Can not connect to AWS VPN Client "Unknown error occurred. Try again"

7

When my coworker and I attempt to connect to the AWS VPN Client, an error message pops up saying 'Unknown error occurred. Try again.' In the first case, I changed my WiFi while connecting to the AWS Client VPN before encountering this error. In the second case, my coworker rebooted his computer prior to experiencing this error.

  • Got an Update from AWS Support Hello, The AWS Client VPN team is aware of an issue affecting customers that use SAML authentication and Google Chrome v.123 or other browsers that are based on Google Chrome v.123 such as Microsoft Edge and Brave. A new feature, PrivateNetworkAccessForNavigation, was released in Chrome v.123 that resulted in an additional HTTP message being sent to the AWS Client VPN during the SAML authentication request. Chrome has rolled back this feature and workarounds exist for Chrome, Edge, and Brave which are included within this message. Although the underlying issue was with the new Chrome feature, we are proactively adding capabilities to AWS Client VPN to filter out additional HTTP messages during SAML authentication with an estimated release date of April 12, 2024. WORKAROUND FOR MICROSOFT EDGE BROWSER: Open the Edge Browser In a new tab paste: edge://flags/#block-insecure-private-network-requests This will highlight the required flag, set this to 'Disabled'. Select the Restart button on the lower right of the browser. WORKAROUND FOR GOOGLE CHROME BROWSER: Chrome Browsers v123.* Open Chrome In a new tab paste: chrome://flags/#block-insecure-private-network-requests This will highlight the required flag, set this to 'Disabled'. Select the Relaunch button on the lower right of the browser.

ben
질문됨 2달 전6110회 조회
15개 답변
7

Had the same problem. It turned out to be google chrome not passing the saml request properly. To access, change your default browser.

David
답변함 2달 전
profile picture
전문가
검토됨 2달 전
1

Our response from AWS -

The AWS Client VPN team is aware of an issue affecting customers that use Chrome version 123 and SAML authentication. [1] We are working a new client release to address this issue, and as a workaround, we recommend using another browser, such as Firefox.

Please if possible use Firefox or Edge. AWS is currently working to identify and resolve the issue. Thank you for your patience.

답변함 2달 전
  • Has a fix been released for the AWS VPN client or anything that is Chrome based?

  • Got an Update from AWS Support Hello,

    The AWS Client VPN team is aware of an issue affecting customers that use SAML authentication and Google Chrome v.123 or other browsers that are based on Google Chrome v.123 such as Microsoft Edge and Brave. A new feature, PrivateNetworkAccessForNavigation, was released in Chrome v.123 that resulted in an additional HTTP message being sent to the AWS Client VPN during the SAML authentication request. Chrome has rolled back this feature and workarounds exist for Chrome, Edge, and Brave which are included within this message. Although the underlying issue was with the new Chrome feature, we are proactively adding capabilities to AWS Client VPN to filter out additional HTTP messages during SAML authentication with an estimated release date of April 12, 2024.

    WORKAROUND FOR MICROSOFT EDGE BROWSER:

    1. Open the Edge Browser
    2. In a new tab paste: edge://flags/#block-insecure-private-network-requests
    3. This will highlight the required flag, set this to 'Disabled'.
    4. Select the Restart button on the lower right of the browser.

    WORKAROUND FOR GOOGLE CHROME BROWSER: Chrome Browsers v123.*

    1. Open Chrome
    2. In a new tab paste: chrome://flags/#block-insecure-private-network-requests
    3. This will highlight the required flag, set this to 'Disabled'.
    4. Select the Relaunch button on the lower right of the browser.
  • Has this issue been resolved? I am running Chrome v124.0.6367.92 and it still doesn't work. Also, the steps above as a workaround isn't working either.

    I used to be able to use Firefox, but that's not working now. Any help is greatly appreciated!

    Additional note, I am on a Windows 10 computer.

0

Hello.

Since that message alone doesn't tell you anything, I recommend checking the logs listed in the document below.
https://docs.aws.amazon.com/vpn/latest/clientvpn-user/macos-troubleshooting.html

profile picture
전문가
답변함 2달 전
profile picture
전문가
검토됨 2달 전
  • ovpn_aws_vpn_client_20240321.log
      87   │ 2024-03-21 10:56:26.254 +09:00 [DBG] >LOG:1710986186,,AUTH: Received control message: AUTH_FAILED,CRV1:R:instance-2/7348629710229681913/012808df-d
           │ 626-4ddc-851b-4a6970ebf886:b'Ti9B':https://lguplus.okta.com/app/aws_clientvpn/exk3vmn49ctSIu6ub697/sso/saml?SAMLRequest={SAMLREQUEST}
      88   │ 2024-03-21 10:56:26.372 +09:00 [DBG] >LOG:1710986186,I,SIGUSR1[soft,auth-failure] received, process restarting
      89   │ 2024-03-21 10:56:26.372 +09:00 [DBG] >LOG:1710986186,,MANAGEMENT: >STATE:1710986186,RECONNECTING,auth-failure,,,,,
      90   │ 2024-03-21 10:56:26.372 +09:00 [DBG] >LOG:1710986186,,Restart pause, 5 second(s)
    
  • I followed your link, troubleshooting guideline. But the error didn't be resolved.

    The error log msg as followed,

    execute shell command "tail -f *.log" at the /.config/AWSVPNClient/logs
    
    [ERR] Exception recieved by connection view controller jystem. Exception: Failed to find SAML response in request
    at ACVC. Core. Saml. Sam Manager. Login (System.String loginURL) [0x001b7] in <80a8cd494153490890bebf3908844eb4>:0
    at ACVC.Core. OpenVpn. OvpnConnectionManager. GetSamlAssertion (System.String url) [0x0008f] in <80a8cd494153490890bebf3908844eb4>:0```
    
  • From the error message, I thought there was something wrong with SAML authentication. Are there any problems on the SAML side or have you changed any settings? I'm not sure which authentication provider you are using, but if you can delete sessions etc., you may want to try deleting them once.

  • I adopted Okta SAML authentication. I did delete session, AWS clientvpn application, configuration, and reinstall those. But It didn't work.

0

The lastest Chrome update breaks AWS client VPN when using SSO. Many are reporting this

profile picture
전문가
답변함 2달 전
profile picture
전문가
검토됨 2달 전
  • interesting. I have Chrome 122.0.6261.129 and my AWS VPN Client still works.

0

My MacBook version was 13.2.1, and I encountered the same symptom while performing SAML authentication with Okta. I have updated the MacBook version to 14.4, but the same symptom persists.

jeon
답변함 2달 전
0

I'm getting the same error with couple of users and we have the same Okta + AWS VPN Client usage. For one of. the users, I changed the default web browser to Microsoft Edge and it started working. But for the other user, since she is on other domain, it's getting difficult due to many restrictions.

Try this guys.

Not sure what is to be pinpointed in Google Chrome at the moment.

Edit: I had no issues on macOS, just windows and AWS VPN Client on 3.11.1

Allen
답변함 2달 전
0

Can confirm, at least in Chrome version 123.0.6312.59 (We pushed this last night) is not working.
Edge: 122.0.2365.92 works or until Microsoft catches up with Chromium Firefox: 123.0.1 => works We don't use Okta but still use SAML with Microsoft Entra AD via SAML application.

답변함 2달 전
0

Yes, it is the same issue with AWS client VPN, and on the latest Chrome version 123.0.6312.59 is not working with SAML

Silb
답변함 2달 전
0

The SAML issue with Jumpcloud occurs on both Mac and Windows in Chrome version 123.0.6312.59 as well

Pius
답변함 2달 전
0

Confirmed by several people in our company that the breaking change happened in Chrome 123.0.6312.59 (Official Build) (arm64) when using Okta.

The regression still exists in:

  • 124.0.6367.8 (Official Build) beta (arm64)
  • 125.0.6370.0 (Official Build) canary (arm64)
Romain
답변함 2달 전
0

If you use macos you can try setup an additional app to open aws vpn client url like Firefox or Safari instead of chrome if you have it as default .

check this apps to handle that

https://loshadki.app/openin4/

https://choosy.app/

https://github.com/will-stone/browserosaurus

Personal i Tried with FF and Safari and the auth work correctly

calo
답변함 2달 전
0

As a note, the actual error message has "occurred" spelled incorrectly as "Unknown error ocurred. Try again." There's a new update to Chrome 123 that seems to fix this issue.

Eric V
답변함 2달 전
0

This issue might not be related to the browser, because I got the same error on Arc Browser and it was resolved when I switched to Chrome. Since everyone is complaining about Chrome in this topic, I think it's not directly a browser-related issue. It seems to be an issue related to the last browser you used. It doesn't matter which one it is.

devsin
답변함 2달 전
0

For those who have not seen it, Okta has release a "solution":

  1. Open Chrome
  2. In a new tab paste: chrome://flags/#block-insecure-private-network-requests
  3. This will highlight the flag, set this to Disabled
  4. Select the Relaunch button on the lower right of the browser.
  5. Retry enrollment

https://support.okta.com/help/s/article/windows-users-see-something-went-wrong-please-try-again-when-enrolling-in-okta-fastpass-using-the-latest-chrome-edge-browser?language=en_US

I tested on MacOSX and it worked for me.

nciervo
답변함 2달 전
0

Got an Update from AWS Support Hello,

The AWS Client VPN team is aware of an issue affecting customers that use SAML authentication and Google Chrome v.123 or other browsers that are based on Google Chrome v.123 such as Microsoft Edge and Brave. A new feature, PrivateNetworkAccessForNavigation, was released in Chrome v.123 that resulted in an additional HTTP message being sent to the AWS Client VPN during the SAML authentication request. Chrome has rolled back this feature and workarounds exist for Chrome, Edge, and Brave which are included within this message. Although the underlying issue was with the new Chrome feature, we are proactively adding capabilities to AWS Client VPN to filter out additional HTTP messages during SAML authentication with an estimated release date of April 12, 2024.

WORKAROUND FOR MICROSOFT EDGE BROWSER: Open the Edge Browser In a new tab paste: edge://flags/#block-insecure-private-network-requests This will highlight the required flag, set this to 'Disabled'. Select the Restart button on the lower right of the browser.

WORKAROUND FOR GOOGLE CHROME BROWSER: Chrome Browsers v123.* Open Chrome In a new tab paste: chrome://flags/#block-insecure-private-network-requests This will highlight the required flag, set this to 'Disabled'. Select the Relaunch button on the lower right of the browser.

답변함 한 달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인