• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Can’t reach remote host in peer-to-peer network

Scheduled Pinned Locked Moved OpenVPN
17 Posts 2 Posters 850 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    DominikHoffmann
    last edited by May 1, 2024, 11:27 AM

    It sure must look like I am spamming this forum. It’s just that I have so many questions. Each time I tweak a parameter and it doesn’t solve the issue, it raises new questions. I think, I have the tunnel network and assigned client addresses in the tunnel network figured out. This is from Status → OpenVPN:

    Screenshot 2024-05-01 at 7.08.29 AM.png

    The problem is that even though ostensibly connected, I cannot reach the remote pfSense appliances at either 192.168.7.2 and 192.168.7.3 or their corresponding addresses 192.168.34.1 and 192.168.42.1 in their own local subnets. Connections time out.

    V 1 Reply Last reply May 1, 2024, 12:30 PM Reply Quote 0
    • V
      viragomann @DominikHoffmann
      last edited by May 1, 2024, 12:30 PM

      @DominikHoffmann said in Can’t reach remote host in peer-to-peer network:

      I cannot reach the remote pfSense appliances at either 192.168.7.2 and 192.168.7.3

      At least these virtual IPs should be reachable if access is allowed on the remote OpenVPN interface.
      So first off check the firewall rules on the remote sites.

      If you still are unable to access the remote virtuell IPs set the servers log level to 3, reconnect and check the OpenVPN log after.

      D 1 Reply Last reply May 1, 2024, 1:32 PM Reply Quote 1
      • D
        DominikHoffmann @viragomann
        last edited by DominikHoffmann May 1, 2024, 1:33 PM May 1, 2024, 1:32 PM

        @viragomann said in Can’t reach remote host in peer-to-peer network:

        At least these virtual IPs should be reachable if access is allowed on the remote OpenVPN interface.
        So first off check the firewall rules on the remote sites.

        Does access have to be allowed explicitly? I do not have an interface defined for the VPN network on the remote appliances. Should I, and then allow access from 192.168.1.1 in the firewall rules?

        If you still are unable to access the remote virtuell IPs set the servers log level to 3, reconnect and check the OpenVPN log after.

        I have a lot of this in my OpenVPN log:

        May 1 09:22:52	openvpn	43411	client1/xxx.xxx.xxx.xxx:18819 UDPv4 WRITE [340] to [AF_INET]xxx.xxx.xxx.xxx:18819: P_DATA_V2 kid=2 DATA len=339
        May 1 09:22:52	openvpn	43411	client2/yyy.yyy.yyy.yyy:54569 UDPv4 WRITE [340] to [AF_INET]yyy.yyy.yyy.yyy:54569: P_DATA_V2 kid=2 DATA len=339
        May 1 09:22:52	openvpn	43411	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
        May 1 09:22:53	openvpn	43411	MANAGEMENT: CMD 'status 2'
        May 1 09:22:53	openvpn	43411	MANAGEMENT: CMD 'quit'
        May 1 09:22:53	openvpn	43411	MANAGEMENT: Client disconnected
        May 1 09:22:55	openvpn	43411	client1/xxx.xxx.xxx.xxx:18819 UDPv4 WRITE [156] to [AF_INET]xxx.xxx.xxx.xxx:18819: P_DATA_V2 kid=2 DATA len=155
        May 1 09:22:55	openvpn	43411	client2/yyy.yyy.yyy.yyy:54569 UDPv4 WRITE [156] to [AF_INET]yyy.yyy.yyy.yyy:54569: P_DATA_V2 kid=2 DATA len=155
        

        This is Verosity Level 6. The MANAGEMENT lines occur only rarely.

        V 1 Reply Last reply May 1, 2024, 1:37 PM Reply Quote 0
        • V
          viragomann @DominikHoffmann
          last edited by viragomann May 1, 2024, 1:40 PM May 1, 2024, 1:37 PM

          @DominikHoffmann said in Can’t reach remote host in peer-to-peer network:

          Does access have to be allowed explicitly? I do not have an interface defined for the VPN network on the remote appliances. Should I, and then allow access from 192.168.1.1 in the firewall rules?

          No, this is not necessary for site-to-site access.
          You can just add the rules on the OpenVPN tab.

          This is Verosity Level 6. The MANAGEMENT lines occur only rarely.

          To much noise there with level 6 at all. Use level 4. This will also show enough for troubleshooting this , also if the CSO is treated properly, which is not logged on level 3 though.

          D 1 Reply Last reply May 2, 2024, 12:36 PM Reply Quote 1
          • D
            DominikHoffmann @viragomann
            last edited by May 2, 2024, 12:36 PM

            @viragomann: Back to Verbosity 4:

            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 TLS: soft reset sec=3249/3248 bytes=2981463/-1 pkts=8102/0
            May 2 07:46:00	openvpn	23011	MANAGEMENT: CMD 'quit'
            May 2 07:46:00	openvpn	23011	MANAGEMENT: Client disconnected
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 VERIFY WARNING: depth=0, unable to get certificate CRL: C=US, ST=$state, L=$location, O=$serverorg, CN=$clientname
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 VERIFY WARNING: depth=1, unable to get certificate CRL: CN=pfSense-CA, C=US, ST=$state, L=$location, O=$serverorg
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 VERIFY SCRIPT OK: depth=1, CN=pfSense-CA, C=US, ST=$state, L=$location, O=$serverorg
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 VERIFY OK: depth=1, CN=pfSense-CA, C=US, ST=$state, L=$location, O=$serverorg
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 VERIFY SCRIPT OK: depth=0, C=US, ST=$state, L=$location, O=$serverorg, CN=$clientname
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 VERIFY OK: depth=0, C=US, ST=$state, L=$location, O=$serverorg, CN=$clientname
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 peer info: IV_VER=2.6.8
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 peer info: IV_PLAT=freebsd
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 peer info: IV_TCPNL=1
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 peer info: IV_MTU=1600
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 peer info: IV_NCP=2
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 peer info: IV_PROTO=990
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
            May 2 07:46:00	openvpn	23011	clientname/xxx.xxx.xxx.xxx:16834 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
            

            These are the most recent lines related to one of the clients. It all looks fine, doesn’t it? Still, I cannot reach the client pfSense appliance at the assigned IP of 192.168.7.2. Overnight the browser tab I had pointed to that loaded the login page, but this morning I could no longer reload it. Is this intermittency an indication of something specific?

            Maybe the logs on the client would shed some light, but I am unable to go there physically to check right now.

            V 1 Reply Last reply May 2, 2024, 1:07 PM Reply Quote 0
            • V
              viragomann @DominikHoffmann
              last edited by May 2, 2024, 1:07 PM

              @DominikHoffmann
              Maybe a bit too few lines to say anything regarding the problem.
              All posted lines were logged within one second. They neither show the assignment of the virtual client IP.

              Maybe you can post some more log lines.

              Yes, there might have been troubles with the forum today's morning. I was unable to log in as well.

              D 3 Replies Last reply May 2, 2024, 2:08 PM Reply Quote 1
              • D
                DominikHoffmann @viragomann
                last edited by May 2, 2024, 2:08 PM

                @viragomann: Thanks very much for working with me on this (again)!

                Here are more log lines. There is nothing in here that is in addition to what I had posted before.

                May 2 09:31:52	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:31:53	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:31:53	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:31:53	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:32:57	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:32:57	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:32:57	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:32:57	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:34:01	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:34:01	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:34:01	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:34:01	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 TLS: soft reset sec=3249/3248 bytes=2023297/-1 pkts=5446/0
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 VERIFY WARNING: depth=0, unable to get certificate CRL: C=US, ST=$state, L=$location1, O=$serverorg, CN=$client1
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 VERIFY WARNING: depth=1, unable to get certificate CRL: CN=pfSense-CA, C=US, ST=$state, L=$location1, O=$serverorg
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 VERIFY SCRIPT OK: depth=1, CN=pfSense-CA, C=US, ST=$state, L=$location1, O=$serverorg
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 VERIFY OK: depth=1, CN=pfSense-CA, C=US, ST=$state, L=$location1, O=$serverorg
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 VERIFY SCRIPT OK: depth=0, C=US, ST=$state, L=$location1, O=$serverorg, CN=$client1
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 VERIFY OK: depth=0, C=US, ST=$state, L=$location1, O=$serverorg, CN=$client1
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 peer info: IV_VER=2.6.8
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 peer info: IV_PLAT=freebsd
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 peer info: IV_TCPNL=1
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 peer info: IV_MTU=1600
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 peer info: IV_NCP=2
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 peer info: IV_PROTO=990
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
                May 2 09:34:17	openvpn	23011	$client1/xxx.xxx.xxx.xxx:16834 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
                May 2 09:35:05	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:35:05	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:35:06	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:35:06	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:36:09	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:36:09	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:36:10	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:36:10	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:37:13	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:37:14	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:37:14	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:37:14	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:38:18	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:38:18	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:38:18	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:38:18	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:39:22	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:39:22	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:39:22	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:39:22	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 TLS: soft reset sec=3535/3535 bytes=2169648/-1 pkts=5803/0
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=$client2, C=US, ST=$state, L=$location2, O=$clientorg2
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 VERIFY WARNING: depth=1, unable to get certificate CRL: CN=pfSense-CA, C=US, ST=$state, L=$location1, O=$serverorg
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 VERIFY SCRIPT OK: depth=1, CN=pfSense-CA, C=US, ST=$state, L=$location1, O=$serverorg
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 VERIFY OK: depth=1, CN=pfSense-CA, C=US, ST=$state, L=$location1, O=$serverorg
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 VERIFY SCRIPT OK: depth=0, CN=$client2, C=US, ST=$state, L=$location2, O=$clientorg2
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 VERIFY OK: depth=0, CN=$client2, C=US, ST=$state, L=$location2, O=$clientorg2
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 peer info: IV_VER=2.6.8
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 peer info: IV_PLAT=freebsd
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 peer info: IV_TCPNL=1
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 peer info: IV_MTU=1600
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 peer info: IV_NCP=2
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 peer info: IV_PROTO=990
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
                May 2 09:39:25	openvpn	23011	$client2/yyy.yyy.yyy.yyy:18764 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
                May 2 09:40:26	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:40:26	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:40:26	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:40:26	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:41:30	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:41:30	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:41:30	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:41:30	openvpn	23011	MANAGEMENT: Client disconnected
                

                11 repeating instances removed

                May 2 09:54:19	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:54:19	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:54:20	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:54:20	openvpn	23011	MANAGEMENT: Client disconnected
                May 2 09:55:23	openvpn	23011	MANAGEMENT: Client connected from /var/etc/openvpn/server2/sock
                May 2 09:55:23	openvpn	23011	MANAGEMENT: CMD 'status 2'
                May 2 09:55:24	openvpn	23011	MANAGEMENT: CMD 'quit'
                May 2 09:55:24	openvpn	23011	MANAGEMENT: Client disconnected
                

                What would have been the wording of an assignment of the clients’ virtual IP addresses? It would be helpful to search the log for a corresponding keyword.

                1 Reply Last reply Reply Quote 0
                • D
                  DominikHoffmann @viragomann
                  last edited by DominikHoffmann May 2, 2024, 2:45 PM May 2, 2024, 2:44 PM

                  @viragomann said in Can’t reach remote host in peer-to-peer network:

                  They neither show the assignment of the virtual client IP.

                  Would it look like this?

                  openvpn[32194]: UDPv4 link remote: 1.2.3.4:1194
                  openvpn[32194]: Peer Connection Initiated with 192.168.110.2:1194
                  openvpn[32194]: Initialization Sequence Completed
                  

                  Source: Check the OpenVPN logs from the Netgate Docs.

                  Is that example from a client or a server log?

                  V 1 Reply Last reply May 2, 2024, 6:53 PM Reply Quote 0
                  • D
                    DominikHoffmann @viragomann
                    last edited by May 2, 2024, 5:23 PM

                    @viragomann: I now also have an excerpt from the client’s log. It shows the last entry, before I upped the verbosity level to 4, and then everything subsequent. The GUI indicated that the connection was established:

                    Screenshot 2024-05-02 at 11.56.38 AM.png

                    Here is the log, which shows “ERROR: FreeBSD route add command failed: external program exited with error status: 1.” Would that be an indication of what to dig into?

                    May 2 00:32:53	openvpn	88086	Initialization Sequence Completed
                    May 2 11:55:43	openvpn	88086	event_wait : Interrupted system call (fd=-1,code=4)
                    May 2 11:55:43	openvpn	88086	SIGTERM received, sending exit notification to peer
                    May 2 11:55:44	openvpn	88086	/sbin/ifconfig ovpnc2 192.168.7.2 -alias
                    May 2 11:55:44	openvpn	88086	/sbin/ifconfig ovpnc2 destroy
                    May 2 11:55:44	openvpn	88086	/usr/local/sbin/ovpn-linkdown ovpnc2 1500 0 192.168.7.2 255.255.255.0 init
                    May 2 11:55:44	openvpn	74717	Flushing states on OpenVPN interface ovpnc2 (Link Down)
                    May 2 11:55:44	openvpn	88086	SIGTERM[soft,exit-with-notification] received, process exiting
                    May 2 11:55:45	openvpn	75682	Note: ignoring --dev-node as it has no effect when using data channel offload
                    May 2 11:55:45	openvpn	75682	Current Parameter Settings:
                    May 2 11:55:45	openvpn	75682	config = '/var/etc/openvpn/client2/config.ovpn'
                    May 2 11:55:45	openvpn	75682	mode = 0
                    May 2 11:55:45	openvpn	75682	show_ciphers = DISABLED
                    May 2 11:55:45	openvpn	75682	show_digests = DISABLED
                    May 2 11:55:45	openvpn	75682	show_engines = DISABLED
                    May 2 11:55:45	openvpn	75682	genkey = DISABLED
                    May 2 11:55:45	openvpn	75682	genkey_filename = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	key_pass_file = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	show_tls_ciphers = DISABLED
                    May 2 11:55:45	openvpn	75682	connect_retry_max = 0
                    May 2 11:55:45	openvpn	75682	Connection profiles [0]:
                    May 2 11:55:45	openvpn	75682	proto = udp4
                    May 2 11:55:45	openvpn	75682	local = '100.64.207.16'
                    May 2 11:55:45	openvpn	75682	local_port = '0'
                    May 2 11:55:45	openvpn	75682	remote = 'hoffmann.homeunix.net'
                    May 2 11:55:45	openvpn	75682	remote_port = '1194'
                    May 2 11:55:45	openvpn	75682	remote_float = DISABLED
                    May 2 11:55:45	openvpn	75682	bind_defined = DISABLED
                    May 2 11:55:45	openvpn	75682	bind_local = ENABLED
                    May 2 11:55:45	openvpn	75682	bind_ipv6_only = DISABLED
                    May 2 11:55:45	openvpn	75682	connect_retry_seconds = 1
                    May 2 11:55:45	openvpn	75682	connect_timeout = 120
                    May 2 11:55:45	openvpn	75682	socks_proxy_server = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	socks_proxy_port = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	tun_mtu = 1500
                    May 2 11:55:45	openvpn	75682	tun_mtu_defined = ENABLED
                    May 2 11:55:45	openvpn	75682	link_mtu = 1500
                    May 2 11:55:45	openvpn	75682	link_mtu_defined = DISABLED
                    May 2 11:55:45	openvpn	75682	tun_mtu_extra = 0
                    May 2 11:55:45	openvpn	75682	tun_mtu_extra_defined = DISABLED
                    May 2 11:55:45	openvpn	75682	tls_mtu = 1250
                    May 2 11:55:45	openvpn	75682	mtu_discover_type = -1
                    May 2 11:55:45	openvpn	75682	fragment = 0
                    May 2 11:55:45	openvpn	75682	mssfix = 1492
                    May 2 11:55:45	openvpn	75682	mssfix_encap = ENABLED
                    May 2 11:55:45	openvpn	75682	mssfix_fixed = DISABLED
                    May 2 11:55:45	openvpn	75682	explicit_exit_notification = 1
                    May 2 11:55:45	openvpn	75682	tls_auth_file = '[INLINE]'
                    May 2 11:55:45	openvpn	75682	key_direction = 1
                    May 2 11:55:45	openvpn	75682	tls_crypt_file = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	tls_crypt_v2_file = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	Connection profiles END
                    May 2 11:55:45	openvpn	75682	remote_random = DISABLED
                    May 2 11:55:45	openvpn	75682	ipchange = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	dev = 'ovpnc2'
                    May 2 11:55:45	openvpn	75682	dev_type = 'tun'
                    May 2 11:55:45	openvpn	75682	dev_node = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	tuntap_options.disable_dco = DISABLED
                    May 2 11:55:45	openvpn	75682	lladdr = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	topology = 3
                    May 2 11:55:45	openvpn	75682	ifconfig_local = '192.168.7.2'
                    May 2 11:55:45	openvpn	75682	ifconfig_remote_netmask = '255.255.255.0'
                    May 2 11:55:45	openvpn	75682	ifconfig_noexec = DISABLED
                    May 2 11:55:45	openvpn	75682	ifconfig_nowarn = DISABLED
                    May 2 11:55:45	openvpn	75682	ifconfig_ipv6_local = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	ifconfig_ipv6_netbits = 0
                    May 2 11:55:45	openvpn	75682	ifconfig_ipv6_remote = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	shaper = 0
                    May 2 11:55:45	openvpn	75682	mtu_test = 0
                    May 2 11:55:45	openvpn	75682	mlock = DISABLED
                    May 2 11:55:45	openvpn	75682	keepalive_ping = 10
                    May 2 11:55:45	openvpn	75682	keepalive_timeout = 60
                    May 2 11:55:45	openvpn	75682	inactivity_timeout = 0
                    May 2 11:55:45	openvpn	75682	session_timeout = 0
                    May 2 11:55:45	openvpn	75682	inactivity_minimum_bytes = 0
                    May 2 11:55:45	openvpn	75682	ping_send_timeout = 10
                    May 2 11:55:45	openvpn	75682	ping_rec_timeout = 60
                    May 2 11:55:45	openvpn	75682	ping_rec_timeout_action = 2
                    May 2 11:55:45	openvpn	75682	ping_timer_remote = ENABLED
                    May 2 11:55:45	openvpn	75682	remap_sigusr1 = 0
                    May 2 11:55:45	openvpn	75682	persist_tun = ENABLED
                    May 2 11:55:45	openvpn	75682	persist_local_ip = DISABLED
                    May 2 11:55:45	openvpn	75682	persist_remote_ip = DISABLED
                    May 2 11:55:45	openvpn	75682	persist_key = ENABLED
                    May 2 11:55:45	openvpn	75682	passtos = DISABLED
                    May 2 11:55:45	openvpn	75682	resolve_retry_seconds = 1000000000
                    May 2 11:55:45	openvpn	75682	resolve_in_advance = DISABLED
                    May 2 11:55:45	openvpn	75682	username = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	groupname = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	chroot_dir = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	cd_dir = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	writepid = '/var/run/openvpn_client2.pid'
                    May 2 11:55:45	openvpn	75682	up_script = '/usr/local/sbin/ovpn-linkup'
                    May 2 11:55:45	openvpn	75682	down_script = '/usr/local/sbin/ovpn-linkdown'
                    May 2 11:55:45	openvpn	75682	down_pre = DISABLED
                    May 2 11:55:45	openvpn	75682	up_restart = DISABLED
                    May 2 11:55:45	openvpn	75682	up_delay = DISABLED
                    May 2 11:55:45	openvpn	75682	log = DISABLED
                    May 2 11:55:45	openvpn	75682	nice = 0
                    May 2 11:55:45	openvpn	75682	mute = 0
                    May 2 11:55:45	openvpn	75682	status_file_version = 1
                    May 2 11:55:45	openvpn	75682	occ = ENABLED
                    May 2 11:55:45	openvpn	75682	sockflags = 0
                    May 2 11:55:45	openvpn	75682	comp.alg = 0
                    May 2 11:55:45	openvpn	75682	route_default_gateway = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	route_delay = 0
                    May 2 11:55:45	openvpn	75682	route_nopull = DISABLED
                    May 2 11:55:45	openvpn	75682	allow_pull_fqdn = DISABLED
                    May 2 11:55:45	openvpn	75682	management_port = 'unix'
                    May 2 11:55:45	openvpn	75682	management_log_history_cache = 250
                    May 2 11:55:45	openvpn	75682	management_client_group = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	shared_secret_file = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
                    May 2 11:55:45	openvpn	75682	replay = ENABLED
                    May 2 11:55:45	openvpn	75682	replay_time = 15
                    May 2 11:55:45	openvpn	75682	test_crypto = DISABLED
                    May 2 11:55:45	openvpn	75682	ca_file = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	cert_file = '/var/etc/openvpn/client2/cert'
                    May 2 11:55:45	openvpn	75682	pkcs12_file = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	cipher_list_tls13 = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	tls_export_cert = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	verify_x509_name = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	remote_cert_ku[i] = 65535
                    May 2 11:55:45	openvpn	75682	remote_cert_ku[i] = 0
                    May 2 11:55:45	openvpn	75682	remote_cert_ku[i] = 0
                    May 2 11:55:45	openvpn	75682	remote_cert_ku[i] = 0
                    May 2 11:55:45	openvpn	75682	remote_cert_ku[i] = 0
                    May 2 11:55:45	openvpn	75682	remote_cert_ku[i] = 0
                    May 2 11:55:45	openvpn	75682	remote_cert_eku = 'TLS Web Server Authentication'
                    May 2 11:55:45	openvpn	75682	renegotiate_bytes = -1
                    May 2 11:55:45	openvpn	75682	handshake_window = 60
                    May 2 11:55:45	openvpn	75682	push_peer_info = DISABLED
                    May 2 11:55:45	openvpn	75682	tls_crypt_v2_metadata = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	pkcs11_protected_authentication = DISABLED
                    May 2 11:55:45	openvpn	75682	pkcs11_private_mode = 00000000
                    ay 2 11:55:45	openvpn	75682	pkcs11_cert_private = DISABLED
                    May 2 11:55:45	openvpn	75682	pkcs11_pin_cache_period = -1
                    May 2 11:55:45	openvpn	75682	server_network = 0.0.0.0
                    May 2 11:55:45	openvpn	75682	server_netmask = 0.0.0.0
                    May 2 11:55:45	openvpn	75682	server_network_ipv6 = ::
                    May 2 11:55:45	openvpn	75682	server_bridge_netmask = 0.0.0.0
                    May 2 11:55:45	openvpn	75682	server_bridge_pool_start = 0.0.0.0
                    May 2 11:55:45	openvpn	75682	ifconfig_pool_defined = DISABLED
                    May 2 11:55:45	openvpn	75682	ifconfig_pool_netmask = 0.0.0.0
                    May 2 11:55:45	openvpn	75682	ifconfig_pool_persist_refresh_freq = 600
                    May 2 11:55:45	openvpn	75682	ifconfig_ipv6_pool_netbits = 0
                    May 2 11:55:45	openvpn	75682	real_hash_size = 256
                    May 2 11:55:45	openvpn	75682	client_connect_script = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	client_disconnect_script = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	ccd_exclusive = DISABLED
                    May 2 11:55:45	openvpn	75682	push_ifconfig_local = 0.0.0.0
                    May 2 11:55:45	openvpn	75682	push_ifconfig_ipv6_defined = DISABLED
                    May 2 11:55:45	openvpn	75682	enable_c2c = DISABLED
                    May 2 11:55:45	openvpn	75682	cf_per = 0
                    May 2 11:55:45	openvpn	75682	cf_initial_per = 10
                    May 2 11:55:45	openvpn	75682	auth_user_pass_verify_script = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	auth_token_lifetime = 0
                    May 2 11:55:45	openvpn	75682	port_share_host = '[UNDEF]'
                    May 2 11:55:45	openvpn	75682	vlan_accept = all
                    May 2 11:55:45	openvpn	75682	client = DISABLED
                    May 2 11:55:45	openvpn	75682	OpenVPN 2.6.8 aarch64-portbld-freebsd15.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] [DCO]
                    May 2 11:55:45	openvpn	75682	library versions: OpenSSL 3.0.13 24 Oct 2023, LZO 2.10
                    May 2 11:55:45	openvpn	75682	DCO version: FreeBSD 15.0-CURRENT #0 plus-RELENG_24_03-n256311-e71f834dd81: Fri Apr 19 00:30:27 UTC 2024 root@freebsd:/var/jenkins/workspace/pfSense-Plus-snapshots-24_03-main/obj/aarch64/Jqi6F4gT/var/jenkins/workspace/pfSense-Plus-snapshots-24_03-main/sources/Free
                    May 2 11:55:45	openvpn	75750	MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client2/sock
                    May 2 11:55:45	openvpn	75750	WARNING: using --pull/--client and --ifconfig together is probably not what you want
                    May 2 11:55:45	openvpn	75750	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
                    May 2 11:55:45	openvpn	75750	WARNING: experimental option --capath /var/etc/openvpn/client2/ca
                    May 2 11:55:45	openvpn	75750	Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
                    May 2 11:55:45	openvpn	75750	Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
                    May 2 11:55:45	openvpn	75750	Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
                    May 2 11:55:50	openvpn	75750	Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
                    May 2 11:55:50	openvpn	75750	TCP/UDP: Preserving recently used remote address: [AF_INET]zzz.zzz.zzz.zzz:1194
                    May 2 11:55:50	openvpn	75750	Socket Buffers: R=[42080->42080] S=[57344->57344]
                    May 2 11:55:50	openvpn	75750	UDPv4 link local (bound): [AF_INET]100.64.207.16:0
                    May 2 11:55:50	openvpn	75750	UDPv4 link remote: [AF_INET]zzz.zzz.zzz.zzz:1194
                    May 2 11:55:50	openvpn	75750	TLS: Initial packet from [AF_INET]zzz.zzz.zzz.zzz:1194, sid=fa988316 9bf7128a
                    May 2 11:55:50	openvpn	75750	VERIFY WARNING: depth=0, unable to get certificate CRL: CN=server, C=US, ST=$state, L=$locality, O=$serverorg
                    May 2 11:55:50	openvpn	75750	VERIFY WARNING: depth=1, unable to get certificate CRL: CN=pfSense-CA, C=US, ST=$state, L=$locality, O=$serverorg
                    May 2 11:55:50	openvpn	75750	VERIFY OK: depth=1, CN=pfSense-CA, C=US, ST=$state, L=$locality, O=$serverorg
                    May 2 11:55:50	openvpn	75750	VERIFY KU OK
                    May 2 11:55:50	openvpn	75750	Validating certificate extended key usage
                    May 2 11:55:50	openvpn	75750	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
                    May 2 11:55:50	openvpn	75750	VERIFY EKU OK
                    May 2 11:55:50	openvpn	75750	VERIFY OK: depth=0, CN=server, C=US, ST=$state, L=$locality, O=$serverorg
                    May 2 11:55:50	openvpn	75750	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
                    May 2 11:55:50	openvpn	75750	[server] Peer Connection Initiated with [AF_INET]zzz.zzz.zzz.zzz:1194
                    May 2 11:55:50	openvpn	75750	TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
                    May 2 11:55:50	openvpn	75750	TLS: tls_multi_process: initial untrusted session promoted to trusted
                    May 2 11:55:50	openvpn	75750	PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.8.0 255.255.255.0,route-gateway 192.168.7.1,topology subnet,ping 10,ping-restart 60,route 192.168.8.0 255.255.255.0,ifconfig 192.168.7.2 255.255.255.0,peer-id 0,cipher AES-128-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'
                    May 2 11:55:50	openvpn	75750	OPTIONS IMPORT: --ifconfig/up options modified
                    May 2 11:55:50	openvpn	75750	OPTIONS IMPORT: route options modified
                    May 2 11:55:50	openvpn	75750	OPTIONS IMPORT: route-related options modified
                    May 2 11:55:50	openvpn	75750	OPTIONS IMPORT: tun-mtu set to 1500
                    May 2 11:55:50	openvpn	75750	ROUTE_GATEWAY 100.64.192.1/255.255.240.0 IFACE=mvneta0.4090 HWADDR=f0:ad:4e:34:5f:bf
                    May 2 11:55:50	openvpn	75750	DCO device ovpnc2 opened
                    May 2 11:55:50	openvpn	75750	do_ifconfig, ipv4=1, ipv6=0
                    May 2 11:55:50	openvpn	75750	/sbin/ifconfig ovpnc2 192.168.7.2/24 mtu 1500 up
                    May 2 11:55:50	openvpn	75750	/usr/local/sbin/ovpn-linkup ovpnc2 1500 0 192.168.7.2 255.255.255.0 init
                    May 2 11:55:50	openvpn	75750	/sbin/route add -net 192.168.8.0 192.168.7.1 255.255.255.0
                    May 2 11:55:50	openvpn	75750	/sbin/route add -net 192.168.1.0 192.168.7.1 255.255.255.0
                    May 2 11:55:50	openvpn	75750	/sbin/route add -net 192.168.8.0 192.168.7.1 255.255.255.0
                    May 2 11:55:50	openvpn	75750	ERROR: FreeBSD route add command failed: external program exited with error status: 1
                    May 2 11:55:50	openvpn	75750	/sbin/route add -net 192.168.8.0 192.168.7.1 255.255.255.0
                    May 2 11:55:50	openvpn	75750	ERROR: FreeBSD route add command failed: external program exited with error status: 1
                    May 2 11:55:50	openvpn	75750	Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
                    May 2 11:55:50	openvpn	75750	Outgoing dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
                    May 2 11:55:50	openvpn	75750	Outgoing dynamic tls-crypt: Using 256 bit message hash 'SHA256' for HMAC authentication
                    May 2 11:55:50	openvpn	75750	Incoming dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
                    May 2 11:55:50	openvpn	75750	Incoming dynamic tls-crypt: Using 256 bit message hash 'SHA256' for HMAC authentication
                    May 2 11:55:50	openvpn	75750	Initialization Sequence Completed
                    May 2 11:55:50	openvpn	75750	Data Channel: cipher 'AES-128-GCM', peer-id: 0
                    May 2 11:55:50	openvpn	75750	Timers: ping 10, ping-restart 60
                    May 2 11:55:50	openvpn	75750	Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
                    
                    1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @DominikHoffmann
                      last edited by May 2, 2024, 6:53 PM

                      @DominikHoffmann said in Can’t reach remote host in peer-to-peer network:

                      Would it look like this?

                      openvpn[32194]: UDPv4 link remote: 1.2.3.4:1194
                      openvpn[32194]: Peer Connection Initiated with 192.168.110.2:1194
                      openvpn[32194]: Initialization Sequence Completed

                      I'd rather expect this to see from the client instance.

                      My server logs this for example:

                      May 2 20:04:47 	openvpn 	27059 	MULTI: primary virtual IP for <commonname>/<clientIP>:63580: 10.0.41.106
                      May 2 20:04:47 	openvpn 	27059 	MULTI: Learn: 10.0.41.106 -> <commonname>/<clientIP>:63580
                      May 2 20:04:47 	openvpn 	27059 	<commonname>/<clientIP>:63580 OPTIONS IMPORT: reading client specific options from: /var/etc/openvpn/server3/csc/<commonname> 
                      

                      Lines 1 and 2 indicate the successful client connection and IP assignment.

                      The third line notes that the CSO was applied properly. So this entry is very important, when using CSO for the concerned client.
                      This is only logged with verbosity level 4 and higher.
                      If you don't see this line the CSO is not applied and you have to research for the reason.

                      Also if you have stated clients remote networks in the CSO you should see a row, which tells you, that the routes for these subnets pointing to the clients virtual IP were added to the server. This is essential for site-to-site communication.

                      Here is the log, which shows “ERROR: FreeBSD route add command failed: external program exited with error status: 1.” Would that be an indication of what to dig into?

                      This is an issue, that should be fixed for sure. However, I don't believe that this is the reason for your basic problem.

                      As the "push options" line shows, a route for 192.168.8.0/24 is pushed twice:

                      May 2 11:55:50	openvpn	75750	PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.8.0 255.255.255.0,route-gateway 192.168.7.1,topology subnet,ping 10,ping-restart 60,route 192.168.8.0 255.255.255.0,ifconfig 192.168.7.2 255.255.255.0,peer-id 0,cipher AES-128-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'
                      

                      And I guess, the client just complains here, that he cannot add it a second time.

                      So check the server settings for the reason for this. Note that you don't need state "local networks" in the CSO if you have the same settings already in the server configuration.

                      D 1 Reply Last reply May 2, 2024, 7:49 PM Reply Quote 0
                      • D
                        DominikHoffmann @viragomann
                        last edited by DominikHoffmann May 2, 2024, 7:53 PM May 2, 2024, 7:49 PM

                        @viragomann: Just a tidbit… I can currently bring up https://192.168.7.2/ and https://192.168.7.3/ in my browser. It is completely intermittent.

                        Let’s see, whether I find some of what you mentioned in your most recent response in my OpenVPN log.

                        This is what I found (or didn’t): no mention of the assigned IP address 192.168.7.2 or 192.168.7.3; no occurrence of “MULTI.”

                        1 Reply Last reply Reply Quote 0
                        • D
                          DominikHoffmann
                          last edited by May 3, 2024, 1:17 AM

                          More strangeness after adding a third client:

                          Screenshot 2024-05-02 at 9.10.55 PM.png

                          Why do both of them have the same IP address in the tunnel?

                          V 1 Reply Last reply May 3, 2024, 8:44 AM Reply Quote 0
                          • D
                            DominikHoffmann
                            last edited by May 3, 2024, 3:06 AM

                            Now I have logs from what looks like a successfully established peer-to-peer connection.

                            On the client side:

                            May 2 20:57:52	openvpn	94573	TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
                            May 2 20:57:52	openvpn	94573	TLS Error: TLS handshake failed
                            May 2 20:58:07	openvpn	94573	Failed to delete peer: No such file or directory (errno=2)
                            May 2 20:58:07	openvpn	94573	Initialization Sequence Completed
                            May 2 21:56:52	openvpn	94573	Failed to delete key: No such file or directory (errno=2)
                            May 2 21:56:52	openvpn	94573	Failed to delete peer: No such file or directory (errno=2)
                            May 2 21:56:52	openvpn	94573	SIGUSR1[soft,dco update keys error] received, process restarting
                            May 2 21:56:53	openvpn	94573	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
                            May 2 21:56:53	openvpn	94573	TCP/UDP: Preserving recently used remote address: [AF_INET]zzz.zzz.zzz.zzz:1194
                            May 2 21:56:53	openvpn	94573	UDPv4 link local (bound): [AF_INET]xxx.xxx.xxx.xxx:0
                            May 2 21:56:53	openvpn	94573	UDPv4 link remote: [AF_INET]zzz.zzz.zzz.zzz:1194
                            May 2 21:56:53	openvpn	94573	[server] Peer Connection Initiated with [AF_INET]zzz.zzz.zzz.zzz:1194
                            May 2 21:56:53	openvpn	94573	Preserving previous TUN/TAP instance: ovpnc2
                            May 2 21:56:53	openvpn	94573	Initialization Sequence Completed
                            

                            On the server side:

                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 Re-using SSL/TLS context
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=<client1>, C=US, ST=<clientstate>, L=<clientlocality>, O=<clientorg>
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 VERIFY WARNING: depth=1, unable to get certificate CRL: CN=pfSense-CA, C=US, ST=<serverstate>, L=<serverlocality>, O=<serverorg>
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 VERIFY SCRIPT OK: depth=1, CN=pfSense-CA, C=US, ST=<serverstate>, L=<serverlocality>, O=<serverorg>
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 VERIFY OK: depth=1, CN=pfSense-CA, C=US, ST=<serverstate>, L=<serverlocality>, O=<serverorg>
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 VERIFY SCRIPT OK: depth=0, CN=<client1>, C=US, ST=<clientstate>, L=<clientlocality>, O=<clientorg>
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 VERIFY OK: depth=0, CN=<client1>, C=US, ST=<clientstate>, L=<clientlocality>, O=<clientorg>
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 peer info: IV_VER=2.6.8
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 peer info: IV_PLAT=freebsd
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 peer info: IV_TCPNL=1
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 peer info: IV_MTU=1600
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 peer info: IV_NCP=2
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 peer info: IV_PROTO=990
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 TLS: tls_multi_process: initial untrusted session promoted to trusted
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
                            May 2 21:56:53	openvpn	43949	xxx.xxx.xxx.xxx:18500 [<clieentcommonname>] Peer Connection Initiated with [AF_INET]xxx.xxx.xxx.xxx:18500
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI_sva: pool returned IPv4=192.168.7.2, IPv6=(Not enabled)
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 OPTIONS IMPORT: reading client specific options from: /var/etc/openvpn/server2/csc/<clieentcommonname>
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: Learn: 192.168.7.3 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: primary virtual IP for <clieentcommonname>/xxx.xxx.xxx.xxx:18500: 192.168.7.3
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: internal route 192.168.44.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: Learn: 192.168.44.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: internal route 192.168.43.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: Learn: 192.168.43.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: internal route 192.168.42.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: Learn: 192.168.42.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Outgoing dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Outgoing dynamic tls-crypt: Using 256 bit message hash 'SHA256' for HMAC authentication
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Incoming dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Incoming dynamic tls-crypt: Using 256 bit message hash 'SHA256' for HMAC authentication
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
                            May 2 21:56:53	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 SENT CONTROL [<clieentcommonname>]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.8.0 255.255.255.0,route-gateway 192.168.7.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.7.3 255.255.255.0,peer-id 0,cipher AES-128-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
                            May 2 21:56:54	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Data Channel: cipher 'AES-128-GCM', peer-id: 0
                            May 2 21:56:54	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Timers: ping 10, ping-restart 120
                            May 2 21:56:54	openvpn	43949	<clieentcommonname>/xxx.xxx.xxx.xxx:18500 Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
                            

                            So, it can work. Why does it not each and every time?

                            1 Reply Last reply Reply Quote 0
                            • V
                              viragomann @DominikHoffmann
                              last edited by May 3, 2024, 8:44 AM

                              @DominikHoffmann said in Can’t reach remote host in peer-to-peer network:

                              Why do both of them have the same IP address in the tunnel?

                              Do the clients use the same SSL certificate by any chance?

                              May 2 21:56:53 openvpn 43949 <clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: internal route 192.168.44.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                              May 2 21:56:53 openvpn 43949 <clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: Learn: 192.168.44.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                              May 2 21:56:53 openvpn 43949 <clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: internal route 192.168.43.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                              May 2 21:56:53 openvpn 43949 <clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: Learn: 192.168.43.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                              May 2 21:56:53 openvpn 43949 <clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: internal route 192.168.42.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500
                              May 2 21:56:53 openvpn 43949 <clieentcommonname>/xxx.xxx.xxx.xxx:18500 MULTI: Learn: 192.168.42.1/24 -> <clieentcommonname>/xxx.xxx.xxx.xxx:18500

                              Seems you didn't state real network addresses in the CSO. Instead of 192.168.44.1/24 use 192.168.44.0/24 and so on.

                              D 1 Reply Last reply May 3, 2024, 11:36 AM Reply Quote 0
                              • D
                                DominikHoffmann @viragomann
                                last edited by May 3, 2024, 11:36 AM

                                @viragomann said in Can’t reach remote host in peer-to-peer network:

                                Do the clients use the same SSL certificate by any chance?

                                I was asking myself that, too. I updated the certificate of one (one that happened to be connected at the time), which kicked it off the connection. It has not come back since.

                                Still, they all have different CNs (common names), so that means that their certificates are unique, doesn’t it?

                                V 1 Reply Last reply May 3, 2024, 12:47 PM Reply Quote 0
                                • V
                                  viragomann @DominikHoffmann
                                  last edited by May 3, 2024, 12:47 PM

                                  @DominikHoffmann said in Can’t reach remote host in peer-to-peer network:

                                  I updated the certificate of one (one that happened to be connected at the time), which kicked it off the connection.

                                  The client certificate?
                                  If so, I don't expect that it behaves like that.

                                  The client certificate is verified by the server only once, when the client starts the connection.
                                  Updating it either on pfSense (renew) or on the client should not force the client to reconnect.

                                  Still, they all have different CNs (common names), so that means that their certificates are unique, doesn’t it?

                                  Yes. So I'd expect that each get a unique virtual IP from the server, as long as you didn't set the IPs in the CSO.

                                  1 Reply Last reply Reply Quote 0
                                  • D DominikHoffmann referenced this topic on May 7, 2024, 2:51 AM
                                  • D
                                    DominikHoffmann
                                    last edited by Aug 21, 2024, 3:33 PM

                                    Please see https://forum.netgate.com/post/1181349 and https://forum.netgate.com/post/1181336 for the final puzzle pieces that got it to work.

                                    1 Reply Last reply Reply Quote 0
                                    17 out of 17
                                    • First post
                                      17/17
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                      This community forum collects and processes your personal information.
                                      consent.not_received