Posted: Sun Feb 12, 2017 18:13 Post subject: VPN Connection but no internet - solved
Hi,
This is my first post here but I've been browsing these forums for a while and I've found some great information here, so thanks and congratulations on such a great resource.
I've been trying to configure OpenVPN on my DD-WRT router with limited success. After following various guides and troubleshooting some initial connection errors, I can now establish a connection to the VPN server.
However I can not get an internet connection over the VPN. After a lot of trial and error I've reached the point where I really need some help from someone more knowledgeable.
I hope that there is enough info here for someone to give me a push in the right direction. Please let me know if you need any further info.
Thanks for your assistance.
Quote:
Router: Netgear R7800
Firmware: DD-WRT v3.0-r30925M kongat
Client: Windows 10 (ver:10.0.14393) - Connecting from an external public LAN
OpenVPN GUI: v11.4.0.0 (Set to run as administrator)
Router IP Address: 192.168.1.1
OpenVPN TUN IP: 10.8.0.0
DD-WRT SPI Firewall - ENABLED Windows Firewall - DISABLED
Client Config - Laptop1.ovpn
Quote:
client
dev tun
proto tcp
remote vpn.xxxxxxxxxx.com 1194
nobind
persist-key
persist-tun
verb 4
float
ca ca.crt
cert laptop1.crt
key laptop1.key
comp-lzo yes
tun-mtu 1400
auth SHA1
cipher AES-256-CBC
Server Config (Via DD-WRT GUI)
(See attached image)
Client IP Config - Not Connected to VPN
Quote:
Windows IP Configuration
Host Name . . . . . . . . . . . . : LAPTOP-V3LHEOE1
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : home
Sun Feb 12 16:06:33 2017 us=778316 Current Parameter Settings:
Sun Feb 12 16:06:33 2017 us=778316 config = 'laptop1.ovpn'
Sun Feb 12 16:06:33 2017 us=778316 mode = 0
Sun Feb 12 16:06:33 2017 us=778316 show_ciphers = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 show_digests = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 show_engines = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 genkey = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 key_pass_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 show_tls_ciphers = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 connect_retry_max = 0
Sun Feb 12 16:06:33 2017 us=778316 Connection profiles [0]:
Sun Feb 12 16:06:33 2017 us=778316 proto = tcp-client
Sun Feb 12 16:06:33 2017 us=778316 local = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 local_port = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 remote = 'vpn.xxxxxxxxxxx.com'
Sun Feb 12 16:06:33 2017 us=778316 remote_port = '1194'
Sun Feb 12 16:06:33 2017 us=778316 remote_float = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 bind_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 bind_local = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 bind_ipv6_only = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 connect_retry_seconds = 5
Sun Feb 12 16:06:33 2017 us=778316 connect_timeout = 120
Sun Feb 12 16:06:33 2017 us=778316 socks_proxy_server = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 socks_proxy_port = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 tun_mtu = 1400
Sun Feb 12 16:06:33 2017 us=778316 tun_mtu_defined = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 link_mtu = 1500
Sun Feb 12 16:06:33 2017 us=778316 link_mtu_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tun_mtu_extra = 0
Sun Feb 12 16:06:33 2017 us=778316 tun_mtu_extra_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 mtu_discover_type = -1
Sun Feb 12 16:06:33 2017 us=778316 fragment = 0
Sun Feb 12 16:06:33 2017 us=778316 mssfix = 1450
Sun Feb 12 16:06:33 2017 us=778316 explicit_exit_notification = 0
Sun Feb 12 16:06:33 2017 us=778316 Connection profiles END
Sun Feb 12 16:06:33 2017 us=778316 remote_random = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ipchange = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 dev = 'tun'
Sun Feb 12 16:06:33 2017 us=778316 dev_type = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 dev_node = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 lladdr = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 topology = 1
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_local = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_remote_netmask = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_noexec = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_nowarn = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_local = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_netbits = 0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_remote = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 shaper = 0
Sun Feb 12 16:06:33 2017 us=778316 mtu_test = 0
Sun Feb 12 16:06:33 2017 us=778316 mlock = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 keepalive_ping = 0
Sun Feb 12 16:06:33 2017 us=778316 keepalive_timeout = 0
Sun Feb 12 16:06:33 2017 us=778316 inactivity_timeout = 0
Sun Feb 12 16:06:33 2017 us=778316 ping_send_timeout = 0
Sun Feb 12 16:06:33 2017 us=778316 ping_rec_timeout = 0
Sun Feb 12 16:06:33 2017 us=778316 ping_rec_timeout_action = 0
Sun Feb 12 16:06:33 2017 us=778316 ping_timer_remote = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 remap_sigusr1 = 0
Sun Feb 12 16:06:33 2017 us=778316 persist_tun = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 persist_local_ip = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 persist_remote_ip = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 persist_key = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 passtos = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 resolve_retry_seconds = 1000000000
Sun Feb 12 16:06:33 2017 us=778316 resolve_in_advance = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 username = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 groupname = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 chroot_dir = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 cd_dir = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 writepid = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 up_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 down_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 down_pre = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 up_restart = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 up_delay = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 daemon = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 inetd = 0
Sun Feb 12 16:06:33 2017 us=778316 log = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 suppress_timestamps = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 machine_readable_output = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 nice = 0
Sun Feb 12 16:06:33 2017 us=778316 verbosity = 4
Sun Feb 12 16:06:33 2017 us=778316 mute = 0
Sun Feb 12 16:06:33 2017 us=778316 gremlin = 0
Sun Feb 12 16:06:33 2017 us=778316 status_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 status_file_version = 1
Sun Feb 12 16:06:33 2017 us=778316 status_file_update_freq = 60
Sun Feb 12 16:06:33 2017 us=778316 occ = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 rcvbuf = 0
Sun Feb 12 16:06:33 2017 us=778316 sndbuf = 0
Sun Feb 12 16:06:33 2017 us=778316 sockflags = 0
Sun Feb 12 16:06:33 2017 us=778316 fast_io = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 comp.alg = 2
Sun Feb 12 16:06:33 2017 us=778316 comp.flags = 0
Sun Feb 12 16:06:33 2017 us=778316 route_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 route_default_gateway = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 route_default_metric = 0
Sun Feb 12 16:06:33 2017 us=778316 route_noexec = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 route_delay = 5
Sun Feb 12 16:06:33 2017 us=778316 route_delay_window = 30
Sun Feb 12 16:06:33 2017 us=778316 route_delay_defined = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 route_nopull = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 route_gateway_via_dhcp = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 allow_pull_fqdn = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 management_addr = '127.0.0.1'
Sun Feb 12 16:06:33 2017 us=778316 management_port = '25340'
Sun Feb 12 16:06:33 2017 us=778316 management_user_pass = 'stdin'
Sun Feb 12 16:06:33 2017 us=778316 management_log_history_cache = 250
Sun Feb 12 16:06:33 2017 us=778316 management_echo_buffer_size = 100
Sun Feb 12 16:06:33 2017 us=778316 management_write_peer_info_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 management_client_user = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 management_client_group = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 management_flags = 6
Sun Feb 12 16:06:33 2017 us=778316 shared_secret_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 key_direction = 0
Sun Feb 12 16:06:33 2017 us=778316 ciphername = 'AES-256-CBC'
Sun Feb 12 16:06:33 2017 us=778316 ncp_enabled = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
Sun Feb 12 16:06:33 2017 us=778316 authname = 'SHA1'
Sun Feb 12 16:06:33 2017 us=778316 prng_hash = 'SHA1'
Sun Feb 12 16:06:33 2017 us=778316 prng_nonce_secret_len = 16
Sun Feb 12 16:06:33 2017 us=778316 keysize = 0
Sun Feb 12 16:06:33 2017 us=778316 engine = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 replay = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 mute_replay_warnings = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 replay_window = 64
Sun Feb 12 16:06:33 2017 us=778316 replay_time = 15
Sun Feb 12 16:06:33 2017 us=778316 packet_id_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 use_iv = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 test_crypto = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tls_server = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tls_client = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 key_method = 2
Sun Feb 12 16:06:33 2017 us=778316 ca_file = 'ca.crt'
Sun Feb 12 16:06:33 2017 us=778316 ca_path = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 dh_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 cert_file = 'laptop1.crt'
Sun Feb 12 16:06:33 2017 us=778316 extra_certs_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 priv_key_file = 'laptop1.key'
Sun Feb 12 16:06:33 2017 us=778316 pkcs12_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 cryptoapi_cert = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 cipher_list = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 tls_verify = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 tls_export_cert = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 verify_x509_type = 0
Sun Feb 12 16:06:33 2017 us=778316 verify_x509_name = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 crl_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ns_cert_type = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_eku = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ssl_flags = 0
Sun Feb 12 16:06:33 2017 us=778316 tls_timeout = 2
Sun Feb 12 16:06:33 2017 us=778316 renegotiate_bytes = -1
Sun Feb 12 16:06:33 2017 us=778316 renegotiate_packets = 0
Sun Feb 12 16:06:33 2017 us=778316 renegotiate_seconds = 3600
Sun Feb 12 16:06:33 2017 us=778316 handshake_window = 60
Sun Feb 12 16:06:33 2017 us=778316 transition_window = 3600
Sun Feb 12 16:06:33 2017 us=778316 single_session = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 push_peer_info = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tls_exit = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tls_auth_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 tls_crypt_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_pin_cache_period = -1
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_id = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_id_management = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 server_network = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_netmask = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_network_ipv6 = ::
Sun Feb 12 16:06:33 2017 us=778316 server_netbits_ipv6 = 0
Sun Feb 12 16:06:33 2017 us=778316 server_bridge_ip = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_bridge_netmask = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_bridge_pool_start = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_bridge_pool_end = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_start = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_end = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_netmask = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_persist_filename = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_persist_refresh_freq = 600
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_pool_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_pool_base = ::
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_pool_netbits = 0
Sun Feb 12 16:06:33 2017 us=778316 n_bcast_buf = 256
Sun Feb 12 16:06:33 2017 us=778316 tcp_queue_limit = 64
Sun Feb 12 16:06:33 2017 us=778316 real_hash_size = 256
Sun Feb 12 16:06:33 2017 us=778316 virtual_hash_size = 256
Sun Feb 12 16:06:33 2017 us=778316 client_connect_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 learn_address_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 client_disconnect_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 client_config_dir = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ccd_exclusive = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tmp_dir = 'C:\Users\xxxxxx&~1\AppData\Local\Temp\'
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_local = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_remote_netmask = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_ipv6_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_ipv6_local = ::/0
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_ipv6_remote = ::
Sun Feb 12 16:06:33 2017 us=778316 enable_c2c = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 duplicate_cn = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 cf_max = 0
Sun Feb 12 16:06:33 2017 us=778316 cf_per = 0
Sun Feb 12 16:06:33 2017 us=778316 max_clients = 1024
Sun Feb 12 16:06:33 2017 us=778316 max_routes_per_client = 256
Sun Feb 12 16:06:33 2017 us=778316 auth_user_pass_verify_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 auth_user_pass_verify_script_via_file = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 auth_token_generate = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 auth_token_lifetime = 0
Sun Feb 12 16:06:33 2017 us=778316 client = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 pull = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 auth_user_pass_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 show_net_up = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 route_method = 0
Sun Feb 12 16:06:33 2017 us=778316 block_outside_dns = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ip_win32_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ip_win32_type = 3
Sun Feb 12 16:06:33 2017 us=778316 dhcp_masq_offset = 0
Sun Feb 12 16:06:33 2017 us=778316 dhcp_lease_time = 31536000
Sun Feb 12 16:06:33 2017 us=778316 tap_sleep = 0
Sun Feb 12 16:06:33 2017 us=778316 dhcp_options = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 dhcp_renew = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 dhcp_pre_release = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 dhcp_release = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 domain = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 netbios_scope = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 netbios_node_type = 0
Sun Feb 12 16:06:33 2017 us=778316 disable_nbt = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
Sun Feb 12 16:06:33 2017 us=778316 Windows version 6.2 (Windows 8 or greater) 64bit
Sun Feb 12 16:06:33 2017 us=778316 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
Enter Management Password:
Sun Feb 12 16:06:33 2017 us=778316 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sun Feb 12 16:06:33 2017 us=778316 Need hold release from management interface, waiting...
Sun Feb 12 16:06:34 2017 us=231690 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sun Feb 12 16:06:34 2017 us=341072 MANAGEMENT: CMD 'state on'
Sun Feb 12 16:06:34 2017 us=341072 MANAGEMENT: CMD 'log all on'
Sun Feb 12 16:06:34 2017 us=669005 MANAGEMENT: CMD 'hold off'
Sun Feb 12 16:06:34 2017 us=669005 MANAGEMENT: CMD 'hold release'
Sun Feb 12 16:06:34 2017 us=669005 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sun Feb 12 16:06:34 2017 us=903392 LZO compression initializing
Sun Feb 12 16:06:34 2017 us=903392 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Sun Feb 12 16:06:34 2017 us=903392 Control Channel MTU parms [ L:1524 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Sun Feb 12 16:06:34 2017 us=903392 MANAGEMENT: >STATE:1486915594,RESOLVE,,,,,,
Sun Feb 12 16:06:34 2017 us=981530 Data Channel MTU parms [ L:1524 D:1450 EF:124 EB:390 ET:0 EL:3 ]
Sun Feb 12 16:06:34 2017 us=981530 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1460,tun-mtu 1400,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Feb 12 16:06:34 2017 us=981530 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1460,tun-mtu 1400,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Feb 12 16:06:34 2017 us=981530 TCP/UDP: Preserving recently used remote address: [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Feb 12 16:06:34 2017 us=981530 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Feb 12 16:06:34 2017 us=981530 Attempting to establish TCP connection with [AF_INET]xxx.xxx.xxx.xxx:1194 [nonblock]
Sun Feb 12 16:06:34 2017 us=981530 MANAGEMENT: >STATE:1486915594,TCP_CONNECT,,,,,,
Sun Feb 12 16:06:35 2017 us=981813 TCP connection established with [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Feb 12 16:06:35 2017 us=981813 TCP_CLIENT link local: (not bound)
Sun Feb 12 16:06:35 2017 us=981813 TCP_CLIENT link remote: [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Feb 12 16:06:35 2017 us=981813 MANAGEMENT: >STATE:1486915595,WAIT,,,,,,
Sun Feb 12 16:06:36 2017 us=44319 MANAGEMENT: >STATE:1486915596,AUTH,,,,,,
Sun Feb 12 16:06:36 2017 us=44319 TLS: Initial packet from [AF_INET]xxx.xxx.xxx.xxx:1194, sid=e9ea34e9 acb09b66
Sun Feb 12 16:06:36 2017 us=341294 VERIFY OK: depth=1, C=UK, ST=xxxxxxxx, L=xxxx, O=None, OU=None, CN=xxxxxxxxxxx, name=test, emailAddress=xxxxxxxxxxx@hotmail.com
Sun Feb 12 16:06:36 2017 us=356632 VERIFY OK: depth=0, C=UK, ST=xxxxxxxx, L=xxxx, O=OpenVPN, OU=changeme, CN=xxxxxxxxxxx, name=server, emailAddress=xxxxxxxxxxx@hotmail.com
Sun Feb 12 16:06:36 2017 us=700580 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sun Feb 12 16:06:36 2017 us=700580 [xxxxxxxxxxx] Peer Connection Initiated with [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Feb 12 16:06:37 2017 us=825694 MANAGEMENT: >STATE:1486915597,GET_CONFIG,,,,,,
Sun Feb 12 16:06:37 2017 us=825694 SENT CONTROL [xxxxxxxxxxx]: 'PUSH_REQUEST' (status=1)
Sun Feb 12 16:06:37 2017 us=934998 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DNS 8.8.8.8,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,socket-flags TCP_NODELAY,ifconfig 10.8.0.2 255.255.255.0'
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: timers and/or timeouts modified
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: --socket-flags option modified
Sun Feb 12 16:06:37 2017 us=934998 Socket flags: TCP_NODELAY=1 succeeded
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: --ifconfig/up options modified
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: route options modified
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: route-related options modified
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Feb 12 16:06:37 2017 us=934998 Data Channel MTU parms [ L:1460 D:1450 EF:60 EB:390 ET:0 EL:3 ]
Sun Feb 12 16:06:37 2017 us=934998 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Feb 12 16:06:37 2017 us=934998 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 12 16:06:37 2017 us=934998 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Feb 12 16:06:37 2017 us=934998 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 12 16:06:37 2017 us=934998 interactive service msg_channel=0
Sun Feb 12 16:06:37 2017 us=966116 ROUTE_GATEWAY 10.38.232.145/255.255.255.248 I=7 HWADDR=cc:b0:da:63:99:9b
Sun Feb 12 16:06:37 2017 us=997368 open_tun
Sun Feb 12 16:06:37 2017 us=997368 TAP-WIN32 device [Ethernet] opened: \\.\Global\{EF53950D-7C25-4E95-AA6F-E43C199A10D1}.tap
Sun Feb 12 16:06:37 2017 us=997368 TAP-Windows Driver Version 9.21
Sun Feb 12 16:06:37 2017 us=997368 TAP-Windows MTU=1500
Sun Feb 12 16:06:38 2017 us=12990 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Sun Feb 12 16:06:38 2017 us=12990 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {EF53950D-7C25-4E95-AA6F-E43C199A10D1} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Sun Feb 12 16:06:38 2017 us=12990 DHCP option string: 06040808 0808
Sun Feb 12 16:06:38 2017 us=12990 Successful ARP Flush on interface [37] {EF53950D-7C25-4E95-AA6F-E43C199A10D1}
Sun Feb 12 16:06:38 2017 us=12990 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sun Feb 12 16:06:38 2017 us=12990 MANAGEMENT: >STATE:1486915598,ASSIGN_IP,,10.8.0.2,,,,
Sun Feb 12 16:06:43 2017 us=341501 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Sun Feb 12 16:06:43 2017 us=341501 C:\WINDOWS\system32\route.exe ADD xxx.xxx.xxx.xxx MASK 255.255.255.255 10.38.232.145
Sun Feb 12 16:06:43 2017 us=372810 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
Sun Feb 12 16:06:43 2017 us=372810 Route addition via IPAPI succeeded [adaptive]
Sun Feb 12 16:06:43 2017 us=372810 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Sun Feb 12 16:06:43 2017 us=388377 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Sun Feb 12 16:06:43 2017 us=388377 Route addition via IPAPI succeeded [adaptive]
Sun Feb 12 16:06:43 2017 us=388377 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Sun Feb 12 16:06:43 2017 us=404004 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Sun Feb 12 16:06:43 2017 us=404004 Route addition via IPAPI succeeded [adaptive]
Sun Feb 12 16:06:43 2017 us=404004 MANAGEMENT: >STATE:1486915603,ADD_ROUTES,,,,,,
Sun Feb 12 16:06:43 2017 us=404004 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.8.0.1
Sun Feb 12 16:06:43 2017 us=419629 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Sun Feb 12 16:06:43 2017 us=419629 Route addition via IPAPI succeeded [adaptive]
Sun Feb 12 16:06:43 2017 us=419629 Initialization Sequence Completed
Sun Feb 12 16:06:43 2017 us=419629 MANAGEMENT: >STATE:1486915603,CONNECTED,SUCCESS,10.8.0.2,xxx.xxx.xxx.xxx,1194,10.38.232.146,55286
OpenVPN Connection Log - Server Side
Quote:
20170212 16:06:06 I OpenVPN 2.3.13 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Dec 7 2016
20170212 16:06:06 I library versions: OpenSSL 1.0.2h 3 May 2016 LZO 2.09
20170212 16:06:06 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:14
20170212 16:06:06 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170212 16:06:06 W Note: cannot open ipp.txt for READ/WRITE
20170212 16:06:06 Diffie-Hellman initialized with 2048 bit key
20170212 16:06:06 W WARNING: normally if you use --mssfix and/or --fragment you should also set --tun-mtu 1500 (currently it is 1400)
20170212 16:06:06 Socket Buffers: R=[87380->87380] S=[16384->16384]
20170212 16:06:06 I TUN/TAP device tun2 opened
20170212 16:06:06 TUN/TAP TX queue length set to 100
20170212 16:06:06 I do_ifconfig tt->ipv6=1 tt->did_ifconfig_ipv6_setup=0
20170212 16:06:06 I /sbin/ifconfig tun2 10.8.0.1 netmask 255.255.255.0 mtu 1400 broadcast 10.8.0.255
20170212 16:06:06 I Listening for incoming TCP connection on [undef]
20170212 16:06:06 I TCPv4_SERVER link local (bound): [undef]
20170212 16:06:06 I TCPv4_SERVER link remote: [undef]
20170212 16:06:06 MULTI: multi_init called r=256 v=256
20170212 16:06:06 IFCONFIG POOL: base=10.8.0.2 size=252 ipv6=0
20170212 16:06:06 IFCONFIG POOL LIST
20170212 16:06:06 MULTI: TCP INIT maxclients=1024 maxevents=1028
20170212 16:06:06 I Initialization Sequence Completed
20170212 16:06:11 W WARNING: normally if you use --mssfix and/or --fragment you should also set --tun-mtu 1500 (currently it is 1400)
20170212 16:06:11 I TCP connection established with [AF_INET]yyy.yyy.yyy.yyy:5889
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 TLS: Initial packet from [AF_INET]yyy.yyy.yyy.yyy:5889 sid=d6c94a64 9fd635df
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 VERIFY OK: depth=1 C=UK ST=xxxxxxxx L=xxxx O=None OU=None CN=xxxxxxxxxx name=test emailAddress=xxxxxxxxxx@hotmail.com
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 VERIFY OK: depth=0 C=UK ST=xxxxxxxx L=xxxx O=OpenVPN OU=changeme CN=xxxxxxxxxx name=laptop1 emailAddress=xxxxxxxxxx@hotmail.com
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 NOTE: --mute triggered...
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 5 variation(s) on previous 3 message(s) suppressed by --mute
20170212 16:06:12 I yyy.yyy.yyy.yyy:5889 [xxxxxxxxxx] Peer Connection Initiated with [AF_INET]yyy.yyy.yyy.yyy:5889
20170212 16:06:12 I xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 MULTI_sva: pool returned IPv4=10.8.0.2 IPv6=(Not enabled)
20170212 16:06:12 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_c6837646a42729798b4b1695f534d3c8.tmp
20170212 16:06:12 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 MULTI: Learn: 10.8.0.2 -> xxxxxxxxxx/yyy.yyy.yyy.yyy:5889
20170212 16:06:12 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 MULTI: primary virtual IP for xxxxxxxxxx/yyy.yyy.yyy.yyy:5889: 10.8.0.2
20170212 16:06:14 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 PUSH: Received control message: 'PUSH_REQUEST'
20170212 16:06:14 I xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 send_push_reply(): safe_cap=940
20170212 16:06:14 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 SENT CONTROL [xxxxxxxxxx]: 'PUSH_REPLY route 192.168.1.0 255.255.255.0 dhcp-option DNS 8.8.8.8 redirect-gateway def1 bypass-dhcp route-gateway 10.8.0.1 topology subnet ping 10 ping-restart 120 socket-flags TCP_NODELAY ifconfig 10.8.0.2 255.255.255.0' (status=1)
20170212 16:06:37 N xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 Connection reset restarting [-1]
20170212 16:06:37 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 SIGUSR1[soft connection-reset] received client-instance restarting
20170212 16:06:43 W WARNING: normally if you use --mssfix and/or --fragment you should also set --tun-mtu 1500 (currently it is 1400)
20170212 16:06:43 I TCP connection established with [AF_INET]yyy.yyy.yyy.yyy:6018
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 TLS: Initial packet from [AF_INET]yyy.yyy.yyy.yyy:6018 sid=72c0d573 afed5724
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 VERIFY OK: depth=1 C=UK ST=xxxxxxxx L=xxxx O=None OU=None CN=xxxxxxxxxx name=test emailAddress=xxxxxxxxxx@hotmail.com
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 VERIFY OK: depth=0 C=UK ST=xxxxxxxx L=xxxx O=OpenVPN OU=changeme CN=xxxxxxxxxx name=laptop1 emailAddress=xxxxxxxxxx@hotmail.com
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 NOTE: --mute triggered...
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 5 variation(s) on previous 3 message(s) suppressed by --mute
20170212 16:06:44 I yyy.yyy.yyy.yyy:6018 [xxxxxxxxxx] Peer Connection Initiated with [AF_INET]yyy.yyy.yyy.yyy:6018
20170212 16:06:44 I xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 MULTI_sva: pool returned IPv4=10.8.0.2 IPv6=(Not enabled)
20170212 16:06:44 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_e5f723eb6fe323b05f89127beb1d3849.tmp
20170212 16:06:44 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 MULTI: Learn: 10.8.0.2 -> xxxxxxxxxx/yyy.yyy.yyy.yyy:6018
20170212 16:06:44 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 MULTI: primary virtual IP for xxxxxxxxxx/yyy.yyy.yyy.yyy:6018: 10.8.0.2
20170212 16:06:45 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 PUSH: Received control message: 'PUSH_REQUEST'
20170212 16:06:45 I xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 send_push_reply(): safe_cap=940
20170212 16:06:45 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 SENT CONTROL [xxxxxxxxxx]: 'PUSH_REPLY route 192.168.1.0 255.255.255.0 dhcp-option DNS 8.8.8.8 redirect-gateway def1 bypass-dhcp route-gateway 10.8.0.1 topology subnet ping 10 ping-restart 120 socket-flags TCP_NODELAY ifconfig 10.8.0.2 255.255.255.0' (status=1)
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'state'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'state'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'state'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 NOTE: --mute triggered...
20170212 16:22:19 1 variation(s) on previous 3 message(s) suppressed by --mute
20170212 16:22:19 D MANAGEMENT: CMD 'status 2'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'status 2'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'log 500'
19700101 00:00:00
dh /tmp/openvpn/dh.pem ca /tmp/openvpn/ca.crt cert /tmp/openvpn/cert.pem key /tmp/openvpn/key.pem keepalive 10 120 verb 3 mute 3 syslog writepid /var/run/openvpnd.pid management 127.0.0.1 14 management-log-cache 100 topology subnet script-security 2 port 1194 proto tcp-server cipher aes-256-cbc auth sha1 client-connect /tmp/openvpn/clcon.sh client-disconnect /tmp/openvpn/cldiscon.sh client-config-dir /tmp/openvpn/ccd comp-lzo yes tls-server ifconfig-pool-persist /tmp/openvpn/ip-pool 86400 client-to-client tcp-nodelay tun-mtu 1400 mtu-disc yes server 10.8.0.0 255.255.255.0 dev tun2 tun-ipv6 push "route 192.168.1.0 255.255.255.0" push "dhcp-option DNS 8.8.8.8" ifconfig-pool-persist ipp.txt push "redirect-gateway def1 bypass-dhcp"
Pings
When the VPN is connected:
I CAN ping 192.168.1.1 with a response (router)
I CAN ping 10.8.0.1 with a response (vpn server)
Pinging google.com does not return a reply but it DOES resolve the hostname to an IP.
I have now re-enabled the DD-WRT firewall, but the results are the same.
To answer your question, I had deactivated it when I was troubleshooting some initial connection errors. I - perhaps naively - thought that if I left it deactivated I was making things simpler to prove that the connection worked to begin with and then try and re-enable the firewall at a later time when I knew that it had been successfully tested.
Quote:
tracert 192.168.1.1
Tracing route to 192.168.1.1 over a maximum of 30 hops
1 662 ms 151 ms 149 ms 192.168.1.1
Trace complete.
tracert google.com
Tracing route to google.com [216.58.208.174]
over a maximum of 30 hops:
It looks to me like the connection is established ok, and that DNS resolution is working. But the traffic can't get from my VPN server out to the internet.
Do I need to do something to tell the router what to do with traffic between 10.8.0.1 and 192.168.0.1?
Most of the guides seem to suggest the above configuration should be working?
Thanks in advance for any assistance that you can offer.
I've just tested that command but it didn't make any difference
I have also set up another client device to test, but the result is the same on both devices. They can connect to the VPN but there is no internet connection.
Posted: Fri May 04, 2018 16:39 Post subject: No Internet
Hi,
I hope you could help me based on your previous experience.
I'm on build v3.0-r35034
I'm using internet to connect to an OPENVPN server provided and then I want my internet connection trough that server. I do connect with OPENVPN CLIENT on windows PC and every thing is OK but when I put exactly those settings in OPENVPN Client of DD-WRT I get connected but I can not access internet through that VPN connection!
OPENVPN Configuration:
https://www.dd-wrt.com/phpBB2/files/openvpn_config_498.jpg
Connection Establishes:
https://www.dd-wrt.com/phpBB2/files/connection_597.jpg
and here are my "route -n" and "ifconfig tun1":
root@T-Link:/# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 10.13.0.149 128.0.0.0 UG 0 0 0 tun1
0.0.0.0 192.168.0.1 0.0.0.0 UG 0 0 0 eth0
10.13.0.1 10.13.0.149 255.255.255.255 UGH 0 0 0 tun1
10.13.0.149 0.0.0.0 255.255.255.255 UH 0 0 0 tun1
##.##.#.131 (OVPN Server IP) 192.168.0.1 255.255.255.255 UGH 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
128.0.0.0 10.13.0.149 128.0.0.0 UG 0 0 0 tun1
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 br0
192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 br0
There are two things that looks a little bit strange about them:
1-Two lines with same destination (0.0.0.0) but somehow justifiable cuz of different Genmasks
2-10.13.0.165 with mask of 255.255.255.255!!!
Why this open vpn connection works on PC and i have access to internet through that vpn but not when run on DD-WRT?
Many Thanks In Advance...
Last edited by titanium_akt on Sun May 06, 2018 13:50; edited 1 time in total
@titanium_akt, most likely the LZO compression setting is the problem. Notice in the client log that it mentions that the local (client) has a LZO setting, but the remote (server) does NOT. When everything else looks right (and it does, I can see you are connected), and nothing happens across the tunnel (notice the btyes written across the tunnel = 0), it usually means communications isn't possible because the two sides are using different LZO settings. You need to try other LZO options (perhaps NO or Disabled) to get it working.
Dear eibgrad,
Thank you so much for your attention and quick reply.
I did what you said. As you can see, after choosing "Disabled" for LZO that warning vanished but unfortunately problem persists! And even changing MTU to 1532 resolved equivalent warning but didn't help with the main issue...
And sth strange! My PC (that is connected to internet through DD_WRT Router) can open Google site but no other websites and no ping over no other IPs and still google site connection is not through OPENCPN! ("MY IP" search shows my internet IP not OPENVPN servers IP!)
Dont you think there might be sth wrong with routing table or iptable?!
As before, everything in that log looks correct. I can see the VPN gateway IP. I can see the routing table changes being made to change the gateway from the WAN/ISP to the VPN. But as before, there are NO WRITES across the tunnel. Just attempts to read. And that's a classic case of LZO not matching.
Might as well dump the router's routing table to be sure.
Code:
ip route
Btw, are you sure TLS Cipher is required? Few commercial OpenVPN providers use that option.
Thanks again...
I Disabled TLS too, connection to server is still successful but I can not access internet yet...
And here is the ip route:
Code:
root@T-Link:~# ip route
0.0.0.0/1 via 10.13.0.221 dev tun1
default via 192.168.0.1 dev eth0
10.13.0.1 via 10.13.0.221 dev tun1 metric 1
10.13.0.221 dev tun1 scope link src 10.13.0.222
##.##.#.### (MY OVPN Server IP) via 192.168.0.1 dev eth0
127.0.0.0/8 dev lo scope link
128.0.0.0/1 via 10.13.0.221 dev tun1
169.254.0.0/16 dev br0 scope link src 169.254.255.1
192.168.0.0/24 dev eth0 scope link src 192.168.0.2
192.168.1.0/24 dev br0 scope link src 192.168.1.1
Meanwhile this is log of my connection on PC using OPENVPN client for windows that works fine:
Code:
Sun May 06 18:06:14 2018 Note: option http-proxy-fallback ignored because no TCP-based connection profiles are defined
Sun May 06 18:06:14 2018 OpenVPNAS 2.1.1oOAS Win32-MSVC++ [SSL] [LZO2] built on Jul 29 2010
Sun May 06 18:06:14 2018 MANAGEMENT: Connected to management server at 127.0.0.1:33101
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'log on'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'state on'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'echo on'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'bytecount 5'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'hold off'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'hold release'
Sun May 06 18:06:33 2018 MANAGEMENT: CMD 'username "Auth" "###"'
Sun May 06 18:06:33 2018 MANAGEMENT: CMD 'password [...]'
Sun May 06 18:06:33 2018 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sun May 06 18:06:33 2018 NOTE: OpenVPNAS 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Sun May 06 18:06:33 2018 Control Channel MTU parms [ L:1541 D:138 EF:38 EB:0 ET:0 EL:0 ]
Sun May 06 18:06:33 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun May 06 18:06:33 2018 MANAGEMENT: >STATE:1525613793,RESOLVE,,,
Sun May 06 18:06:34 2018 Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Sun May 06 18:06:34 2018 Local Options hash (VER=V4): '3514370b'
Sun May 06 18:06:34 2018 Expected Remote Options hash (VER=V4): '239669a8'
Sun May 06 18:06:34 2018 UDPv4 link local: [undef]
Sun May 06 18:06:34 2018 UDPv4 link remote: ##.##.#.131:2648
Sun May 06 18:06:34 2018 MANAGEMENT: >STATE:1525613794,WAIT,,,
Sun May 06 18:06:34 2018 MANAGEMENT: >STATE:1525613794,AUTH,,,
Sun May 06 18:06:34 2018 TLS: Initial packet from ##.##.#.131:2648, sid=924d0647 223eae17
Sun May 06 18:06:35 2018 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=MyOrganizationalUnit/CN=Fort-Funston_CA/name=EasyRSA/emailAddress=me@myhost.mydomain
Sun May 06 18:06:35 2018 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=MyOrganizationalUnit/CN=server/name=EasyRSA/emailAddress=me@myhost.mydomain
Sun May 06 18:06:36 2018 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1541', remote='link-mtu 1573'
Sun May 06 18:06:36 2018 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1532'
Sun May 06 18:06:36 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun May 06 18:06:36 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun May 06 18:06:36 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun May 06 18:06:36 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun May 06 18:06:36 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sun May 06 18:06:36 2018 [server] Peer Connection Initiated with ##.##.#.131:2648
Sun May 06 18:06:37 2018 MANAGEMENT: >STATE:1525613797,GET_CONFIG,,,
Sun May 06 18:06:38 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun May 06 18:06:38 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 4.2.2.4,route 10.13.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.13.0.46 10.13.0.45'
Sun May 06 18:06:38 2018 OPTIONS IMPORT: timers and/or timeouts modified
Sun May 06 18:06:38 2018 OPTIONS IMPORT: --ifconfig/up options modified
Sun May 06 18:06:38 2018 OPTIONS IMPORT: route options modified
Sun May 06 18:06:38 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun May 06 18:06:38 2018 ROUTE default_gateway=192.168.1.1
Sun May 06 18:06:38 2018 MANAGEMENT: >STATE:1525613798,ASSIGN_IP,,10.13.0.46,
Sun May 06 18:06:38 2018 TAP-WIN32 device [Ethernet 5] opened: \\.\Global\{5EF05570-2630-4106-B130-4EEF6D63101E}.tap
Sun May 06 18:06:38 2018 TAP-Win32 Driver Version 9.7
Sun May 06 18:06:38 2018 TAP-Win32 MTU=1500
Sun May 06 18:06:38 2018 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.13.0.46/255.255.255.252 on interface {5EF05570-2630-4106-B130-4EEF6D63101E} [DHCP-serv: 10.13.0.45, lease-time: 31536000]
Sun May 06 18:06:38 2018 Successful ARP Flush on interface [8] {5EF05570-2630-4106-B130-4EEF6D63101E}
Sun May 06 18:06:43 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Sun May 06 18:06:43 2018 C:\Windows\system32\route.exe ADD ##.##.#.131 MASK 255.255.255.255 192.168.1.1
Sun May 06 18:06:43 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
Sun May 06 18:06:43 2018 Route addition via IPAPI succeeded [adaptive]
Sun May 06 18:06:43 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.13.0.45
Sun May 06 18:06:43 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
Sun May 06 18:06:43 2018 Route addition via IPAPI succeeded [adaptive]
Sun May 06 18:06:43 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.13.0.45
Sun May 06 18:06:43 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
Sun May 06 18:06:43 2018 Route addition via IPAPI succeeded [adaptive]
Sun May 06 18:06:43 2018 MANAGEMENT: >STATE:1525613803,ADD_ROUTES,,,
Sun May 06 18:06:43 2018 C:\Windows\system32\route.exe ADD 10.13.0.1 MASK 255.255.255.255 10.13.0.45 METRIC 1
Sun May 06 18:06:43 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
Sun May 06 18:06:43 2018 Route addition via IPAPI succeeded [adaptive]
Sun May 06 18:06:43 2018 Initialization Sequence Completed
Sun May 06 18:06:43 2018 MANAGEMENT: >STATE:1525613803,CONNECTED,SUCCESS,10.13.0.46,##.##.#.131
Why OPENVPN PC Client works perfectly but DD-WRT deosn't?
Dear eibgrad,
Thanks for your comprehensive reply.
I'll check and try all the points you mentioned one by one.
Meanwhile what is the build number of the stable build of DD-WRT you mentioned earlier?
But still no connection is established between PC and Internet...!
Some additional Info:
My modem is 192.168.0.1
My DD-WRT Router WAN side: 192.168.0.2
My DD-WRT Router LAN side: 192.168.1.1
My PC is: 192.168.1.126
on modem port of my OPENVPN server (2648) is forwarded to Router (192.168.0.2)
And this is full connection log of DD-WRT to OpenVPN (just replaced my server IP with ###.###.###.###):
Code:
State
Client: CONNECTED SUCCESS
Local Address: 10.13.0.74
Remote Address: 10.13.0.73
Log
Clientlog:
20180515 00:22:38 W WARNING: file '/tmp/openvpncl/client.key' is group or others accessible
20180515 00:22:38 W WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
20180515 00:22:38 I OpenVPN 2.4.5 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 7 2018
20180515 00:22:38 I library versions: OpenSSL 1.1.0h 27 Mar 2018 LZO 2.09
20180515 00:22:38 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
20180515 00:22:38 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
20180515 00:22:38 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20180515 00:22:38 W WARNING: normally if you use --mssfix and/or --fragment you should also set --tun-mtu 1500 (currently it is 1532)
20180515 00:22:38 I TCP/UDP: Preserving recently used remote address: [AF_INET]###.###.###.###:2648
20180515 00:22:38 Socket Buffers: R=[180224->180224] S=[180224->180224]
20180515 00:22:38 I UDPv4 link local: (not bound)
20180515 00:22:38 I UDPv4 link remote: [AF_INET]###.###.###.###:2648
20180515 00:22:38 TLS: Initial packet from [AF_INET]###.###.###.###:2648 sid=4c82d367 0cb231f3
20180515 00:22:38 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
20180515 00:22:38 VERIFY OK: depth=1 C=US ST=CA L=SanFrancisco O=Fort-Funston OU=MyOrganizationalUnit CN=Fort-Funston CA name=EasyRSA emailAddress=me@myhost.mydomain
20180515 00:22:38 VERIFY OK: depth=0 C=US ST=CA L=SanFrancisco O=Fort-Funston OU=MyOrganizationalUnit CN=server name=EasyRSA emailAddress=me@myhost.mydomain
20180515 00:22:39 Control Channel: TLSv1.2 cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384 2048 bit RSA
20180515 00:22:39 I [server] Peer Connection Initiated with [AF_INET]###.###.###.###:2648
20180515 00:22:40 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
20180515 00:22:40 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 8.8.8.8 dhcp-option DNS 4.2.2.4 route 10.13.0.1 topology net30 ping 10 ping-restart 120 ifconfig 10.13.0.74 10.13.0.73'
20180515 00:22:40 OPTIONS IMPORT: timers and/or timeouts modified
20180515 00:22:40 NOTE: --mute triggered...
20180515 00:22:40 3 variation(s) on previous 3 message(s) suppressed by --mute
20180515 00:22:40 Outgoing Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
20180515 00:22:40 W WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
20180515 00:22:40 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
20180515 00:22:40 Incoming Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
20180515 00:22:40 W WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
20180515 00:22:40 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
20180515 00:22:40 W WARNING: cipher with small block size in use reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
20180515 00:22:40 I TUN/TAP device tun1 opened
20180515 00:22:40 TUN/TAP TX queue length set to 100
20180515 00:22:40 D do_ifconfig tt->did_ifconfig_ipv6_setup=0
20180515 00:22:40 I /sbin/ifconfig tun1 10.13.0.74 pointopoint 10.13.0.73 mtu 1532
20180515 00:22:40 /sbin/route add -net ###.###.###.### netmask 255.255.255.255 gw 192.168.0.1
20180515 00:22:40 W ERROR: Linux route add command failed: external program exited with error status: 1
20180515 00:22:40 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.13.0.73
20180515 00:22:40 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.13.0.73
20180515 00:22:40 /sbin/route add -net 10.13.0.1 netmask 255.255.255.255 gw 10.13.0.73
20180515 00:22:40 I Initialization Sequence Completed
20180515 00:22:41 N write UDPv4: Message too large (code=90)
20180515 00:22:42 N write UDPv4: Message too large (code=90)
20180515 00:22:42 N write UDPv4: Message too large (code=90)
20180515 00:22:44 NOTE: --mute triggered...
20180515 00:23:01 1 variation(s) on previous 3 message(s) suppressed by --mute
20180515 00:23:01 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:01 D MANAGEMENT: CMD 'state'
20180515 00:23:01 MANAGEMENT: Client disconnected
20180515 00:23:01 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:01 D MANAGEMENT: CMD 'state'
20180515 00:23:01 MANAGEMENT: Client disconnected
20180515 00:23:01 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:01 D MANAGEMENT: CMD 'state'
20180515 00:23:01 MANAGEMENT: Client disconnected
20180515 00:23:02 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:02 D MANAGEMENT: CMD 'status 2'
20180515 00:23:02 MANAGEMENT: Client disconnected
20180515 00:23:02 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:02 D MANAGEMENT: CMD 'log 500'
19700101 03:30:00
There is no need to say how appreciated is any help...
Regards
Joined: 18 Mar 2014 Posts: 12889 Location: Netherlands
Posted: Mon Nov 18, 2019 10:37 Post subject: Re: No internet access after VPN connection
ElDiller wrote:
I have a router with dd-wrt, and the VPN connects perfectly, but I have no connection from the local network. I Checked that from the router is a connection, so I think it is a problem with the ip tables.
Can you help me with this?
Welcome to the forum
Below some pointers which might help to get the best out of DDWRT and out of the forum especially note point 6:
1. Research your router, start with the supported devices wiki:
https://wiki.dd-wrt.com/wiki/index.php/Supported_Devices .
2. In the supported devices wiki you can see if your router is supported and what architecture your router has and if you are lucky also an install guide/wiki.
3. Post in the right forum, from the former step you can see if your router is Broadcom, Qualcomm/Atheros, Marvell or other, use that forum to post router specific questions, for networking questions post in the Advanced Networking forum and for other things in the General Questions forum.
4. When posting always state router model, build number and when applicable the Kernel version.
Describe your problem and how you think it can be solved.
Give as much detail as you can also provide your network setup if applicable.
For your Network setup, state what wiki you have used: https://wiki.dd-wrt.com/wiki/index.php/Linking_Routers
5. When posting pictures make sure the maximum width is not more than 600 pixels.
6. Do not hijack a thread, meaning do not post your own problem in someone else's thread. Just start your own thread.
7. If your post is answered and your problem solved, mark your thread with [SOLVED] (the header of your first post).
8. Do [b]NOT use the router database, builds can be found at:
https://dd-wrt.com/support/other-downloads/?path=betas%2F2019%2F
All builds are beta including those from the router database.
9. Before uploading a new build to your router, research the build by looking in the build threads.
This is an example of a build thread for build 41328 for Broadcom routers:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=321699&highlight=41328
Search build threads with the search function and search on build number.
10. Use the build threads from the former step to report success or problems.
11. For older Broadcom routers (Linksys WRT54 and E series) read the peacock thread although some of it is outdated: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=51486
Builds can be found in the Broadcom directory for Linux kernel 2.4, in Broadcom_K26 for Linux K2.6 and in Broadcom_K3X for Linux K3.X.
12. If you are sure you have discovered a bug, after asking and querying the forum, you can report a real bug in the bug tracker: https://svn.dd-wrt.com/
This is also the place where the commits/changes to the source are administrated.
13. Recommended reading:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=54845 https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=54959
14. If you are happy with DDWRT and want it to live on then donate:
https://dd-wrt.com/donations/ _________________ Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399 Install guide R7800/XR500:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614 Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087