013 Enter Auth Username:jmaher Enter Auth Password: Tue Aug 6 13:07:17 2013 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page). Tue Aug 6 13:07:17 2013 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Tue Aug 6 13:07:17 2013 Control Channel Authentication: using 'private/ta.key' as a OpenVPN static key file Tue Aug 6 13:07:17 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Aug 6 13:07:17 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Aug 6 13:07:17 2013 LZO compression initialized Tue Aug 6 13:07:17 2013 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ] Tue Aug 6 13:07:17 2013 Socket Buffers: R=[212992->131072] S=[212992->131072] Tue Aug 6 13:07:17 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Tue Aug 6 13:07:17 2013 Local Options hash (VER=V4): '9e7066d2' Tue Aug 6 13:07:17 2013 Expected Remote Options hash (VER=V4): '162b04de' Tue Aug 6 13:07:17 2013 UDPv4 link local: [undef] Tue Aug 6 13:07:17 2013 UDPv4 link remote: [AF_INET]63.245.214.137:1194 Tue Aug 6 13:07:17 2013 TLS: Initial packet from [AF_INET]63.245.214.137:1194, sid=fd0302f8 1b8f1c8f Tue Aug 6 13:07:17 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Tue Aug 6 13:07:17 2013 CRL CHECK OK: /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/OU=Mozilla_Corporation_Root_Certificate_Services/CN=Mozilla_Root_CA/emailAddress=hostmaster@mozilla.com Tue Aug 6 13:07:17 2013 VERIFY OK: depth=1, /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/OU=Mozilla_Corporation_Root_Certificate_Services/CN=Mozilla_Root_CA/emailAddress=hostmaster@mozilla.com Tue Aug 6 13:07:17 2013 Validating certificate extended key usage Tue Aug 6 13:07:17 2013 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Tue Aug 6 13:07:17 2013 VERIFY EKU OK Tue Aug 6 13:07:17 2013 VERIFY X509NAME OK: /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/CN=openvpn.scl3.mozilla.com/emailAddress=hostmaster@mozilla.com Tue Aug 6 13:07:17 2013 CRL CHECK OK: /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/CN=openvpn.scl3.mozilla.com/emailAddress=hostmaster@mozilla.com Tue Aug 6 13:07:17 2013 VERIFY OK: depth=0, /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/CN=openvpn.scl3.mozilla.com/emailAddress=hostmaster@mozilla.com Tue Aug 6 13:07:17 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Tue Aug 6 13:07:17 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Aug 6 13:07:17 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Tue Aug 6 13:07:17 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Aug 6 13:07:17 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Tue Aug 6 13:07:17 2013 [openvpn.scl3.mozilla.com] Peer Connection Initiated with [AF_INET]63.245.214.137:1194 Tue Aug 6 13:07:19 2013 SENT CONTROL [openvpn.scl3.mozilla.com]: 'PUSH_REQUEST' (status=1) Tue Aug 6 13:07:19 2013 AUTH: Received AUTH_FAILED control message Tue Aug 6 13:07:19 2013 TCP/UDP: Closing socket Tue Aug 6 13:07:19 2013 SIGTERM[soft,auth-failure] received, process exiting
Assignee | ||
Comment 4•11 years ago
|
||
User jmaher@mozilla.com for the username and things should work.
Comment 5•11 years ago
|
||
this is working now!
You need to log in
before you can comment on or make changes to this bug.
Description
•