Closed Bug 901999 Opened 11 years ago Closed 11 years ago

please give jmaher@mozilla.com access to foopy53.p3.releng.scl1.mozilla.com

Categories

(Infrastructure & Operations :: Infrastructure: OpenVPN, task)

x86_64
Windows 7
task
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: Callek, Assigned: jabba)

References

Details

Joel should already have access to VPN, we just need to add the foopy to the loaner LDAP category
Sorry, foopy33 is actually not able to be used for what I was hoping, foopy53 it is
Summary: please give jmaher@mozilla.com access to foopy33.build.scl1.mozilla.com → please give jmaher@mozilla.com access to foopy53.p3.releng.scl1.mozilla.com
Done
Assignee: infra → jdow
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
I am having trouble authenticating during intial connection:
openvpn --config ~/Downloads/vpn/MozillaVPN/MozillaVPN.ovpn --script-security 2Tue Aug  6 13:07:11 2013 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Feb 13 2013
Enter Auth Username:jmaher
Enter Auth Password:
Tue Aug  6 13:07:17 2013 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
Tue Aug  6 13:07:17 2013 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Aug  6 13:07:17 2013 Control Channel Authentication: using 'private/ta.key' as a OpenVPN static key file
Tue Aug  6 13:07:17 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Aug  6 13:07:17 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Aug  6 13:07:17 2013 LZO compression initialized
Tue Aug  6 13:07:17 2013 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
Tue Aug  6 13:07:17 2013 Socket Buffers: R=[212992->131072] S=[212992->131072]
Tue Aug  6 13:07:17 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Aug  6 13:07:17 2013 Local Options hash (VER=V4): '9e7066d2'
Tue Aug  6 13:07:17 2013 Expected Remote Options hash (VER=V4): '162b04de'
Tue Aug  6 13:07:17 2013 UDPv4 link local: [undef]
Tue Aug  6 13:07:17 2013 UDPv4 link remote: [AF_INET]63.245.214.137:1194
Tue Aug  6 13:07:17 2013 TLS: Initial packet from [AF_INET]63.245.214.137:1194, sid=fd0302f8 1b8f1c8f
Tue Aug  6 13:07:17 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Aug  6 13:07:17 2013 CRL CHECK OK: /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/OU=Mozilla_Corporation_Root_Certificate_Services/CN=Mozilla_Root_CA/emailAddress=hostmaster@mozilla.com
Tue Aug  6 13:07:17 2013 VERIFY OK: depth=1, /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/OU=Mozilla_Corporation_Root_Certificate_Services/CN=Mozilla_Root_CA/emailAddress=hostmaster@mozilla.com
Tue Aug  6 13:07:17 2013 Validating certificate extended key usage
Tue Aug  6 13:07:17 2013 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Aug  6 13:07:17 2013 VERIFY EKU OK
Tue Aug  6 13:07:17 2013 VERIFY X509NAME OK: /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/CN=openvpn.scl3.mozilla.com/emailAddress=hostmaster@mozilla.com
Tue Aug  6 13:07:17 2013 CRL CHECK OK: /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/CN=openvpn.scl3.mozilla.com/emailAddress=hostmaster@mozilla.com
Tue Aug  6 13:07:17 2013 VERIFY OK: depth=0, /C=US/ST=California/L=Mountain_View/O=Mozilla_Corporation/CN=openvpn.scl3.mozilla.com/emailAddress=hostmaster@mozilla.com
Tue Aug  6 13:07:17 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Tue Aug  6 13:07:17 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Aug  6 13:07:17 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Tue Aug  6 13:07:17 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Aug  6 13:07:17 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Tue Aug  6 13:07:17 2013 [openvpn.scl3.mozilla.com] Peer Connection Initiated with [AF_INET]63.245.214.137:1194
Tue Aug  6 13:07:19 2013 SENT CONTROL [openvpn.scl3.mozilla.com]: 'PUSH_REQUEST' (status=1)
Tue Aug  6 13:07:19 2013 AUTH: Received AUTH_FAILED control message
Tue Aug  6 13:07:19 2013 TCP/UDP: Closing socket
Tue Aug  6 13:07:19 2013 SIGTERM[soft,auth-failure] received, process exiting
User jmaher@mozilla.com for the username and things should work.
this is working now!
Blocks: 905919
You need to log in before you can comment on or make changes to this bug.