Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2.0 After upgrade to the last buid the peer to - peer tunnle it's not starting

    OpenVPN
    3
    32
    11.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pateutz
      last edited by

      Hi Team,

      i have made the upgrade of an 2.0-RC1 (amd64) build from 21 of March to Apr 17 build .

      On the current VPN definition i have a Peer to Peer tunnel definition that's work very well until today .

      After the last update this error message appear when try to start the Open VPN service :

      openvpn[8154]: Use –help for more information.
      openvpn[8154]: Options error: –server directive netmask is invalid

      And into Status - > Open VPN :

      Common Name    Real Address

      [ error ]              Management Daemon Unreachable

      Any clue what can be ?

      Best regards,

      Daniel

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        openvpn[8154]: Options error: --server directive netmask is invalid
        

        What is your server's tunnel network set to?  What does the server's config in /var/etc/openvpn/server<x>.conf look like?</x>

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • C
          cyboc
          last edited by

          Hi pateutz,

          I have a similar story. I am having problems with peer-to-peer tunnels that worked with March 17 build but no longer work with April 14th build. The tunnel comes up but I can't ping across it. No changes to settings, just updated firmware.

          All of my tunnels are configured in "Peer-to-Peer SSL/TLS" mode. Are yours "Peer-to-Peer SSL/TLS" or "Peer-to-Peer static key"?

          Here are the only differences (all other settings identical) I see in the gui-generated server config files:

          old file that worked:

          ifconfig 10.9.4.1 10.9.4.2
          

          new file that does not work:

          server 10.9.4.0 255.255.255.0
          client-config-dir /var/etc/openvpn-csc
          

          I might be wrong but it seems that the new file's settings are for remote access and not peer to peer.

          If I change the mode from "Peer-to-Peer SSL/TLS" to "Peer-to-Peer static key", then the new file looks more like the old file (i.e with same ifconfig directive and no server directive).

          Is "Peer-to-Peer SSL/TLS" broken in some way in later versions of firmware or is that mode now deprecated in favor of using only "Peer-to-Peer static key" mode?

          1 Reply Last reply Reply Quote 0
          • C
            cyboc
            last edited by

            @cyboc:

            Here are the only differences (all other settings identical) I see in the gui-generated server config files:

            old file that worked:

            ifconfig 10.9.4.1 10.9.4.2
            

            new file that does not work:

            server 10.9.4.0 255.255.255.0
            client-config-dir /var/etc/openvpn-csc
            

            Perhaps this difference in behaviour was introduced with this April 8th commit? Not sure though…

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              Try this:
              https://rcs.pfsense.org/projects/pfsense/repos/mainline/commits/6c9cf4662eaa2db6cd8eea770f7364aaa9feae99

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • C
                cyboc
                last edited by

                @jimp:

                Try this:
                https://rcs.pfsense.org/projects/pfsense/repos/mainline/commits/6c9cf4662eaa2db6cd8eea770f7364aaa9feae99

                Thanks Jimp! I think that should fix it. The only remaining difference between the before and after version of the OpenVPN config file is "client-config-dir /var/etc/openvpn-csc", which I believe was the intention of the fix for #1417. In otherwords, I got back the ifconfig setting is there is no longer a server setting. Thanks!

                Is that fix already included in 20110418-1517 build or should I wait for the next build after that one?

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  Wait for the next new build, I just committed that so it should kick off another build that will upload later tonight.

                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • C
                    cyboc
                    last edited by

                    @jimp:

                    Wait for the next new build, I just committed that so it should kick off another build that will upload later tonight.

                    Doh! I tried the new firmware today. The OpenVPN peer-to-peer SSL/TLS tunnels do NOT start up. In the OpenVPN log, I see the following error:

                    Options error: --client-config-dir/--ccd-exclusive requires --mode server
                    

                    So it seems the client-config-dir setting is only allowed with server mode and not p2p mode. Honestly, I can't figure out what the use case would be for having that client-config-dir setting in a peer to peer tunnel anyway.

                    Jimp, is it possible to back out that client-config-dir change and just go back to the previous behaviour (i.e. the behaviour prior to fixing bug #1417)?  It seems that OpenVPN does not allow client-config-dir with peer-to-peer.

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      Done. Thanks for testing.

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • C
                        cyboc
                        last edited by

                        Hi Jimp,

                        Thanks for that! I have flashed the new firmware onto a lab router this morning and I can confirm that backing out that change seems to have fixed the services not coming up due to that error. I will try the router in production later today and let you know how it goes. Looks good so far!

                        1 Reply Last reply Reply Quote 0
                        • jimpJ
                          jimp Rebel Alliance Developer Netgate
                          last edited by

                          Yeah except there is still an issue, apparently the peer-to-peer PKI setups are strange beasts which need some extra love. I need to run some more tests and find out how to properly fix that bug.

                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          1 Reply Last reply Reply Quote 0
                          • C
                            cyboc
                            last edited by

                            We've been using peer-to-peer PKI in production for several weeks now with no problems until the attempted fix for #1417 the other day. I suppose we could try reconfiguring all p2p tunnels for static key but "if it ain't broke, don't fix it".

                            1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              Are you using client-specific-config entries to specify iroutes to client networks?

                              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 0
                              • C
                                cyboc
                                last edited by

                                @jimp:

                                Are you using client-specific-config entries to specify iroutes to client networks?

                                No way. Not at all. But maybe the user that originally requested #1417 was trying to do that.

                                Personally, I don't think client specific config entries makes sense for p2p and neither does OpenVPN and that's why it spit out that error message "Options error: –client-config-dir/--ccd-exclusive requires --mode server".

                                1 Reply Last reply Reply Quote 0
                                • jimpJ
                                  jimp Rebel Alliance Developer Netgate
                                  last edited by

                                  Well it is required for Peer to Peer (SSL/TLS) - just not Peer to Peer (Shared Key) - that's what I was referring to, SSL/TLS is the "PKI" I was referring to earlier.

                                  For Peer to Peer (SSL/TLS) you need iroutes to get routes back to your remote sites that connect to the server instance.

                                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                  Need help fast? Netgate Global Support!

                                  Do not Chat/PM for help!

                                  1 Reply Last reply Reply Quote 0
                                  • jimpJ
                                    jimp Rebel Alliance Developer Netgate
                                    last edited by

                                    I think I've got this sorted for sure, it works for me in a Peer-to-Peer (SSL/TLS) setup with iroutes between two VM networks.

                                    https://rcs.pfsense.org/projects/pfsense/repos/mainline/commits/0cc5ab42269a5aa1588ac2f862b0201917569ada

                                    Either try that change or wait for the next new snapshot and then try it again.

                                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                    Need help fast? Netgate Global Support!

                                    Do not Chat/PM for help!

                                    1 Reply Last reply Reply Quote 0
                                    • P
                                      pateutz
                                      last edited by

                                      Hy team ,

                                      the issue still remains . I have updated to the last version "2.0-RC1 (amd64)
                                      built on Mon Apr 25 23:01:13 EDT 2011" the same error :
                                      …....
                                      openvpn[41007]: Options error: –server directive network/netmask combination is invalid
                                      .......
                                      The tunnels defined :

                                      Server Mode : Peer to Peer ( SSL/TLS )
                                      Protocol : UDP
                                      Device Mode : tun

                                      Best Regards,

                                      Daniel

                                      1 Reply Last reply Reply Quote 0
                                      • jimpJ
                                        jimp Rebel Alliance Developer Netgate
                                        last edited by

                                        What does you /var/etc/openvpn/server*.conf look like for that instance?

                                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                        Need help fast? Netgate Global Support!

                                        Do not Chat/PM for help!

                                        1 Reply Last reply Reply Quote 0
                                        • P
                                          pateutz
                                          last edited by

                                          Hi Jimp,

                                          pwd

                                          /var/etc/openvpn

                                          ls -lrt

                                          total 26
                                          -rw–-----  1 root  wheel  657 Oct 13  2010 server2.tls-auth
                                          -rw-------  1 root  wheel  1675 Apr 26 10:00 server3.key
                                          -rw-------  1 root  wheel  688 Apr 26 10:00 server3.conf
                                          -rw-------  1 root  wheel  1537 Apr 26 10:00 server3.cert
                                          -rw-------  1 root  wheel  1529 Apr 26 10:00 server3.ca
                                          srwxrwxrwx  1 root  wheel    0 Apr 26 10:00 server2.sock
                                          -rw-------  1 root  wheel  1675 Apr 26 10:00 server2.key
                                          -rw-------  1 root  wheel  677 Apr 26 10:00 server2.conf
                                          -rw-------  1 root  wheel  1513 Apr 26 10:00 server2.cert
                                          -rw-------  1 root  wheel  1513 Apr 26 10:00 server2.ca
                                          -rw-------  1 root  wheel  1675 Apr 26 10:29 server1.key
                                          -rw-------  1 root  wheel  682 Apr 26 10:29 server1.conf
                                          -rw-------  1 root  wheel  1529 Apr 26 10:29 server1.cert
                                          -rw-------  1 root  wheel  1529 Apr 26 10:29 server1.ca

                                          Best Regards,

                                          Daniel

                                          1 Reply Last reply Reply Quote 0
                                          • jimpJ
                                            jimp Rebel Alliance Developer Netgate
                                            last edited by

                                            But what about the contents of those .conf files?

                                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                            Need help fast? Netgate Global Support!

                                            Do not Chat/PM for help!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.