Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problem with OpenVPN in Pfsense 2.7

    Scheduled Pinned Locked Moved Firewalling
    16 Posts 4 Posters 2.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan @banzai30
      last edited by

      @banzai30

      try this one :

      afb5e9b6-ffa2-41e2-9bb1-6ada898168a6-image.png

      The /30 is more 'problematic'.

      Btw : I'm using 23.05.1 and AFAIK, using the same openvpn version for client and server.
      "No issue what so ever". Asking for a correct without pinpointing what is wrong is "hard to impossible".

      My customs option is empty :
      7299aa53-9c86-49ff-a71f-d5da44bb515c-image.png

      Same for the WAN interface :

      50a6cc5b-7298-46ce-91e2-6f3374b32c0c-image.png

      : no MTU override needed.

      MTU changes might be needed if you use PPPOE or comparable.

      edit : my Openvpn server settings :

      dev ovpns1
      disable-dco
      verb 1
      dev-type tun
      dev-node /dev/tun1
      writepid /var/run/openvpn_server1.pid
      #user nobody
      #group nobody
      script-security 3
      daemon
      keepalive 10 60
      ping-timer-rem
      persist-tun
      persist-key
      proto udp4
      auth SHA256
      up /usr/local/sbin/ovpn-linkup
      down /usr/local/sbin/ovpn-linkdown
      client-connect /usr/local/sbin/openvpn.attributes.sh
      client-disconnect /usr/local/sbin/openvpn.attributes.sh
      learn-address "/usr/local/sbin/openvpn.learn-address.sh bhf.tld"
      local 192.168.10.4
      engine rdrand
      tls-server
      server 192.168.3.0 255.255.255.0
      client-config-dir /var/etc/openvpn/server1/csc
      tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'bhf.tld' 1"
      lport 1194
      management /var/etc/openvpn/server1/sock unix
      max-clients 10
      push "dhcp-option DOMAIN bhf.tld"
      push "dhcp-option DNS 192.168.3.1"
      push "block-outside-dns"
      push "register-dns"
      push "redirect-gateway def1"
      client-to-client
      remote-cert-tls client
      capath /var/etc/openvpn/server1/ca
      cert /var/etc/openvpn/server1/cert 
      key /var/etc/openvpn/server1/key 
      dh /etc/dh-parameters.2048
      tls-crypt /var/etc/openvpn/server1/tls-crypt 
      data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
      data-ciphers-fallback AES-256-GCM
      allow-compression asym
      persist-remote-ip
      float
      topology subnet
      sndbuf 1048576
      rcvbuf 1048576
      

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      1 Reply Last reply Reply Quote 1
      • C
        chedxb
        last edited by

        I have the same problem.

        Is there a easy way to downgrade from 2.7 to 2.6?

        GertjanG B 2 Replies Last reply Reply Quote 0
        • GertjanG
          Gertjan @chedxb
          last edited by

          @chedxb
          That's not the best solution.
          There will be a pfSense 2.8 or even 3.0 in the future. With an even more recent OpenVPN binary, and some settings will have to go, as safer, better, faster continues to be a thing.
          OpenVPN is heavily 'security related' so staying in the 'past' is a bad idea.

          I'm pretty sure this video, when copied 100 % identical works out of the box - and will work with 2.7.0 : Configuring OpenVPN Remote Access in pfSense Software

          Keep in mind there are other VPN solutions.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          1 Reply Last reply Reply Quote 0
          • C
            chedxb
            last edited by

            I get your point, but we use SNOM VOIP phones on the field and they support OpenVPN only.

            And the problem is that we don't know why they stopped working after upgrading to 2.7, entire setup used to work perfectly before that for almost 10 years!!

            1 Reply Last reply Reply Quote 0
            • C
              chedxb
              last edited by

              some interesting findings;

              Site1: pfSense 2.7 as router/firewall, behind it a FreePBX VOIP server (works fine)
              Site2: pfSense 2.6 as router/firewall, behind it a SNOM VOIP phone, connected to site 1 (SNOM VOIP phone works fine)
              Site3: pfSense 2.7 as router/firewall, behind it a SNOM VOIP phone, connected to site 1 (SNOM VOIP phone connects, but no traffic)
              Site4: A consumer grade router, behind it a SNOM VOIP phone, connected to site 1 (SNOM VOIP phone works fine)

              It looks like pfSense 2.7 @Site3 seems to change some traffic so that the SNOM VOIP behind it connects but no traffic.

              Thoughts?

              1 Reply Last reply Reply Quote 0
              • B
                banzai30 @chedxb
                last edited by

                Hi @chedxb,

                For me, no solution exists to downgrade with netgate solution so you need to reinstall it in 2.6 and push your config then (Backup needed before reinstalling)

                I hope netgate will correct it soon in future versions.
                Existing others solutions for VPN but complicated to change all infrastructure just for a bug…

                S 1 Reply Last reply Reply Quote 0
                • C
                  chedxb
                  last edited by

                  more findings,

                  it looks like it is a NAT related issue. SNOM VOIP connects (so OpenVPN works) but no voice from the other party. NAT settings are default, we didn't change anything.

                  1 Reply Last reply Reply Quote 0
                  • S
                    Stef93 @banzai30
                    last edited by

                    @banzai30
                    Perhaps the problem is different.

                    1. There may be a problem with pfsense with different hardware.
                    2. Perhaps you have some other settings that you did not write. When updating 2.6.0 > 2.7.0, you need to double-check everything and look at the logs for errors, also update (pfblocker, suricata, snort, etc.)
                    3. Try to completely remove the openvpn interface and configure it again, it may have been damaged during the update.

                    Since the problem is not widespread, I do not consider this a netgate problem, I personally started using it with version 2.5, then installed 2.6 on a clean one. And recently I updated 2.6 > 2.7. I have 3 Openvpn interfaces with partially different settings and “Redirect IPv4 Gateway” works perfectly with clients after the update. But more serious problems arose, with the discrete network card (I already bought a netgate 6100, I’m waiting to receive it).

                    I don’t have a final opinion on netgate yet, but I consider the CE version to be unstable, so I’m stopping using it in production

                    GertjanG 1 Reply Last reply Reply Quote 0
                    • S
                      Stef93
                      last edited by

                      In addition, I doubt that netgate specialists test their software on hardware, for example i5-12400, when they have their own Atom and Xeon processors (by the way, I use the old E3-1235 gateway and continue to use it. On the motherboard, 2 ports work well) , I'll leave it for testing)

                      1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @Stef93
                        last edited by

                        @Stef93 said in Problem with OpenVPN in Pfsense 2.7:

                        Perhaps you have some other settings that you did not write

                        Quiet right.
                        Here it is /var/etc/openvpn/serverx
                        where x is the server ID - probbaly 1 or 2 etc.

                        dev ovpns1
                        disable-dco
                        verb 1
                        dev-type tun
                        dev-node /dev/tun1
                        writepid /var/run/openvpn_server1.pid
                        #user nobody
                        #group nobody
                        script-security 3
                        daemon
                        keepalive 10 60
                        ping-timer-rem
                        persist-tun
                        persist-key
                        proto udp4
                        auth SHA256
                        up /usr/local/sbin/ovpn-linkup
                        down /usr/local/sbin/ovpn-linkdown
                        client-connect /usr/local/sbin/openvpn.attributes.sh
                        client-disconnect /usr/local/sbin/openvpn.attributes.sh
                        learn-address "/usr/local/sbin/openvpn.learn-address.sh bhf.tld"
                        local 192.168.10.4
                        engine rdrand
                        tls-server
                        server 192.168.3.0 255.255.255.0
                        client-config-dir /var/etc/openvpn/server1/csc
                        tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'bhf.tld' 1"
                        lport 1194
                        management /var/etc/openvpn/server1/sock unix
                        max-clients 10
                        push "dhcp-option DOMAIN bhf.tld"
                        push "dhcp-option DNS 192.168.3.1"
                        push "block-outside-dns"
                        push "register-dns"
                        push "redirect-gateway def1"
                        client-to-client
                        remote-cert-tls client
                        capath /var/etc/openvpn/server1/ca
                        cert /var/etc/openvpn/server1/cert 
                        key /var/etc/openvpn/server1/key 
                        dh /etc/dh-parameters.2048
                        tls-crypt /var/etc/openvpn/server1/tls-crypt 
                        data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
                        data-ciphers-fallback AES-256-GCM
                        allow-compression asym
                        persist-remote-ip
                        float
                        topology subnet
                        sndbuf 1048576
                        rcvbuf 1048576
                        

                        192.168.3.0 is my tunnel.

                        192.168.10.4 is my WAN IP (behind a ISP router).

                        My settings are nearly all "default", as advised by these people : https://openvpn.net/community-resources/.

                        Openvpn isn't a pfSense thing : it's a publicly available FreeBSD package from openvpn.net, and pfSense added a nice GUI to expose the most common settings (but by far not all of them).

                        While I can't really prove this, I know thousands are using OpenVPN on pfSense right now, as a client and as a server
                        The forum would 'explode' with unhappy users if OpenVPN didn't work.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          Stef93 @Gertjan
                          last edited by

                          @Gertjan
                          dev ovpns1
                          verb 1
                          dev-type tun
                          dev-node /dev/tun1
                          writepid /var/run/openvpn_server1.pid
                          #user nobody
                          #group nobody
                          script-security 3
                          daemon
                          keepalive 10 60
                          ping-timer-rem
                          persist-tun
                          persist-key
                          proto udp4
                          auth SHA512
                          up /usr/local/sbin/ovpn-linkup
                          down /usr/local/sbin/ovpn-linkdown
                          client-connect /usr/local/sbin/openvpn.attributes.sh
                          client-disconnect /usr/local/sbin/openvpn.attributes.sh
                          local 127.0.0.1
                          engine devcrypto
                          tls-server
                          server 10.0.250.0 255.255.255.0
                          client-config-dir /var/etc/openvpn/server1/csc
                          username-as-common-name
                          plugin /usr/local/lib/openvpn/plugins/openvpn-plugin-auth-script.so /usr/local/sbin/ovpn_auth_verify_async user ### true server1 ***
                          tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'VPNnetServer' 1"
                          lport ***
                          management /var/etc/openvpn/server1/sock unix
                          push "route 10.0.0.0 255.255.0.0"
                          push "dhcp-option DNS 10.0.250.1"
                          remote-cert-tls client
                          capath /var/etc/openvpn/server1/ca
                          cert /var/etc/openvpn/server1/cert
                          key /var/etc/openvpn/server1/key
                          dh /etc/dh-parameters.4096
                          tls-crypt /var/etc/openvpn/server1/tls-crypt
                          data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305:AES-256-CBC
                          data-ciphers-fallback AES-256-CBC
                          allow-compression asym
                          topology subnet
                          fast-io
                          explicit-exit-notify 1
                          sndbuf 262144
                          rcvbuf 262144
                          reneg-sec 0

                          client-connect /root/openvpn-telegram.sh

                          client-disconnect /root/openvpn-telegram.sh

                          script-security 2

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan @Stef93
                            last edited by

                            @Stef93

                            Ok, I understand where "username-as-common-name" comes from.

                            This looks very suspect :

                            @Stef93 said in Problem with OpenVPN in Pfsense 2.7:

                            client-connect /root/openvpn-telegram.sh

                            client-disconnect /root/openvpn-telegram.sh

                            Remove them and try again.

                            Check your config - and the openvpn config manual :
                            Can there be two "client-connect" and two client-disconnect ?
                            There are already these :

                            client-connect /usr/local/sbin/openvpn.attributes.sh
                            client-disconnect /usr/local/sbin/openvpn.attributes.sh
                            

                            What will happen when a second "client-connect" entry is found in the config file ?
                            The first gets overwritten ? Thus non executed (would be very bad) ?

                            Anyway : goto bare minimum, and when it works, build up from there until it breaks.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            S 1 Reply Last reply Reply Quote 0
                            • S
                              Stef93 @Gertjan
                              last edited by

                              @Gertjan
                              For what? I have no problems) everything works well) re-read the topic again and understand why I left the config)))

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.