Closed
Description
Describe the bug
OpenVPN 2.5, 2.6 and master have a hard-coded timeout of 5 seconds for SOCKS communications, which may not be enough for slow proxies, such as when the connection is performed over Tor.
To Reproduce
- Setup OpenVPN server using TCP
- Configure Tor Hidden Service to that server
- On another machine, configure client to Tor hidden service VPN using Tor's SOCKS port
socks-proxy 127.0.0.1 9050
Expected behavior
Proxy timeout follow --server-poll-timeout
value
--server-poll-timeout n
When connecting to a remote server do not wait for more than n seconds for a response before trying the next server. The de‐fault value is 120s. This timeout includes proxy and TCP connect timeouts.
Actual behavior
Socks code has a 5 second hard-coded timeout in numerous places
Line 95 in 9c52e0c
Line 194 in 9c52e0c
Line 312 in 9c52e0c