The Client Log Contains "error=path length constraint exceeded"
Applicable Client
Windows OpenVPN GUI
Symptom
A client cannot connect to a P2C VPN gateway, and the log contains the following error information:
error=path length constraint exceeded
Possible Causes
The length of the CA certificate chain in the client configuration exceeds 3.
Procedure
- Re-generate CA certificates. For details, see Using Easy-RSA to Issue Certificates (Server and Client Sharing a CA Certificate).
- Log in to the management console.
- Click
in the upper left corner and select the desired region and project.
- Click
in the upper left corner, and choose .
- In the navigation pane on the left, choose .
- Click the P2C VPN Gateways tab. In the P2C VPN gateway list, locate the target P2C VPN gateway, and click View Server in the Operation column.
- Upload CA certificates.
- On the Server tab page, choose Certificate authentication from the Client Authentication Mode drop-down list box, and click Upload CA Certificate.
- Set parameters as prompted.
Table 1 Parameters for uploading a CA certificate Parameter
Description
Example Value
Name
This parameter can be modified.
ca-cert-xxxx
Content
Use a text editor (for example, Notepad++) to open the signature certificate file in PEM format, and copy the certificate content to this text box.
NOTE:- It is recommended to use a certificate with a strong cryptographic algorithm, such as RSA-3072 or RSA-4096.
- Certificates using the RSA-2048 encryption algorithm have risks. Exercise caution when using such certificates.
-----BEGIN CERTIFICATE-----
Certificate content
-----END CERTIFICATE-----
- Click OK.
- Delete the incorrect CA certificate.
- On the Server tab page, click Delete in the Operation column of the incorrect client CA certificate.
- In the Delete CA Certificate dialog box, click OK.
- Download the new client configuration file.
The downloaded client configuration file is client_config.zip.
- Decompress client_config.zip to a specified directory, for example, D:\.
After the decompression, the client_config.ovpn and client_config.conf files are generated.
- Open the client_config.ovpn file using Notepad or Notepad++.
- Add the client certificate and private key to the file.
Enter the client certificate content and the corresponding private key in between <cert></cert> and <key></key> tags, respectively. An example is as follows:
<cert> -----BEGIN CERTIFICATE----- Client certificate content -----END CERTIFICATE----- </cert> <key> -----BEGIN PRIVATE KEY----- Client private key -----END PRIVATE KEY----- </key>
- Save the .ovpn configuration file.
- Start the OpenVPN client.
- Import the new client configuration file.
- Use the client to reconnect to the VPN gateway.
- Press Win+R and enter cmd to open the command window.
-
XX.XX.XX.XX indicates the private IP address of the ECS to be connected. Replace it with the actual private IP address.
If information similar to the following is displayed, the client can communicate with the ECS:
64 bytes from XX.XX.XX.XX: icmp_seq=1 ttl=63 time=1.27 ms 64 bytes from XX.XX.XX.XX: icmp_seq=2 ttl=63 time=1.36 ms 64 bytes from XX.XX.XX.XX: icmp_seq=3 ttl=63 time=1.40 ms 64 bytes from XX.XX.XX.XX: icmp_seq=4 ttl=63 time=1.29 ms 64 bytes from XX.XX.XX.XX: icmp_seq=5 ttl=63 time=1.35 ms 64 bytes from XX.XX.XX.XX: icmp_seq=6 ttl=63 time=1.52 ms
If the problem persists, submit a service ticket to contact Huawei technical support.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot