Для початку не зле б було показати логи сервера і клієнта,тоді про щось можна говорити..
А загалом при допомозі гугла можно знайти повно описів підняття OpenVpn
Tue Dec 4 18:47:26 2012 193.23.23.2:13164 Re-using SSL/TLS contextTue Dec 4 18:47:26 2012 193.23.23.2:13164 LZO compression initializedTue Dec 4 18:47:26 2012 193.23.23.2:13164 Control Channel MTU parms [ L:1574 D:166 EF:66 EB:0 ET:0Tue Dec 4 18:47:26 2012 193.23.23.2:13164 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32Tue Dec 4 18:47:26 2012 193.23.23.2:13164 Local Options hash (VER=V4): '360696c5'Tue Dec 4 18:47:26 2012 193.23.23.2:13164 Expected Remote Options hash (VER=V4): '13a273ba'Tue Dec 4 18:47:26 2012 193.23.23.2:13164 TLS: Initial packet from 193.23.23.2:13164, sid=6a248deeTue Dec 4 18:47:26 2012 193.23.23.2:13164 VERIFY ERROR: depth=1, error=self signed certificate in cTue Dec 4 18:47:26 2012 193.23.23.2:13164 TLS_ERROR: BIO read tls_read_plaintext error: error:14089Tue Dec 4 18:47:26 2012 193.23.23.2:13164 TLS Error: TLS object -> incoming plaintext read errorTue Dec 4 18:47:26 2012 193.23.23.2:13164 TLS Error: TLS handshake failedTue Dec 4 18:47:26 2012 193.23.23.2:13164 SIGUSR1[soft,tls-error] received, client-instance restartTue Dec 4 18:48:28 2012 MULTI: multi_create_instance calledTue Dec 4 18:48:28 2012 193.23.23.2:13241 Re-using SSL/TLS contextTue Dec 4 18:48:28 2012 193.23.23.2:13241 LZO compression initializedTue Dec 4 18:48:28 2012 193.23.23.2:13241 Control Channel MTU parms [ L:1574 D:166 EF:66 EB:0 ET:0Tue Dec 4 18:48:28 2012 193.23.23.2:13241 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32Tue Dec 4 18:48:28 2012 193.23.23.2:13241 Local Options hash (VER=V4): '360696c5'Tue Dec 4 18:48:28 2012 193.23.23.2:13241 Expected Remote Options hash (VER=V4): '13a273ba'Tue Dec 4 18:48:28 2012 193.23.23.2:13241 TLS: Initial packet from 193.23.23.2:13241, sid=1bfa361aTue Dec 4 18:48:28 2012 193.23.23.2:13241 VERIFY ERROR: depth=1, error=self signed certificate in cTue Dec 4 18:48:28 2012 193.23.23.2:13241 TLS_ERROR: BIO read tls_read_plaintext error: error:14089Tue Dec 4 18:48:28 2012 193.23.23.2:13241 TLS Error: TLS object -> incoming plaintext read errorTue Dec 4 18:48:28 2012 193.23.23.2:13241 TLS Error: TLS handshake failedTue Dec 4 18:48:28 2012 193.23.23.2:13241 SIGUSR1[soft,tls-error] received, client-instance restart
Tue Dec 04 17:47:25 2012 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct 1 2006Tue Dec 04 17:47:25 2012 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port.Tue Dec 04 17:47:25 2012 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.Tue Dec 04 17:47:25 2012 Control Channel Authentication: using 'ta.key' as a OpenVPN static key fileTue Dec 04 17:47:25 2012 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationTue Dec 04 17:47:25 2012 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationTue Dec 04 17:47:25 2012 LZO compression initializedTue Dec 04 17:47:25 2012 Control Channel MTU parms [ L:1574 D:166 EF:66 EB:0 ET:0 EL:0 ]Tue Dec 04 17:47:25 2012 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]Tue Dec 04 17:47:25 2012 Local Options hash (VER=V4): '13a273ba'Tue Dec 04 17:47:25 2012 Expected Remote Options hash (VER=V4): '360696c5'Tue Dec 04 17:47:25 2012 UDPv4 link local: [undef]Tue Dec 04 17:47:25 2012 UDPv4 link remote: 193.23.23.1:1194Tue Dec 04 17:47:25 2012 TLS: Initial packet from 193.23.23.1:1194, sid=3a4de361 6b07916bTue Dec 04 17:47:25 2012 VERIFY OK: depth=1, /C=UA/ST=PL/L=Kremenchug/O=Home_server/CN=Home_server_CA/emailAddress=tomkat@userv.localhomeTue Dec 04 17:47:25 2012 VERIFY OK: depth=0, /C=UA/ST=PL/L=Kremenchug/O=Home_server/CN=userv/emailAddress=tomkat@userv.localhomeTue Dec 04 17:48:24 2012 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)Tue Dec 04 17:48:24 2012 TLS Error: TLS handshake failedTue Dec 04 17:48:24 2012 TCP/UDP: Closing socketTue Dec 04 17:48:24 2012 SIGUSR1[soft,tls-error] received, process restartingTue Dec 04 17:48:24 2012 Restart pause, 2 second(s)Tue Dec 04 17:48:26 2012 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port.Tue Dec 04 17:48:26 2012 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.Tue Dec 04 17:48:26 2012 Re-using SSL/TLS contextTue Dec 04 17:48:26 2012 LZO compression initializedTue Dec 04 17:48:26 2012 Control Channel MTU parms [ L:1574 D:166 EF:66 EB:0 ET:0 EL:0 ]Tue Dec 04 17:48:26 2012 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]Tue Dec 04 17:48:26 2012 Local Options hash (VER=V4): '13a273ba'Tue Dec 04 17:48:26 2012 Expected Remote Options hash (VER=V4): '360696c5'Tue Dec 04 17:48:26 2012 UDPv4 link local: [undef]Tue Dec 04 17:48:26 2012 UDPv4 link remote: 193.23.23.1:1194Tue Dec 04 17:48:26 2012 TLS: Initial packet from 193.23.23.1:1194, sid=019cfea5 705c1ca8Tue Dec 04 17:48:26 2012 VERIFY OK: depth=1, /C=UA/ST=PL/L=Kremenchug/O=Home_server/CN=Home_server_CA/emailAddress=tomkat@userv.localhomeTue Dec 04 17:48:26 2012 VERIFY OK: depth=0, /C=UA/ST=PL/L=Kremenchug/O=Home_server/CN=userv/emailAddress=tomkat@userv.localhomeTue Dec 04 17:48:31 2012 TCP/UDP: Closing socketTue Dec 04 17:48:31 2012 SIGTERM[hard,] received, process exiting
Tue Dec 04 22:17:46 2012 Attempting to establish TCP connection with 193.23.23.1:1194Tue Dec 04 22:17:47 2012 TCP: connect to 193.23.23.1:1194 failed, will try again in 5 secondsTue Dec 04 22:17:53 2012 TCP: connect to 193.23.23.1:1194 failed, will try again in 5 secondsTue Dec 04 22:17:59 2012 TCP/UDP: Closing socketTue Dec 04 22:17:59 2012 SIGTERM[hard,init_instance] received, process exiting
$IPT -A INPUT -p tcp -m tcp --dport 1194 -j ACCEPT
покажи ще конфіг сервера
port 1194 # TCP or UDP server? ;proto tcp proto udp dev tap ;dev tun ca ca.crt cert userv.crt key userv.key # This file should be kept secret dh dh1024.pem server 10.8.0.0 255.255.255.0 ifconfig-pool-persist ipp.txt keepalive 10 120 tls-auth ta.key 0 # This file is secret comp-lzo ;max-clients 100 ;user nobody ;group nobody persist-key persist-tun status openvpn-status.log verb 3
Сертифікат сервера в кліента використовуеться?
Підніми рівень журналізаціі до 5-6.
При створенні раджу користуватись скриптиком ../openvpn/easy-rsa/vars
. ./vars./clean-all./build-ca./pkitool user./pkitool --server server./build-dhopenvpn --genkey --secret keys/ta.key
конфіг Код: [Вибрати] port 1194 # TCP or UDP server? ;proto tcp proto udp dev tap ;dev tun ca ca.crt cert userv.crt key userv.key # This file should be kept secret dh dh1024.pem server 10.8.0.0 255.255.255.0 ifconfig-pool-persist ipp.txt keepalive 10 120 tls-auth ta.key 0 # This file is secret comp-lzo ;max-clients 100 ;user nobody ;group nobody persist-key persist-tun status openvpn-status.log verb 3
ЦитатаПідніми рівень журналізаціі до 5-6. це verb 5 ?
але чому ж я не можу на 1194 порт Телнетом зайти відкрито ж ....
нібито потрібно ще:mode servertls-server
юзера та групу теж бажанно вказати
Тому що це на разі UDP порт..
Також радив би відкатку почати в локальній мережі де гарантовано нема фаєрволів..
00:08:54 2012 us=220958 Current Parameter Settings:Wed Dec 05 00:08:54 2012 us=221009 config = 'client.ovpn'Wed Dec 05 00:08:54 2012 us=221024 mode = 0Wed Dec 05 00:08:54 2012 us=221037 show_ciphers = DISABLEDWed Dec 05 00:08:54 2012 us=221049 show_digests = DISABLEDWed Dec 05 00:08:54 2012 us=221061 show_engines = DISABLEDWed Dec 05 00:08:54 2012 us=221073 genkey = DISABLEDWed Dec 05 00:08:54 2012 us=221084 key_pass_file = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221096 show_tls_ciphers = DISABLEDWed Dec 05 00:08:54 2012 us=221107 proto = 0Wed Dec 05 00:08:54 2012 us=221118 local = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221131 remote_list[0] = {'193.23.23.1', 1194}Wed Dec 05 00:08:54 2012 us=221142 remote_random = DISABLEDWed Dec 05 00:08:54 2012 us=221154 local_port = 1194Wed Dec 05 00:08:54 2012 us=221166 remote_port = 1194Wed Dec 05 00:08:54 2012 us=221177 remote_float = DISABLEDWed Dec 05 00:08:54 2012 us=221188 ipchange = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221199 bind_local = DISABLEDWed Dec 05 00:08:54 2012 us=221210 dev = 'tun'Wed Dec 05 00:08:54 2012 us=221231 dev_type = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221251 dev_node = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221282 tun_ipv6 = DISABLEDWed Dec 05 00:08:54 2012 us=221304 ifconfig_local = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221324 ifconfig_remote_netmask = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221343 ifconfig_noexec = DISABLEDWed Dec 05 00:08:54 2012 us=221360 ifconfig_nowarn = DISABLEDWed Dec 05 00:08:54 2012 us=221377 shaper = 0Wed Dec 05 00:08:54 2012 us=221394 tun_mtu = 1500Wed Dec 05 00:08:54 2012 us=221413 tun_mtu_defined = ENABLEDWed Dec 05 00:08:54 2012 us=221430 link_mtu = 1500Wed Dec 05 00:08:54 2012 us=221448 link_mtu_defined = DISABLEDWed Dec 05 00:08:54 2012 us=221466 tun_mtu_extra = 0Wed Dec 05 00:08:54 2012 us=221484 tun_mtu_extra_defined = DISABLEDWed Dec 05 00:08:54 2012 us=221502 fragment = 0Wed Dec 05 00:08:54 2012 us=221518 mtu_discover_type = -1Wed Dec 05 00:08:54 2012 us=221536 mtu_test = 0Wed Dec 05 00:08:54 2012 us=221553 mlock = DISABLEDWed Dec 05 00:08:54 2012 us=221572 keepalive_ping = 0Wed Dec 05 00:08:54 2012 us=221592 keepalive_timeout = 0Wed Dec 05 00:08:54 2012 us=221610 inactivity_timeout = 0Wed Dec 05 00:08:54 2012 us=221629 ping_send_timeout = 0Wed Dec 05 00:08:54 2012 us=221647 ping_rec_timeout = 120Wed Dec 05 00:08:54 2012 us=221666 ping_rec_timeout_action = 2Wed Dec 05 00:08:54 2012 us=221685 ping_timer_remote = DISABLEDWed Dec 05 00:08:54 2012 us=221705 remap_sigusr1 = 0Wed Dec 05 00:08:54 2012 us=221725 explicit_exit_notification = 0Wed Dec 05 00:08:54 2012 us=221742 persist_tun = ENABLEDWed Dec 05 00:08:54 2012 us=221760 persist_local_ip = DISABLEDWed Dec 05 00:08:54 2012 us=221777 persist_remote_ip = DISABLEDWed Dec 05 00:08:54 2012 us=221795 persist_key = ENABLEDWed Dec 05 00:08:54 2012 us=221815 mssfix = 1450Wed Dec 05 00:08:54 2012 us=221836 resolve_retry_seconds = 1000000000Wed Dec 05 00:08:54 2012 us=221857 connect_retry_seconds = 5Wed Dec 05 00:08:54 2012 us=221876 username = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221895 groupname = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221913 chroot_dir = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221933 cd_dir = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221952 writepid = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221970 up_script = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=221982 down_script = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=222000 down_pre = DISABLEDWed Dec 05 00:08:54 2012 us=222014 up_restart = DISABLEDWed Dec 05 00:08:54 2012 us=222025 up_delay = DISABLEDWed Dec 05 00:08:54 2012 us=222037 daemon = DISABLEDWed Dec 05 00:08:54 2012 us=222048 inetd = 0Wed Dec 05 00:08:54 2012 us=222059 log = DISABLEDWed Dec 05 00:08:54 2012 us=222071 suppress_timestamps = DISABLEDWed Dec 05 00:08:54 2012 us=222082 nice = 0Wed Dec 05 00:08:54 2012 us=222093 verbosity = 5Wed Dec 05 00:08:54 2012 us=386430 mute = 0Wed Dec 05 00:08:54 2012 us=386457 gremlin = 0Wed Dec 05 00:08:54 2012 us=386477 status_file = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=386496 status_file_version = 1Wed Dec 05 00:08:54 2012 us=386514 status_file_update_freq = 60Wed Dec 05 00:08:54 2012 us=386532 occ = ENABLEDWed Dec 05 00:08:54 2012 us=386551 rcvbuf = 0Wed Dec 05 00:08:54 2012 us=386568 sndbuf = 0Wed Dec 05 00:08:54 2012 us=386587 socks_proxy_server = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=386613 socks_proxy_port = 0Wed Dec 05 00:08:54 2012 us=398775 socks_proxy_retry = DISABLEDWed Dec 05 00:08:54 2012 us=398811 fast_io = DISABLEDWed Dec 05 00:08:54 2012 us=398834 comp_lzo = ENABLEDWed Dec 05 00:08:54 2012 us=398851 comp_lzo_adaptive = ENABLEDWed Dec 05 00:08:54 2012 us=398868 route_script = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=398885 route_default_gateway = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=398902 route_noexec = DISABLEDWed Dec 05 00:08:54 2012 us=398920 route_delay = 0Wed Dec 05 00:08:54 2012 us=398937 route_delay_window = 30Wed Dec 05 00:08:54 2012 us=398957 route_delay_defined = ENABLEDWed Dec 05 00:08:54 2012 us=398977 management_addr = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=398999 management_port = 0Wed Dec 05 00:08:54 2012 us=399018 management_user_pass = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=399039 management_log_history_cache = 250Wed Dec 05 00:08:54 2012 us=399059 management_echo_buffer_size = 100Wed Dec 05 00:08:54 2012 us=399079 management_query_passwords = DISABLEDWed Dec 05 00:08:54 2012 us=419249 management_hold = DISABLEDWed Dec 05 00:08:54 2012 us=419278 shared_secret_file = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=419300 key_direction = 2Wed Dec 05 00:08:54 2012 us=419318 ciphername_defined = ENABLEDWed Dec 05 00:08:54 2012 us=419358 ciphername = 'BF-CBC'Wed Dec 05 00:08:54 2012 us=419379 authname_defined = ENABLEDWed Dec 05 00:08:54 2012 us=419400 authname = 'SHA1'Wed Dec 05 00:08:54 2012 us=419417 keysize = 0Wed Dec 05 00:08:54 2012 us=419436 engine = DISABLEDWed Dec 05 00:08:54 2012 us=419454 replay = ENABLEDWed Dec 05 00:08:54 2012 us=419486 mute_replay_warnings = DISABLEDWed Dec 05 00:08:54 2012 us=419507 replay_window = 64Wed Dec 05 00:08:54 2012 us=419695 replay_time = 15Wed Dec 05 00:08:54 2012 us=419740 packet_id_file = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=419761 use_iv = ENABLEDWed Dec 05 00:08:54 2012 us=434700 test_crypto = DISABLEDWed Dec 05 00:08:54 2012 us=434729 tls_server = DISABLEDWed Dec 05 00:08:54 2012 us=434750 tls_client = ENABLEDWed Dec 05 00:08:54 2012 us=434769 key_method = 2Wed Dec 05 00:08:54 2012 us=434788 ca_file = 'ca.crt'Wed Dec 05 00:08:54 2012 us=434813 dh_file = 'dh1024.pem'Wed Dec 05 00:08:54 2012 us=434838 cert_file = 'tomkat.crt'Wed Dec 05 00:08:54 2012 us=434858 priv_key_file = 'tomkat.key'Wed Dec 05 00:08:54 2012 us=434876 pkcs12_file = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=434896 cryptoapi_cert = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=434916 cipher_list = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=434935 tls_verify = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=434953 tls_remote = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=434973 crl_file = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=434991 ns_cert_type = 0Wed Dec 05 00:08:54 2012 us=435010 tls_timeout = 2Wed Dec 05 00:08:54 2012 us=435028 renegotiate_bytes = 0Wed Dec 05 00:08:54 2012 us=449076 renegotiate_packets = 0Wed Dec 05 00:08:54 2012 us=449106 renegotiate_seconds = 3600Wed Dec 05 00:08:54 2012 us=449126 handshake_window = 60Wed Dec 05 00:08:54 2012 us=449145 transition_window = 3600Wed Dec 05 00:08:54 2012 us=449163 single_session = DISABLEDWed Dec 05 00:08:54 2012 us=449192 tls_exit = DISABLEDWed Dec 05 00:08:54 2012 us=449213 tls_auth_file = 'ta.key'Wed Dec 05 00:08:54 2012 us=449249 server_network = 0.0.0.0Wed Dec 05 00:08:54 2012 us=449272 server_netmask = 0.0.0.0Wed Dec 05 00:08:54 2012 us=449295 server_bridge_ip = 0.0.0.0Wed Dec 05 00:08:54 2012 us=449317 server_bridge_netmask = 0.0.0.0Wed Dec 05 00:08:54 2012 us=449339 server_bridge_pool_start = 0.0.0.0Wed Dec 05 00:08:54 2012 us=449361 server_bridge_pool_end = 0.0.0.0Wed Dec 05 00:08:54 2012 us=449382 ifconfig_pool_defined = DISABLEDWed Dec 05 00:08:54 2012 us=449403 ifconfig_pool_start = 0.0.0.0Wed Dec 05 00:08:54 2012 us=465329 ifconfig_pool_end = 0.0.0.0Wed Dec 05 00:08:54 2012 us=465359 ifconfig_pool_netmask = 0.0.0.0Wed Dec 05 00:08:54 2012 us=465381 ifconfig_pool_persist_filename = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=465402 ifconfig_pool_persist_refresh_freq = 600Wed Dec 05 00:08:54 2012 us=465426 ifconfig_pool_linear = DISABLEDWed Dec 05 00:08:54 2012 us=465454 n_bcast_buf = 256Wed Dec 05 00:08:54 2012 us=465474 tcp_queue_limit = 64Wed Dec 05 00:08:54 2012 us=465492 real_hash_size = 256Wed Dec 05 00:08:54 2012 us=465511 virtual_hash_size = 256Wed Dec 05 00:08:54 2012 us=465529 client_connect_script = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=465548 learn_address_script = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=465567 client_disconnect_script = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=465621 client_config_dir = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=465640 ccd_exclusive = DISABLEDWed Dec 05 00:08:54 2012 us=465678 tmp_dir = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=480287 push_ifconfig_defined = DISABLEDWed Dec 05 00:08:54 2012 us=480320 push_ifconfig_local = 0.0.0.0Wed Dec 05 00:08:54 2012 us=480344 push_ifconfig_remote_netmask = 0.0.0.0Wed Dec 05 00:08:54 2012 us=480365 enable_c2c = DISABLEDWed Dec 05 00:08:54 2012 us=480383 duplicate_cn = DISABLEDWed Dec 05 00:08:54 2012 us=480413 cf_max = 0Wed Dec 05 00:08:54 2012 us=480434 cf_per = 0Wed Dec 05 00:08:54 2012 us=480453 max_clients = 1024Wed Dec 05 00:08:54 2012 us=480473 max_routes_per_client = 256Wed Dec 05 00:08:54 2012 us=480493 client_cert_not_required = DISABLEDWed Dec 05 00:08:54 2012 us=480513 username_as_common_name = DISABLEDWed Dec 05 00:08:54 2012 us=480533 auth_user_pass_verify_script = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=480554 auth_user_pass_verify_script_via_file = DISABLEDWed Dec 05 00:08:54 2012 us=480573 client = ENABLEDWed Dec 05 00:08:54 2012 us=480592 pull = ENABLEDWed Dec 05 00:08:54 2012 us=480611 auth_user_pass_file = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=493122 show_net_up = DISABLEDWed Dec 05 00:08:54 2012 us=493151 route_method = 0Wed Dec 05 00:08:54 2012 us=493172 ip_win32_defined = DISABLEDWed Dec 05 00:08:54 2012 us=493189 ip_win32_type = 3Wed Dec 05 00:08:54 2012 us=493208 dhcp_masq_offset = 0Wed Dec 05 00:08:54 2012 us=493227 dhcp_lease_time = 31536000Wed Dec 05 00:08:54 2012 us=493261 tap_sleep = 0Wed Dec 05 00:08:54 2012 us=493281 dhcp_options = DISABLEDWed Dec 05 00:08:54 2012 us=493300 dhcp_renew = DISABLEDWed Dec 05 00:08:54 2012 us=493319 dhcp_pre_release = DISABLEDWed Dec 05 00:08:54 2012 us=493337 dhcp_release = DISABLEDWed Dec 05 00:08:54 2012 us=493355 domain = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=493374 netbios_scope = '[UNDEF]'Wed Dec 05 00:08:54 2012 us=493393 netbios_node_type = 0Wed Dec 05 00:08:54 2012 us=493412 disable_nbt = DISABLEDWed Dec 05 00:08:54 2012 us=493441 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct 1 2006Wed Dec 05 00:08:54 2012 us=505659 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port.Wed Dec 05 00:08:54 2012 us=505691 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.Wed Dec 05 00:08:54 2012 us=510413 Control Channel Authentication: using 'ta.key' as a OpenVPN static key fileWed Dec 05 00:08:54 2012 us=510466 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationWed Dec 05 00:08:54 2012 us=510496 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationWed Dec 05 00:08:54 2012 us=510539 LZO compression initializedWed Dec 05 00:08:54 2012 us=510723 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]Wed Dec 05 00:08:54 2012 us=521853 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]Wed Dec 05 00:08:54 2012 us=521938 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'Wed Dec 05 00:08:54 2012 us=521963 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'Wed Dec 05 00:08:54 2012 us=522022 Local Options hash (VER=V4): '504e774e'Wed Dec 05 00:08:54 2012 us=522065 Expected Remote Options hash (VER=V4): '14168603'Wed Dec 05 00:08:54 2012 us=522124 Socket Buffers: R=[8192->8192] S=[8192->8192]Wed Dec 05 00:08:54 2012 us=522158 UDPv4 link local: [undef]Wed Dec 05 00:08:54 2012 us=522186 UDPv4 link remote: 193.23.23.1:1194Wed Dec 05 00:08:54 2012 us=528063 TLS: Initial packet from 193.23.23.1:1194, sid=8511c0b3 ca547c0aWed Dec 05 00:08:54 2012 us=637193 VERIFY OK: depth=1, /C=UA/ST=PL/L=Kremenchug/O=Home_server/CN=Home_server_CA/emailAddress=tomkat@userv.localhomeWed Dec 05 00:08:54 2012 us=638115 VERIFY OK: depth=0, /C=UA/ST=PL/L=Kremenchug/O=Home_server/CN=userv/emailAddress=tomkat@userv.localhomeWed Dec 05 00:09:55 2012 us=179856 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)Wed Dec 05 00:09:55 2012 us=179899 TLS Error: TLS handshake failedWed Dec 05 00:09:55 2012 us=180241 TCP/UDP: Closing socketWed Dec 05 00:09:55 2012 us=180344 SIGUSR1[soft,tls-error] received, process restartingWed Dec 05 00:09:55 2012 us=180367 Restart pause, 2 second(s)Wed Dec 05 00:09:57 2012 us=179782 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port.Wed Dec 05 00:09:57 2012 us=179819 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.Wed Dec 05 00:09:57 2012 us=179856 Re-using SSL/TLS contextWed Dec 05 00:09:57 2012 us=179913 LZO compression initializedWed Dec 05 00:09:57 2012 us=180016 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]Wed Dec 05 00:09:57 2012 us=180143 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]Wed Dec 05 00:09:57 2012 us=180198 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'Wed Dec 05 00:09:57 2012 us=180222 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'Wed Dec 05 00:09:57 2012 us=180260 Local Options hash (VER=V4): '504e774e'Wed Dec 05 00:09:57 2012 us=180291 Expected Remote Options hash (VER=V4): '14168603'Wed Dec 05 00:09:57 2012 us=180337 Socket Buffers: R=[8192->8192] S=[8192->8192]Wed Dec 05 00:09:57 2012 us=180363 UDPv4 link local: [undef]Wed Dec 05 00:09:57 2012 us=180384 UDPv4 link remote: 193.23.23.1:1194Wed Dec 05 00:09:57 2012 us=185291 TLS: Initial packet from 193.23.23.1:1194, sid=13d56c23 bfc2ce04Wed Dec 05 00:09:57 2012 us=294457 VERIFY OK: depth=1, /C=UA/ST=PL/L=Kremenchug/O=Home_server/CN=Home_server_CA/emailAddress=tomkat@userv.localhomeWed Dec 05 00:09:57 2012 us=295353 VERIFY OK: depth=0, /C=UA/ST=PL/L=Kremenchug/O=Home_server/CN=userv/emailAddress=tomkat@userv.localhomeWed Dec 05 00:10:03 2012 us=358969 TCP/UDP: Closing socketWed Dec 05 00:10:03 2012 us=359161 SIGTERM[hard,] received, process exiting
## VPN server with CA for internet sharing and managementport 1194proto udpdev tun# we're mostly doing forwarding over pppoe, where packet size# is 1492 - maybe this is useful... maybe not.#tun-mtu 1492ca /etc/openvpn/ca.crtcert /etc/openvpn/server.crtkey /etc/openvpn/server.keydh /etc/openvpn/dh1024.pemserver 192.168.3.0 255.255.255.0client-config-dir /etc/openvpn/ccd#ifconfig-pool-persist /var/run/openvpn/ipp.txt## does not work due to absence of previous default gateway on client :/#push "redirect-gateway local def1"push "route 0.0.0.0 0.0.0.0"client-to-clientkeepalive 10 120tls-auth /etc/openvpn/ta.key 0cipher DES-EDE3-CBCuser openvpngroup openvpnpersist-keypersist-tunstatus /var/run/openvpn/openvpn.server.statusverb 3#mute 20## The End
# Client connection with CAclientdev tun0proto udpremote 192.168.1.34 1194user openvpngroup openvpnpersist-keypersist-tunmute-replay-warningsca /etc/openvpn/ca.crtcert /etc/openvpn/tsubasa.crtkey /etc/openvpn/tsubasa.key#ns-cert-type servertls-auth /etc/openvpn/ta.key 1cipher DES-EDE3-CBCstatus /var/run/openvpn/openvpn.isbear.statusverb 3mute 20# The End