Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Please HELP! I am near to go insane!

    Scheduled Pinned Locked Moved OpenVPN
    1 Posts 1 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mdelagic
      last edited by

      Hello World

      I followed this tutorial on YouTube:
      http://www.youtube.com/watch?v=odjviG-KDq8

      and now I can connect, and obtain adress 172.21.100.6
      but:
      1 my Public IP is still from client internet provider provider
      2 client does not obtain Gateway or DNS adress
      3 Cant acces servers taht are ussualy accessible from assigned network
      4 connection is lost after few minutes

      Here is log:
      Sat May 19 12:49:35 2012 OpenVPN 2.1_rc15 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Nov 19 2008
      Sat May 19 12:49:42 2012 WARNING: Make sure you understand the semantics of –tls-remote before using it (see the man page).
      Sat May 19 12:49:42 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
      Sat May 19 12:49:42 2012 Control Channel Authentication: using 'pfsense-udp-1196-tls.key' as a OpenVPN static key file
      Sat May 19 12:49:42 2012 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
      Sat May 19 12:49:42 2012 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
      Sat May 19 12:49:42 2012 LZO compression initialized
      Sat May 19 12:49:42 2012 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
      Sat May 19 12:49:42 2012 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
      Sat May 19 12:49:42 2012 Local Options hash (VER=V4): '272f1b58'
      Sat May 19 12:49:42 2012 Expected Remote Options hash (VER=V4): 'a2e63101'
      Sat May 19 12:49:42 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]
      Sat May 19 12:49:42 2012 UDPv4 link local: [undef]
      Sat May 19 12:49:42 2012 UDPv4 link remote: 82.214.102.18:1196
      Sat May 19 12:49:42 2012 TLS: Initial packet from 82.214.102.18:1196, sid=1398d28b 92d48d9f
      Sat May 19 12:49:42 2012 WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
      Sat May 19 12:49:42 2012 VERIFY OK: depth=1, /C=HR/ST=Slavonia/L=Osijek/O=Oaza/emailAddress=mdelagic@eu-callcenter.com/CN=RoadWarriorCA
      Sat May 19 12:49:42 2012 VERIFY X509NAME OK: /C=HR/ST=Slavonia/L=Osijek/O=Oaza/emailAddress=mdelagic@eu-callcenter.com/CN=Road_Warrior_Server_Cert
      Sat May 19 12:49:42 2012 VERIFY OK: depth=0, /C=HR/ST=Slavonia/L=Osijek/O=Oaza/emailAddress=mdelagic@eu-callcenter.com/CN=Road_Warrior_Server_Cert
      Sat May 19 12:49:43 2012 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
      Sat May 19 12:49:43 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
      Sat May 19 12:49:43 2012 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
      Sat May 19 12:49:43 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
      Sat May 19 12:49:43 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
      Sat May 19 12:49:43 2012 [Road_Warrior_Server_Cert] Peer Connection Initiated with 82.214.102.18:1196
      Sat May 19 12:49:44 2012 SENT CONTROL [Road_Warrior_Server_Cert]: 'PUSH_REQUEST' (status=1)
      Sat May 19 12:49:44 2012 PUSH: Received control message: 'PUSH_REPLY,route 172.21.0.0 255.255.0.0,route 172.21.100.1,topology net30,ping 10,ping-restart 60,ifconfig 172.21.100.6 172.21.100.5'
      Sat May 19 12:49:44 2012 OPTIONS IMPORT: timers and/or timeouts modified
      Sat May 19 12:49:44 2012 OPTIONS IMPORT: –ifconfig/up options modified
      Sat May 19 12:49:44 2012 OPTIONS IMPORT: route options modified
      Sat May 19 12:49:44 2012 ROUTE default_gateway=192.168.1.1
      Sat May 19 12:49:44 2012 TAP-WIN32 device [Local Area Connection 2] opened: \.\Global{CB208463-033F-4437-A8F5-E48680FA3F2D}.tap
      Sat May 19 12:49:44 2012 TAP-Win32 Driver Version 9.4
      Sat May 19 12:49:44 2012 TAP-Win32 MTU=1500
      Sat May 19 12:49:44 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 172.21.100.6/255.255.255.252 on interface {CB208463-033F-4437-A8F5-E48680FA3F2D} [DHCP-serv: 172.21.100.5, lease-time: 31536000]
      Sat May 19 12:49:44 2012 Successful ARP Flush on interface [16] {CB208463-033F-4437-A8F5-E48680FA3F2D}
      Sat May 19 12:49:49 2012 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up
      Sat May 19 12:49:49 2012 C:\WINDOWS\system32\route.exe ADD 172.21.0.0 MASK 255.255.0.0 172.21.100.5
      Sat May 19 12:49:49 2012 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
      Sat May 19 12:49:49 2012 Route addition via IPAPI succeeded [adaptive]
      Sat May 19 12:49:49 2012 C:\WINDOWS\system32\route.exe ADD 172.21.100.1 MASK 255.255.255.255 172.21.100.5
      Sat May 19 12:49:49 2012 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
      Sat May 19 12:49:49 2012 Route addition via IPAPI succeeded [adaptive]
      Sat May 19 12:49:49 2012 Initialization Sequence Completed
      Sat May 19 12:50:55 2012 [Road_Warrior_Server_Cert] Inactivity timeout (–ping-restart), restarting
      Sat May 19 12:50:55 2012 TCP/UDP: Closing socket
      Sat May 19 12:50:55 2012 SIGUSR1[soft,ping-restart] received, process restarting
      Sat May 19 12:50:55 2012 Restart pause, 2 second(s)
      Sat May 19 12:50:57 2012 WARNING: Make sure you understand the semantics of –tls-remote before using it (see the man page).
      Sat May 19 12:50:57 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
      Sat May 19 12:50:57 2012 Re-using SSL/TLS context
      Sat May 19 12:50:57 2012 LZO compression initialized
      Sat May 19 12:50:57 2012 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
      Sat May 19 12:50:57 2012 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
      Sat May 19 12:50:57 2012 Local Options hash (VER=V4): '272f1b58'
      Sat May 19 12:50:57 2012 Expected Remote Options hash (VER=V4): 'a2e63101'
      Sat May 19 12:50:57 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]
      Sat May 19 12:50:57 2012 UDPv4 link local: [undef]
      Sat May 19 12:50:57 2012 UDPv4 link remote: 82.214.102.18:1196
      Sat May 19 12:50:57 2012 TLS: Initial packet from 82.214.102.18:1196, sid=838d6593 794c5153
      Sat May 19 12:50:57 2012 WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
      Sat May 19 12:50:57 2012 VERIFY OK: depth=1, /C=HR/ST=Slavonia/L=Osijek/O=Oaza/emailAddress=mdelagic@eu-callcenter.com/CN=RoadWarriorCA
      Sat May 19 12:50:57 2012 VERIFY X509NAME OK: /C=HR/ST=Slavonia/L=Osijek/O=Oaza/emailAddress=mdelagic@eu-callcenter.com/CN=Road_Warrior_Server_Cert
      Sat May 19 12:50:57 2012 VERIFY OK: depth=0, /C=HR/ST=Slavonia/L=Osijek/O=Oaza/emailAddress=mdelagic@eu-callcenter.com/CN=Road_Warrior_Server_Cert
      Sat May 19 12:50:58 2012 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
      Sat May 19 12:50:58 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
      Sat May 19 12:50:58 2012 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
      Sat May 19 12:50:58 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
      Sat May 19 12:50:58 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
      Sat May 19 12:50:58 2012 [Road_Warrior_Server_Cert] Peer Connection Initiated with 82.214.102.18:1196
      Sat May 19 12:50:59 2012 SENT CONTROL [Road_Warrior_Server_Cert]: 'PUSH_REQUEST' (status=1)
      Sat May 19 12:50:59 2012 PUSH: Received control message: 'PUSH_REPLY,route 172.21.0.0 255.255.0.0,route 172.21.100.1,topology net30,ping 10,ping-restart 60,ifconfig 172.21.100.10 172.21.100.9'
      Sat May 19 12:50:59 2012 OPTIONS IMPORT: timers and/or timeouts modified
      Sat May 19 12:50:59 2012 OPTIONS IMPORT: –ifconfig/up options modified
      Sat May 19 12:50:59 2012 OPTIONS IMPORT: route options modified
      Sat May 19 12:50:59 2012 Preserving previous TUN/TAP instance: Local Area Connection 2
      Sat May 19 12:50:59 2012 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
      Sat May 19 12:50:59 2012 C:\WINDOWS\system32\route.exe DELETE 172.21.100.1 MASK 255.255.255.255 172.21.100.5
      Sat May 19 12:50:59 2012 Route deletion via IPAPI succeeded [adaptive]
      Sat May 19 12:50:59 2012 C:\WINDOWS\system32\route.exe DELETE 172.21.0.0 MASK 255.255.0.0 172.21.100.5
      Sat May 19 12:50:59 2012 Route deletion via IPAPI succeeded [adaptive]
      Sat May 19 12:50:59 2012 Closing TUN/TAP interface
      Sat May 19 12:51:00 2012 ROUTE default_gateway=192.168.1.1
      Sat May 19 12:51:00 2012 TAP-WIN32 device [Local Area Connection 2] opened: \.\Global{CB208463-033F-4437-A8F5-E48680FA3F2D}.tap
      Sat May 19 12:51:00 2012 TAP-Win32 Driver Version 9.4
      Sat May 19 12:51:00 2012 TAP-Win32 MTU=1500
      Sat May 19 12:51:00 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 172.21.100.10/255.255.255.252 on interface {CB208463-033F-4437-A8F5-E48680FA3F2D} [DHCP-serv: 172.21.100.9, lease-time: 31536000]
      Sat May 19 12:51:00 2012 Successful ARP Flush on interface [16] {CB208463-033F-4437-A8F5-E48680FA3F2D}
      Sat May 19 12:51:00 2012 TCP/UDP: Closing socket
      Sat May 19 12:51:00 2012 Closing TUN/TAP interface
      Sat May 19 12:51:00 2012 SIGTERM[hard,] received, process exiting

      PLEASE HELP! (-this iss not from log :))

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.