Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2.1 / OpenVPN /PIA: can't get it to work

    Scheduled Pinned Locked Moved OpenVPN
    34 Posts 4 Posters 11.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      Mr. Jingles
      last edited by

      Pic:

      ![4. System_gateways.jpg](/public/imported_attachments/1/4. System_gateways.jpg)
      ![4. System_gateways.jpg_thumb](/public/imported_attachments/1/4. System_gateways.jpg_thumb)

      6 and a half billion people know that they are stupid, agressive, lower life forms.

      1 Reply Last reply Reply Quote 0
      • M
        Mr. Jingles
        last edited by

        Pic:

        ![5. System_routes.jpg](/public/imported_attachments/1/5. System_routes.jpg)
        ![5. System_routes.jpg_thumb](/public/imported_attachments/1/5. System_routes.jpg_thumb)

        6 and a half billion people know that they are stupid, agressive, lower life forms.

        1 Reply Last reply Reply Quote 0
        • M
          Mr. Jingles
          last edited by

          Pic:

          ![6. Firewall_NAT.jpg](/public/imported_attachments/1/6. Firewall_NAT.jpg)
          ![6. Firewall_NAT.jpg_thumb](/public/imported_attachments/1/6. Firewall_NAT.jpg_thumb)

          6 and a half billion people know that they are stupid, agressive, lower life forms.

          1 Reply Last reply Reply Quote 0
          • M
            Mr. Jingles
            last edited by

            And the final pic:

            ![7. Status_dashboard.jpg](/public/imported_attachments/1/7. Status_dashboard.jpg)
            ![7. Status_dashboard.jpg_thumb](/public/imported_attachments/1/7. Status_dashboard.jpg_thumb)

            6 and a half billion people know that they are stupid, agressive, lower life forms.

            1 Reply Last reply Reply Quote 0
            • M
              Mr. Jingles
              last edited by

              Hmmm  :P

              Thanks to this fine thread:

              https://forum.pfsense.org/index.php?topic=24435.msg126272#msg126272

              I've added:

               verb 5
              

              to the advanced settings of the OpenVPN client (part of the instruction in this thread is wrong, as:

              21. In the 'Advanced' field, we need to enter several options, all separated by a ';'

              leads to OpenVPN refusing to start. SO I just put it on a separate line, and then it starts again).

              Anyway, the above thread says:

              3. You need to look for is the line that says:

              Code: [Select]

              openvpn[49520]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 195.24.72.6,dhcp-option DNS 83.243.8.6,dhcp-option DNS 4.2.2.4,route 10.0.61.1,topology net30,ifconfig 10.0.61.54 10.0.61.53'

              4. If that line says 'redirect-gateway def1', then your pfSense should be routing all traffic over the VPN connection. Browse to a 'what's my IP' page, and see if your connection is coming from another IP than your own

              Well, my log says just that:

              Apr 14 18:53:43 openvpn[32022]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,route 10.155.1.1,topology net30,ifconfig 10.155.1.6 10.155.1.5'

              The log is saying something else which I don't understand (but there are many, many, many things I don't understand  ;D):

              Apr 14 18:53:43 openvpn[32022]: ROUTE_GATEWAY –-HERE IS MY EXTERNAL CABLE ISP---

              Would the bold part make sense?

              Thank you again for any help ;D,

              Bye

              6 and a half billion people know that they are stupid, agressive, lower life forms.

              1 Reply Last reply Reply Quote 0
              • M
                Mr. Jingles
                last edited by

                I forgot to add: I also disabled Snort on the WAN2-interface, thinking perhaps that would block something. But no results.

                6 and a half billion people know that they are stupid, agressive, lower life forms.

                1 Reply Last reply Reply Quote 0
                • M
                  Mr. Jingles
                  last edited by

                  I am a pitbull  ;D ;D ;D

                  Thanks to Elkmoose here: https://forum.pfsense.org/index.php?topic=48847.msg258640#msg258640

                  I went into:

                  /var/etc/openvpn and should have a name like "clientN.conf

                  In there I found:

                  
                  dev ovpnc1
                  dev-type tun
                  tun-[b]ipv6[/b]
                  dev-node /dev/tun1
                  writepid /var/run/openvpn_client1.pid
                  #user nobody
                  #group nobody
                  script-security 3
                  daemon
                  keepalive 10 60
                  ping-timer-rem
                  persist-tun
                  persist-key
                  proto udp
                  cipher BF-CBC
                  up /usr/local/sbin/ovpn-linkup
                  down /usr/local/sbin/ovpn-linkdown
                  local ---MY OWN EXTERNAL CABLE ISP ADDRESS---
                  tls-client
                  client
                  lport 0
                  management /var/etc/openvpn/client1.sock unix
                  remote us-east.privateinternetaccess.com 1194
                  [b]ca /var/etc/openvpn/client1.ca 
                  cert /var/etc/openvpn/client1.cert 
                  key /var/etc/openvpn/client1.key [/b]
                  comp-lzo
                  auth-user-pass /etc/openvpn-password.txt
                  verb 5
                  
                  

                  I think I will try to change the ipv6 in ipv4 and see what gives.

                  I have no clue about the bold parts concerning the certificates. I think I would expect /etc/ca.crt.

                  6 and a half billion people know that they are stupid, agressive, lower life forms.

                  1 Reply Last reply Reply Quote 0
                  • M
                    Mr. Jingles
                    last edited by

                    @Hollander:

                    I think I will try to change the ipv6 in ipv4 and see what gives.

                    Duh  :'(

                    It stopped, and the log insn't very clear:

                    System logs: general:

                    Apr 14 19:13:09 php: rc.filter_configure_sync: Could not find IPv6 gateway for interface(opt1).
                    Apr 14 19:13:09 php: rc.filter_configure_sync: Could not find IPv6 gateway for interface(wan).
                    Apr 14 19:13:09 php: rc.filter_configure_sync: Could not find IPv4 gateway for interface (wan).
                    Apr 14 19:13:08 php: rc.filter_configure_sync: The command '/sbin/route change -inet default dynamic' returned exit code '68', the output was 'route: bad address: dynamic'
                    Apr 14 19:13:05 check_reload_status: Reloading filter
                    Apr 14 19:13:05 php: /status_services.php: The command '/sbin/route change -inet default dynamic' returned exit code '68', the output was 'route: bad address: dynamic'
                    Apr 14 19:12:51 php: /index.php: The command '/sbin/route change -inet default dynamic' returned exit code '68', the output was 'route: bad address: dynamic'
                    Apr 14 19:12:51 php: /index.php: The command '/sbin/route change -inet default dynamic' returned exit code '68', the output was 'route: bad address: dynamic'
                    Apr 14 19:12:51 php: /index.php: The command '/sbin/route change -inet default dynamic' returned exit code '68', the output was 'route: bad address: dynamic'
                    Apr 14 19:12:51 php: /index.php: The command '/sbin/route change -inet default dynamic' returned exit code '68', the output was 'route: bad address: dynamic'
                    Apr 14 19:12:10 php: rc.filter_configure_sync: Could not find IPv6 gateway for interface(opt1).
                    Apr 14 19:12:10 php: rc.filter_configure_sync: Could not find IPv6 gateway for interface(wan).
                    Apr 14 19:12:10 php: rc.filter_configure_sync: Could not find IPv4 gateway for interface (wan).
                    Apr 14 19:12:09 php: rc.filter_configure_sync: The command '/sbin/route change -inet default dynamic' returned exit code '68', the output was 'route: bad address: dynamic'
                    Apr 14 19:12:07 php: /status_services.php: The command '/sbin/route change -inet default dynamic' returned exit code '68', the output was 'route: bad address: dynamic'
                    Apr 14 19:12:06 check_reload_status: Reloading filter
                    Apr 14 19:12:06 kernel: ovpnc1: link state changed to DOWN
                    Apr 14 19:11:52 sshd[62061]: Accepted keyboard-interactive/pam for root from 192.168.23.42 port 52118 ssh2

                    System logs: OpenVPN:

                    Apr 14 19:12:06 openvpn[32022]: SIGTERM[hard,] received, process exiting
                    Apr 14 19:12:06 openvpn[32022]: /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1542 10.155.1.6 10.155.1.5 init
                    Apr 14 19:12:06 openvpn[32022]: Closing TUN/TAP interface
                    Apr 14 19:12:06 openvpn[32022]: /sbin/route delete -net 128.0.0.0 10.155.1.5 128.0.0.0
                    Apr 14 19:12:06 openvpn[32022]: /sbin/route delete -net 0.0.0.0 10.155.1.5 128.0.0.0
                    Apr 14 19:12:06 openvpn[32022]: /sbin/route delete -net 68.232.186.243 MY CABLE GATEWAY 255.255.255.255
                    Apr 14 19:12:06 openvpn[32022]: /sbin/route delete -net 10.155.1.1 10.155.1.5 255.255.255.255
                    Apr 14 19:12:06 openvpn[32022]: TCP/UDP: Closing socket
                    Apr 14 19:12:06 openvpn[32022]: event_wait : Interrupted system call (code=4)
                    Apr 14 18:53:43 openvpn[32022]: Initialization Sequence Completed
                    Apr 14 18:53:43 openvpn[32022]: /sbin/route add -net 10.155.1.1 10.155.1.5 255.255.255.255
                    Apr 14 18:53:43 openvpn[32022]: /sbin/route add -net 128.0.0.0 10.155.1.5 128.0.0.0
                    Apr 14 18:53:43 openvpn[32022]: /sbin/route add -net 0.0.0.0 10.155.1.5 128.0.0.0
                    Apr 14 18:53:43 openvpn[32022]: /sbin/route add -net 68.232.186.243 MY CABLE GATEWAY 255.255.255.255
                    Apr 14 18:53:43 openvpn[32022]: /usr/local/sbin/ovpn-linkup ovpnc1 1500 1542 10.155.1.6 10.155.1.5 init
                    Apr 14 18:53:43 openvpn[32022]: /sbin/ifconfig ovpnc1 10.155.1.6 10.155.1.5 mtu 1500 netmask 255.255.255.255 up
                    Apr 14 18:53:43 openvpn[32022]: do_ifconfig, tt->ipv6=1, tt->did_ifconfig_ipv6_setup=0
                    Apr 14 18:53:43 openvpn[32022]: TUN/TAP device /dev/tun1 opened
                    Apr 14 18:53:43 openvpn[32022]: TUN/TAP device ovpnc1 exists previously, keep at program end
                    Apr 14 18:53:43 openvpn[32022]: ROUTE_GATEWAY –-MY EXTERNAL CABLE IP---
                    Apr 14 18:53:43 openvpn[32022]: OPTIONS IMPORT: –ip-win32 and/or --dhcp-option options modified
                    Apr 14 18:53:43 openvpn[32022]: OPTIONS IMPORT: route options modified
                    Apr 14 18:53:43 openvpn[32022]: OPTIONS IMPORT: –ifconfig/up options modified
                    Apr 14 18:53:43 openvpn[32022]: OPTIONS IMPORT: timers and/or timeouts modified
                    Apr 14 18:53:43 openvpn[32022]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,route 10.155.1.1,topology net30,ifconfig 10.155.1.6 10.155.1.5'

                    The 'can not find WAN ipv6' etc I see every day, btw, I have no clue why. None of the interfaces have ipv6 enabled.

                    Anyway, changing ipv4 back into ipv6 makes OpenVPN start again.

                    I am going to buy me a Draytek modem/router all in one  ;D ;D ;D ;D ;D

                    ( :-)

                    6 and a half billion people know that they are stupid, agressive, lower life forms.

                    1 Reply Last reply Reply Quote 0
                    • G
                      gazzaman
                      last edited by

                      Hi have you done
                      Go to Firewall and select NAT, then click the Outbound tab. Select any existing rules and delete them. Select the “Automatic” option at the top and click Save, then select “Manual” and click Save. You should see a new set of rules which you can activate by clicking Apply Changes.

                      did a set of rules appear in the firewall rule set.
                      I did try and add another client after I upgraded to 2.1.2 and they did not appear so I had to add them manually

                      1 Reply Last reply Reply Quote 0
                      • M
                        Mr. Jingles
                        last edited by

                        @gazzaman:

                        Hi have you done
                        Go to Firewall and select NAT, then click the Outbound tab. Select any existing rules and delete them. Select the “Automatic” option at the top and click Save, then select “Manual” and click Save. You should see a new set of rules which you can activate by clicking Apply Changes.

                        did a set of rules appear in the firewall rule set.
                        I did try and add another client after I upgraded to 2.1.2 and they did not appear so I had to add them manually

                        Thanks for your reply  ;D

                        Yes I did:

                        I tried the NAT-thing that KomodoSteve writed about afterwards, I rebooted the box, but nothing.

                        And to add to that: the NAT does have anything to do with the gateway not being up? I thought it was only for traffic after the gateway was up?

                        6 and a half billion people know that they are stupid, agressive, lower life forms.

                        1 Reply Last reply Reply Quote 0
                        • G
                          gazzaman
                          last edited by

                          I will upload some screen shots of my setup. (I use PIA also) but it will not be today.

                          1 Reply Last reply Reply Quote 0
                          • M
                            Mr. Jingles
                            last edited by

                            @gazzaman:

                            I will upload some screen shots of my setup. (I use PIA also) but it will not be today.

                            That is very nice of you, thank you  ;D

                            I did find out something else: in System/Gateways, PIA was set to Ipv6 by default during install. I have no clue why, since PIA runs on WAN2, which is Ipv4 only. So yesterday I changed Ipv6 to Ipv4. I think perhaps I forgot to check if it saved that. Today I did. I hadn't saved it. So I changed it again. But: it doesn't save it at all.

                            I can change this to IPv4 all I want and press 'save' all I want; the second I go in again to see what it saved, it is back to IPv6 again.

                            Perhaps this is the reason there is no gateway up(?)

                            ![8. System_gateways2.jpg](/public/imported_attachments/1/8. System_gateways2.jpg)
                            ![8. System_gateways2.jpg_thumb](/public/imported_attachments/1/8. System_gateways2.jpg_thumb)

                            6 and a half billion people know that they are stupid, agressive, lower life forms.

                            1 Reply Last reply Reply Quote 0
                            • M
                              Mr. Jingles
                              last edited by

                              My firewall/NAT btw (partly, as the board doesn't allow the full size pic due to the file size limitations. I picked the lower part which shows WAN2 and PIA).

                              ![9b. Firewall_NAT.jpg](/public/imported_attachments/1/9b. Firewall_NAT.jpg)
                              ![9b. Firewall_NAT.jpg_thumb](/public/imported_attachments/1/9b. Firewall_NAT.jpg_thumb)

                              6 and a half billion people know that they are stupid, agressive, lower life forms.

                              1 Reply Last reply Reply Quote 0
                              • B
                                brick41
                                last edited by

                                Hello I also have private internet access and cannot get OpenVPN to work. It connects just fine but I don't have any internet. I am using this ISO downloaded and installed today:
                                pfSense-LiveCD-2.1.2-RELEASE-amd64-20140410-0541.iso

                                I think there is something wrong because the directions from (http://www.komodosteve.com/archives/232) are pretty straightforward. I will try an older ISO tomorrow. In the directions he says:

                                "Go to Firewall and select NAT, then click the Outbound tab. Select any existing rules and delete them. Select the “Automatic” option at the top and click Save, then select “Manual” and click Save. You should see a new set of rules which you can activate by clicking Apply Changes."

                                I did that but it doesn't show the OPT interface, even after reboot and with OpenVPN successfully connected with an IP. A screenshot is attached. Does anyone who has PIA working can you tell us the ISO of pfsense you are using? Did you have to make custom routing rules or NAT changes? Can you tell us how your pfsense is setup?

                                I also tried the "How to create an OpenVPN client to StrongVPN" sticky post but no go. I did try rebooting multiple times through each of these steps. The other TUVPN sticky looks a little strange so I haven't tried it.. it looks like he modifies the vpn interface to allow any traffic from anywhere?

                                Capture.PNG
                                Capture.PNG_thumb

                                1 Reply Last reply Reply Quote 0
                                • M
                                  Mr. Jingles
                                  last edited by

                                  @brick41:

                                  Hello I also have private internet access and cannot get OpenVPN to work. It connects just fine but I don't have any internet. I am using this ISO downloaded and installed today:
                                  pfSense-LiveCD-2.1.2-RELEASE-amd64-20140410-0541.iso

                                  I think there is something wrong because the directions from (http://www.komodosteve.com/archives/232) are pretty straightforward. I will try an older ISO tomorrow.

                                  Good to see for my self confidence that I am not the only one  ;D

                                  My attempts were at 2.1 (since you wrote you will try an older one than 2.1.2), and that I couldn't get to work.

                                  For more than just this reason of PIA I decided to completely rebuild my box, yesterday evening I deleted everything and installed 2.1.2. I have yet to try PIA, but given your feedback I think I already know my answer  :'(

                                  6 and a half billion people know that they are stupid, agressive, lower life forms.

                                  1 Reply Last reply Reply Quote 0
                                  • P
                                    phil.davis
                                    last edited by

                                    In versions prior to 2.1.2 the automatic outbound NAT was not making outbound NAT rules for OpenVPN clients that connected out to VPN providers. That was the intended behavior. But there was a [bug|feature] that when you switched to manual outbound NAT, the initial set of rules generated did include NAT rules for OpenVPN clients. That is why the step of switching to manual outbound NAT did the trick.
                                    From 2.1.2, the underlying automatic outbound NAT rules and the set generated when you switch to manual outbound NAT are now the same.
                                    You have to switch to manual outbound NAT, and then add outbound NAT rule/s for traffic leaving the OpenVPN client towards the VPN provider.

                                    As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                    If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      Mr. Jingles
                                      last edited by

                                      @phil.davis:

                                      In versions prior to 2.1.2 the automatic outbound NAT was not making outbound NAT rules for OpenVPN clients that connected out to VPN providers. That was the intended behavior. But there was a [bug|feature] that when you switched to manual outbound NAT, the initial set of rules generated did include NAT rules for OpenVPN clients. That is why the step of switching to manual outbound NAT did the trick.
                                      From 2.1.2, the underlying automatic outbound NAT rules and the set generated when you switch to manual outbound NAT are now the same.
                                      You have to switch to manual outbound NAT, and then add outbound NAT rule/s for traffic leaving the OpenVPN client towards the VPN provider.

                                      Thank you very much for your reply, Phil  ;D

                                      PS The OpenVPN log doesn't appear to show any errors.

                                      I tried to add 'some' manual NAT rules, basically by copying the existing ones the switch to 'manual' generated and only changing the interface, but I am still not there yet  :-\

                                      I do have something more now: it now shows me an IP on the gateway (but it is an internal IP, I would have expected an external one), but the gateway itself is offline (screenshot).

                                      So probably I've done something wrong again.

                                      Interesting to see is the firewall on the PIA-interface is blocking something (screenshot).

                                      Would you happen to have a clue as to how to fix this?

                                      Thank you again for all your great help  :-*

                                      ![10. Some Progress.jpg](/public/imported_attachments/1/10. Some Progress.jpg)
                                      ![10. Some Progress.jpg_thumb](/public/imported_attachments/1/10. Some Progress.jpg_thumb)

                                      6 and a half billion people know that they are stupid, agressive, lower life forms.

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        Mr. Jingles
                                        last edited by

                                        Picture of my manual NAT outbound:

                                        ![11. Manual NAT.jpg](/public/imported_attachments/1/11. Manual NAT.jpg)
                                        ![11. Manual NAT.jpg_thumb](/public/imported_attachments/1/11. Manual NAT.jpg_thumb)

                                        6 and a half billion people know that they are stupid, agressive, lower life forms.

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          Mr. Jingles
                                          last edited by

                                          Mmmm. Interesting ( ::)): when I restart the openvpn-service the gateway is up for three seconds, then it is down again. To my understanding the log (attached) doesn't show anything strange.

                                          What is strange too, is: suddenly my MS Outlook mail client can not access my POP3 gmail accounts anymore, due to 'password incorrect'. Even 'though I have not even yet sent any traffic over the PIA interface (firewall rule), as that is still not working correctly.

                                          log1.txt

                                          6 and a half billion people know that they are stupid, agressive, lower life forms.

                                          1 Reply Last reply Reply Quote 0
                                          • P
                                            phil.davis
                                            last edited by

                                            That looks good to me.
                                            PIA allocates some private address space to your VPN tunnel (they won't want to use up their valuable public IP addresses). They know who you are, and will NAT your traffic when it goes out of their VPN server onto the public internet.
                                            But of course they don't know what other private IP addresses you are using behind the PIA tunnel. So pfSense has to NAT onto the tunnel - that way PIA sees all the traffic as coming from the OpenVPN client tunnel IP.
                                            Can someone else spot what else is missing here?

                                            As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                            If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.