Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problem with OpenVPN in Pfsense 2.7

    Scheduled Pinned Locked Moved Firewalling
    16 Posts 4 Posters 2.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      banzai30 @Stef93
      last edited by

      @Stef93 Hi,

      Sorry for delay.
      The problem is well on Pfsense 2.7 because I downgrade to 2.6 with same config and no problems.
      After a new upgrade, same problem...

      To solve it temporarly, I need to fix MSS and MTU and it can be ok for one hour and then, new problems...

      I hope Netgate will correct it soon !
      @admin

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @banzai30
        last edited by

        @banzai30

        try this one :

        afb5e9b6-ffa2-41e2-9bb1-6ada898168a6-image.png

        The /30 is more 'problematic'.

        Btw : I'm using 23.05.1 and AFAIK, using the same openvpn version for client and server.
        "No issue what so ever". Asking for a correct without pinpointing what is wrong is "hard to impossible".

        My customs option is empty :
        7299aa53-9c86-49ff-a71f-d5da44bb515c-image.png

        Same for the WAN interface :

        50a6cc5b-7298-46ce-91e2-6f3374b32c0c-image.png

        : no MTU override needed.

        MTU changes might be needed if you use PPPOE or comparable.

        edit : my Openvpn server settings :

        dev ovpns1
        disable-dco
        verb 1
        dev-type tun
        dev-node /dev/tun1
        writepid /var/run/openvpn_server1.pid
        #user nobody
        #group nobody
        script-security 3
        daemon
        keepalive 10 60
        ping-timer-rem
        persist-tun
        persist-key
        proto udp4
        auth SHA256
        up /usr/local/sbin/ovpn-linkup
        down /usr/local/sbin/ovpn-linkdown
        client-connect /usr/local/sbin/openvpn.attributes.sh
        client-disconnect /usr/local/sbin/openvpn.attributes.sh
        learn-address "/usr/local/sbin/openvpn.learn-address.sh bhf.tld"
        local 192.168.10.4
        engine rdrand
        tls-server
        server 192.168.3.0 255.255.255.0
        client-config-dir /var/etc/openvpn/server1/csc
        tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'bhf.tld' 1"
        lport 1194
        management /var/etc/openvpn/server1/sock unix
        max-clients 10
        push "dhcp-option DOMAIN bhf.tld"
        push "dhcp-option DNS 192.168.3.1"
        push "block-outside-dns"
        push "register-dns"
        push "redirect-gateway def1"
        client-to-client
        remote-cert-tls client
        capath /var/etc/openvpn/server1/ca
        cert /var/etc/openvpn/server1/cert 
        key /var/etc/openvpn/server1/key 
        dh /etc/dh-parameters.2048
        tls-crypt /var/etc/openvpn/server1/tls-crypt 
        data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
        data-ciphers-fallback AES-256-GCM
        allow-compression asym
        persist-remote-ip
        float
        topology subnet
        sndbuf 1048576
        rcvbuf 1048576
        

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 1
        • C
          chedxb
          last edited by

          I have the same problem.

          Is there a easy way to downgrade from 2.7 to 2.6?

          GertjanG B 2 Replies Last reply Reply Quote 0
          • GertjanG
            Gertjan @chedxb
            last edited by

            @chedxb
            That's not the best solution.
            There will be a pfSense 2.8 or even 3.0 in the future. With an even more recent OpenVPN binary, and some settings will have to go, as safer, better, faster continues to be a thing.
            OpenVPN is heavily 'security related' so staying in the 'past' is a bad idea.

            I'm pretty sure this video, when copied 100 % identical works out of the box - and will work with 2.7.0 : Configuring OpenVPN Remote Access in pfSense Software

            Keep in mind there are other VPN solutions.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • C
              chedxb
              last edited by

              I get your point, but we use SNOM VOIP phones on the field and they support OpenVPN only.

              And the problem is that we don't know why they stopped working after upgrading to 2.7, entire setup used to work perfectly before that for almost 10 years!!

              1 Reply Last reply Reply Quote 0
              • C
                chedxb
                last edited by

                some interesting findings;

                Site1: pfSense 2.7 as router/firewall, behind it a FreePBX VOIP server (works fine)
                Site2: pfSense 2.6 as router/firewall, behind it a SNOM VOIP phone, connected to site 1 (SNOM VOIP phone works fine)
                Site3: pfSense 2.7 as router/firewall, behind it a SNOM VOIP phone, connected to site 1 (SNOM VOIP phone connects, but no traffic)
                Site4: A consumer grade router, behind it a SNOM VOIP phone, connected to site 1 (SNOM VOIP phone works fine)

                It looks like pfSense 2.7 @Site3 seems to change some traffic so that the SNOM VOIP behind it connects but no traffic.

                Thoughts?

                1 Reply Last reply Reply Quote 0
                • B
                  banzai30 @chedxb
                  last edited by

                  Hi @chedxb,

                  For me, no solution exists to downgrade with netgate solution so you need to reinstall it in 2.6 and push your config then (Backup needed before reinstalling)

                  I hope netgate will correct it soon in future versions.
                  Existing others solutions for VPN but complicated to change all infrastructure just for a bug…

                  S 1 Reply Last reply Reply Quote 0
                  • C
                    chedxb
                    last edited by

                    more findings,

                    it looks like it is a NAT related issue. SNOM VOIP connects (so OpenVPN works) but no voice from the other party. NAT settings are default, we didn't change anything.

                    1 Reply Last reply Reply Quote 0
                    • S
                      Stef93 @banzai30
                      last edited by

                      @banzai30
                      Perhaps the problem is different.

                      1. There may be a problem with pfsense with different hardware.
                      2. Perhaps you have some other settings that you did not write. When updating 2.6.0 > 2.7.0, you need to double-check everything and look at the logs for errors, also update (pfblocker, suricata, snort, etc.)
                      3. Try to completely remove the openvpn interface and configure it again, it may have been damaged during the update.

                      Since the problem is not widespread, I do not consider this a netgate problem, I personally started using it with version 2.5, then installed 2.6 on a clean one. And recently I updated 2.6 > 2.7. I have 3 Openvpn interfaces with partially different settings and “Redirect IPv4 Gateway” works perfectly with clients after the update. But more serious problems arose, with the discrete network card (I already bought a netgate 6100, I’m waiting to receive it).

                      I don’t have a final opinion on netgate yet, but I consider the CE version to be unstable, so I’m stopping using it in production

                      GertjanG 1 Reply Last reply Reply Quote 0
                      • S
                        Stef93
                        last edited by

                        In addition, I doubt that netgate specialists test their software on hardware, for example i5-12400, when they have their own Atom and Xeon processors (by the way, I use the old E3-1235 gateway and continue to use it. On the motherboard, 2 ports work well) , I'll leave it for testing)

                        1 Reply Last reply Reply Quote 0
                        • GertjanG
                          Gertjan @Stef93
                          last edited by

                          @Stef93 said in Problem with OpenVPN in Pfsense 2.7:

                          Perhaps you have some other settings that you did not write

                          Quiet right.
                          Here it is /var/etc/openvpn/serverx
                          where x is the server ID - probbaly 1 or 2 etc.

                          dev ovpns1
                          disable-dco
                          verb 1
                          dev-type tun
                          dev-node /dev/tun1
                          writepid /var/run/openvpn_server1.pid
                          #user nobody
                          #group nobody
                          script-security 3
                          daemon
                          keepalive 10 60
                          ping-timer-rem
                          persist-tun
                          persist-key
                          proto udp4
                          auth SHA256
                          up /usr/local/sbin/ovpn-linkup
                          down /usr/local/sbin/ovpn-linkdown
                          client-connect /usr/local/sbin/openvpn.attributes.sh
                          client-disconnect /usr/local/sbin/openvpn.attributes.sh
                          learn-address "/usr/local/sbin/openvpn.learn-address.sh bhf.tld"
                          local 192.168.10.4
                          engine rdrand
                          tls-server
                          server 192.168.3.0 255.255.255.0
                          client-config-dir /var/etc/openvpn/server1/csc
                          tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'bhf.tld' 1"
                          lport 1194
                          management /var/etc/openvpn/server1/sock unix
                          max-clients 10
                          push "dhcp-option DOMAIN bhf.tld"
                          push "dhcp-option DNS 192.168.3.1"
                          push "block-outside-dns"
                          push "register-dns"
                          push "redirect-gateway def1"
                          client-to-client
                          remote-cert-tls client
                          capath /var/etc/openvpn/server1/ca
                          cert /var/etc/openvpn/server1/cert 
                          key /var/etc/openvpn/server1/key 
                          dh /etc/dh-parameters.2048
                          tls-crypt /var/etc/openvpn/server1/tls-crypt 
                          data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
                          data-ciphers-fallback AES-256-GCM
                          allow-compression asym
                          persist-remote-ip
                          float
                          topology subnet
                          sndbuf 1048576
                          rcvbuf 1048576
                          

                          192.168.3.0 is my tunnel.

                          192.168.10.4 is my WAN IP (behind a ISP router).

                          My settings are nearly all "default", as advised by these people : https://openvpn.net/community-resources/.

                          Openvpn isn't a pfSense thing : it's a publicly available FreeBSD package from openvpn.net, and pfSense added a nice GUI to expose the most common settings (but by far not all of them).

                          While I can't really prove this, I know thousands are using OpenVPN on pfSense right now, as a client and as a server
                          The forum would 'explode' with unhappy users if OpenVPN didn't work.

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          S 1 Reply Last reply Reply Quote 0
                          • S
                            Stef93 @Gertjan
                            last edited by

                            @Gertjan
                            dev ovpns1
                            verb 1
                            dev-type tun
                            dev-node /dev/tun1
                            writepid /var/run/openvpn_server1.pid
                            #user nobody
                            #group nobody
                            script-security 3
                            daemon
                            keepalive 10 60
                            ping-timer-rem
                            persist-tun
                            persist-key
                            proto udp4
                            auth SHA512
                            up /usr/local/sbin/ovpn-linkup
                            down /usr/local/sbin/ovpn-linkdown
                            client-connect /usr/local/sbin/openvpn.attributes.sh
                            client-disconnect /usr/local/sbin/openvpn.attributes.sh
                            local 127.0.0.1
                            engine devcrypto
                            tls-server
                            server 10.0.250.0 255.255.255.0
                            client-config-dir /var/etc/openvpn/server1/csc
                            username-as-common-name
                            plugin /usr/local/lib/openvpn/plugins/openvpn-plugin-auth-script.so /usr/local/sbin/ovpn_auth_verify_async user ### true server1 ***
                            tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'VPNnetServer' 1"
                            lport ***
                            management /var/etc/openvpn/server1/sock unix
                            push "route 10.0.0.0 255.255.0.0"
                            push "dhcp-option DNS 10.0.250.1"
                            remote-cert-tls client
                            capath /var/etc/openvpn/server1/ca
                            cert /var/etc/openvpn/server1/cert
                            key /var/etc/openvpn/server1/key
                            dh /etc/dh-parameters.4096
                            tls-crypt /var/etc/openvpn/server1/tls-crypt
                            data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305:AES-256-CBC
                            data-ciphers-fallback AES-256-CBC
                            allow-compression asym
                            topology subnet
                            fast-io
                            explicit-exit-notify 1
                            sndbuf 262144
                            rcvbuf 262144
                            reneg-sec 0

                            client-connect /root/openvpn-telegram.sh

                            client-disconnect /root/openvpn-telegram.sh

                            script-security 2

                            GertjanG 1 Reply Last reply Reply Quote 0
                            • GertjanG
                              Gertjan @Stef93
                              last edited by

                              @Stef93

                              Ok, I understand where "username-as-common-name" comes from.

                              This looks very suspect :

                              @Stef93 said in Problem with OpenVPN in Pfsense 2.7:

                              client-connect /root/openvpn-telegram.sh

                              client-disconnect /root/openvpn-telegram.sh

                              Remove them and try again.

                              Check your config - and the openvpn config manual :
                              Can there be two "client-connect" and two client-disconnect ?
                              There are already these :

                              client-connect /usr/local/sbin/openvpn.attributes.sh
                              client-disconnect /usr/local/sbin/openvpn.attributes.sh
                              

                              What will happen when a second "client-connect" entry is found in the config file ?
                              The first gets overwritten ? Thus non executed (would be very bad) ?

                              Anyway : goto bare minimum, and when it works, build up from there until it breaks.

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                Stef93 @Gertjan
                                last edited by

                                @Gertjan
                                For what? I have no problems) everything works well) re-read the topic again and understand why I left the config)))

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.