VPN Connection but no internet - solved

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Author Message
Nazbit
DD-WRT Novice


Joined: 11 Feb 2017
Posts: 7

PostPosted: Sun Feb 12, 2017 18:13    Post subject: VPN Connection but no internet - solved Reply with quote
Hi,

This is my first post here but I've been browsing these forums for a while and I've found some great information here, so thanks and congratulations on such a great resource.

I've been trying to configure OpenVPN on my DD-WRT router with limited success. After following various guides and troubleshooting some initial connection errors, I can now establish a connection to the VPN server.

However I can not get an internet connection over the VPN. After a lot of trial and error I've reached the point where I really need some help from someone more knowledgeable.

I hope that there is enough info here for someone to give me a push in the right direction. Please let me know if you need any further info.

Thanks for your assistance. Very Happy

Quote:

Router: Netgear R7800
Firmware: DD-WRT v3.0-r30925M kongat
Client: Windows 10 (ver:10.0.14393) - Connecting from an external public LAN
OpenVPN GUI: v11.4.0.0 (Set to run as administrator)

Router IP Address: 192.168.1.1
OpenVPN TUN IP: 10.8.0.0

DD-WRT SPI Firewall - ENABLED
Windows Firewall - DISABLED


Client Config - Laptop1.ovpn
Quote:

client
dev tun
proto tcp
remote vpn.xxxxxxxxxx.com 1194
nobind
persist-key
persist-tun
verb 4
float
ca ca.crt
cert laptop1.crt
key laptop1.key
comp-lzo yes
tun-mtu 1400
auth SHA1
cipher AES-256-CBC


Server Config (Via DD-WRT GUI)
(See attached image)

Client IP Config - Not Connected to VPN
Quote:

Windows IP Configuration

Host Name . . . . . . . . . . . . : LAPTOP-V3LHEOE1
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : home

Ethernet adapter Ethernet 2:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek PCIe FE Family Controller #2
Physical Address. . . . . . . . . : 98-E7-F4-88-C5-26
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Local Area Connection* 3:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
Physical Address. . . . . . . . . : CE-B0-DA-63-99-9B
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : TAP-Windows Adapter V9
Physical Address. . . . . . . . . : 00-FF-EF-53-95-0D
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter WiFi:

Connection-specific DNS Suffix . : home
Description . . . . . . . . . . . : Realtek RTL8723BE 802.11 bgn Wi-Fi Adapter
Physical Address. . . . . . . . . : CC-B0-DA-63-99-9B
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::dce0:e656:d8c4:8877%7(Preferred)
IPv4 Address. . . . . . . . . . . : 10.38.232.146(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.248
Lease Obtained. . . . . . . . . . : 12 February 2017 15:15:26
Lease Expires . . . . . . . . . . : 12 February 2017 16:01:02
Default Gateway . . . . . . . . . : 10.38.232.145
DHCP Server . . . . . . . . . . . : 10.38.232.145
DHCPv6 IAID . . . . . . . . . . . : 97300698
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1F-4F-53-E9-98-E7-F4-88-C5-26
DNS Servers . . . . . . . . . . . : 192.168.22.22
192.168.22.23
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Bluetooth Network Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
Physical Address. . . . . . . . . : CC-B0-DA-63-99-9C
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.home:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : home
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 12:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes


Client IP Config - Connected to VPN
Quote:

Windows IP Configuration

Host Name . . . . . . . . . . . . : LAPTOP-V3LHEOE1
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : home

Ethernet adapter Ethernet 2:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek PCIe FE Family Controller #2
Physical Address. . . . . . . . . : 98-E7-F4-88-C5-26
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Local Area Connection* 3:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
Physical Address. . . . . . . . . : CE-B0-DA-63-99-9B
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : TAP-Windows Adapter V9
Physical Address. . . . . . . . . : 00-FF-EF-53-95-0D
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::31ac:85a:bd20:b82c%37(Preferred)
IPv4 Address. . . . . . . . . . . : 10.8.0.2(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : 12 February 2017 16:06:38
Lease Expires . . . . . . . . . . : 12 February 2018 16:06:38
Default Gateway . . . . . . . . . :
DHCP Server . . . . . . . . . . . : 10.8.0.254
DHCPv6 IAID . . . . . . . . . . . : 620822511
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1F-4F-53-E9-98-E7-F4-88-C5-26
DNS Servers . . . . . . . . . . . : 8.8.8.8
NetBIOS over Tcpip. . . . . . . . : Enabled

Wireless LAN adapter WiFi:

Connection-specific DNS Suffix . : home
Description . . . . . . . . . . . : Realtek RTL8723BE 802.11 bgn Wi-Fi Adapter
Physical Address. . . . . . . . . : CC-B0-DA-63-99-9B
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::dce0:e656:d8c4:8877%7(Preferred)
IPv4 Address. . . . . . . . . . . : 10.38.232.146(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.248
Lease Obtained. . . . . . . . . . : 12 February 2017 15:49:47
Lease Expires . . . . . . . . . . : 12 February 2017 16:21:50
Default Gateway . . . . . . . . . : 10.38.232.145
DHCP Server . . . . . . . . . . . : 10.38.232.145
DHCPv6 IAID . . . . . . . . . . . : 97300698
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1F-4F-53-E9-98-E7-F4-88-C5-26
DNS Servers . . . . . . . . . . . : 192.168.22.22
192.168.22.23
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Bluetooth Network Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
Physical Address. . . . . . . . . : CC-B0-DA-63-99-9C
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.home:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : home
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 12:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{EF53950D-7C25-4E95-AA6F-E43C199A10D1}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes


OpenVPN Connection Log - Client Side
Quote:

Sun Feb 12 16:06:33 2017 us=778316 Current Parameter Settings:
Sun Feb 12 16:06:33 2017 us=778316 config = 'laptop1.ovpn'
Sun Feb 12 16:06:33 2017 us=778316 mode = 0
Sun Feb 12 16:06:33 2017 us=778316 show_ciphers = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 show_digests = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 show_engines = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 genkey = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 key_pass_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 show_tls_ciphers = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 connect_retry_max = 0
Sun Feb 12 16:06:33 2017 us=778316 Connection profiles [0]:
Sun Feb 12 16:06:33 2017 us=778316 proto = tcp-client
Sun Feb 12 16:06:33 2017 us=778316 local = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 local_port = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 remote = 'vpn.xxxxxxxxxxx.com'
Sun Feb 12 16:06:33 2017 us=778316 remote_port = '1194'
Sun Feb 12 16:06:33 2017 us=778316 remote_float = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 bind_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 bind_local = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 bind_ipv6_only = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 connect_retry_seconds = 5
Sun Feb 12 16:06:33 2017 us=778316 connect_timeout = 120
Sun Feb 12 16:06:33 2017 us=778316 socks_proxy_server = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 socks_proxy_port = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 tun_mtu = 1400
Sun Feb 12 16:06:33 2017 us=778316 tun_mtu_defined = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 link_mtu = 1500
Sun Feb 12 16:06:33 2017 us=778316 link_mtu_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tun_mtu_extra = 0
Sun Feb 12 16:06:33 2017 us=778316 tun_mtu_extra_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 mtu_discover_type = -1
Sun Feb 12 16:06:33 2017 us=778316 fragment = 0
Sun Feb 12 16:06:33 2017 us=778316 mssfix = 1450
Sun Feb 12 16:06:33 2017 us=778316 explicit_exit_notification = 0
Sun Feb 12 16:06:33 2017 us=778316 Connection profiles END
Sun Feb 12 16:06:33 2017 us=778316 remote_random = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ipchange = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 dev = 'tun'
Sun Feb 12 16:06:33 2017 us=778316 dev_type = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 dev_node = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 lladdr = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 topology = 1
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_local = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_remote_netmask = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_noexec = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_nowarn = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_local = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_netbits = 0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_remote = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 shaper = 0
Sun Feb 12 16:06:33 2017 us=778316 mtu_test = 0
Sun Feb 12 16:06:33 2017 us=778316 mlock = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 keepalive_ping = 0
Sun Feb 12 16:06:33 2017 us=778316 keepalive_timeout = 0
Sun Feb 12 16:06:33 2017 us=778316 inactivity_timeout = 0
Sun Feb 12 16:06:33 2017 us=778316 ping_send_timeout = 0
Sun Feb 12 16:06:33 2017 us=778316 ping_rec_timeout = 0
Sun Feb 12 16:06:33 2017 us=778316 ping_rec_timeout_action = 0
Sun Feb 12 16:06:33 2017 us=778316 ping_timer_remote = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 remap_sigusr1 = 0
Sun Feb 12 16:06:33 2017 us=778316 persist_tun = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 persist_local_ip = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 persist_remote_ip = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 persist_key = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 passtos = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 resolve_retry_seconds = 1000000000
Sun Feb 12 16:06:33 2017 us=778316 resolve_in_advance = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 username = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 groupname = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 chroot_dir = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 cd_dir = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 writepid = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 up_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 down_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 down_pre = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 up_restart = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 up_delay = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 daemon = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 inetd = 0
Sun Feb 12 16:06:33 2017 us=778316 log = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 suppress_timestamps = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 machine_readable_output = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 nice = 0
Sun Feb 12 16:06:33 2017 us=778316 verbosity = 4
Sun Feb 12 16:06:33 2017 us=778316 mute = 0
Sun Feb 12 16:06:33 2017 us=778316 gremlin = 0
Sun Feb 12 16:06:33 2017 us=778316 status_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 status_file_version = 1
Sun Feb 12 16:06:33 2017 us=778316 status_file_update_freq = 60
Sun Feb 12 16:06:33 2017 us=778316 occ = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 rcvbuf = 0
Sun Feb 12 16:06:33 2017 us=778316 sndbuf = 0
Sun Feb 12 16:06:33 2017 us=778316 sockflags = 0
Sun Feb 12 16:06:33 2017 us=778316 fast_io = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 comp.alg = 2
Sun Feb 12 16:06:33 2017 us=778316 comp.flags = 0
Sun Feb 12 16:06:33 2017 us=778316 route_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 route_default_gateway = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 route_default_metric = 0
Sun Feb 12 16:06:33 2017 us=778316 route_noexec = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 route_delay = 5
Sun Feb 12 16:06:33 2017 us=778316 route_delay_window = 30
Sun Feb 12 16:06:33 2017 us=778316 route_delay_defined = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 route_nopull = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 route_gateway_via_dhcp = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 allow_pull_fqdn = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 management_addr = '127.0.0.1'
Sun Feb 12 16:06:33 2017 us=778316 management_port = '25340'
Sun Feb 12 16:06:33 2017 us=778316 management_user_pass = 'stdin'
Sun Feb 12 16:06:33 2017 us=778316 management_log_history_cache = 250
Sun Feb 12 16:06:33 2017 us=778316 management_echo_buffer_size = 100
Sun Feb 12 16:06:33 2017 us=778316 management_write_peer_info_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 management_client_user = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 management_client_group = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 management_flags = 6
Sun Feb 12 16:06:33 2017 us=778316 shared_secret_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 key_direction = 0
Sun Feb 12 16:06:33 2017 us=778316 ciphername = 'AES-256-CBC'
Sun Feb 12 16:06:33 2017 us=778316 ncp_enabled = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
Sun Feb 12 16:06:33 2017 us=778316 authname = 'SHA1'
Sun Feb 12 16:06:33 2017 us=778316 prng_hash = 'SHA1'
Sun Feb 12 16:06:33 2017 us=778316 prng_nonce_secret_len = 16
Sun Feb 12 16:06:33 2017 us=778316 keysize = 0
Sun Feb 12 16:06:33 2017 us=778316 engine = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 replay = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 mute_replay_warnings = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 replay_window = 64
Sun Feb 12 16:06:33 2017 us=778316 replay_time = 15
Sun Feb 12 16:06:33 2017 us=778316 packet_id_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 use_iv = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 test_crypto = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tls_server = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tls_client = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 key_method = 2
Sun Feb 12 16:06:33 2017 us=778316 ca_file = 'ca.crt'
Sun Feb 12 16:06:33 2017 us=778316 ca_path = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 dh_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 cert_file = 'laptop1.crt'
Sun Feb 12 16:06:33 2017 us=778316 extra_certs_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 priv_key_file = 'laptop1.key'
Sun Feb 12 16:06:33 2017 us=778316 pkcs12_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 cryptoapi_cert = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 cipher_list = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 tls_verify = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 tls_export_cert = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 verify_x509_type = 0
Sun Feb 12 16:06:33 2017 us=778316 verify_x509_name = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 crl_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ns_cert_type = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_ku[i] = 0
Sun Feb 12 16:06:33 2017 us=778316 remote_cert_eku = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ssl_flags = 0
Sun Feb 12 16:06:33 2017 us=778316 tls_timeout = 2
Sun Feb 12 16:06:33 2017 us=778316 renegotiate_bytes = -1
Sun Feb 12 16:06:33 2017 us=778316 renegotiate_packets = 0
Sun Feb 12 16:06:33 2017 us=778316 renegotiate_seconds = 3600
Sun Feb 12 16:06:33 2017 us=778316 handshake_window = 60
Sun Feb 12 16:06:33 2017 us=778316 transition_window = 3600
Sun Feb 12 16:06:33 2017 us=778316 single_session = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 push_peer_info = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tls_exit = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tls_auth_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 tls_crypt_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_protected_authentication = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_private_mode = 00000000
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_cert_private = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_pin_cache_period = -1
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_id = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 pkcs11_id_management = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 server_network = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_netmask = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_network_ipv6 = ::
Sun Feb 12 16:06:33 2017 us=778316 server_netbits_ipv6 = 0
Sun Feb 12 16:06:33 2017 us=778316 server_bridge_ip = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_bridge_netmask = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_bridge_pool_start = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 server_bridge_pool_end = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_start = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_end = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_netmask = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_persist_filename = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_pool_persist_refresh_freq = 600
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_pool_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_pool_base = ::
Sun Feb 12 16:06:33 2017 us=778316 ifconfig_ipv6_pool_netbits = 0
Sun Feb 12 16:06:33 2017 us=778316 n_bcast_buf = 256
Sun Feb 12 16:06:33 2017 us=778316 tcp_queue_limit = 64
Sun Feb 12 16:06:33 2017 us=778316 real_hash_size = 256
Sun Feb 12 16:06:33 2017 us=778316 virtual_hash_size = 256
Sun Feb 12 16:06:33 2017 us=778316 client_connect_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 learn_address_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 client_disconnect_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 client_config_dir = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 ccd_exclusive = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 tmp_dir = 'C:\Users\xxxxxx&~1\AppData\Local\Temp\'
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_local = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_remote_netmask = 0.0.0.0
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_ipv6_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_ipv6_local = ::/0
Sun Feb 12 16:06:33 2017 us=778316 push_ifconfig_ipv6_remote = ::
Sun Feb 12 16:06:33 2017 us=778316 enable_c2c = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 duplicate_cn = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 cf_max = 0
Sun Feb 12 16:06:33 2017 us=778316 cf_per = 0
Sun Feb 12 16:06:33 2017 us=778316 max_clients = 1024
Sun Feb 12 16:06:33 2017 us=778316 max_routes_per_client = 256
Sun Feb 12 16:06:33 2017 us=778316 auth_user_pass_verify_script = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 auth_user_pass_verify_script_via_file = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 auth_token_generate = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 auth_token_lifetime = 0
Sun Feb 12 16:06:33 2017 us=778316 client = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 pull = ENABLED
Sun Feb 12 16:06:33 2017 us=778316 auth_user_pass_file = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 show_net_up = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 route_method = 0
Sun Feb 12 16:06:33 2017 us=778316 block_outside_dns = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ip_win32_defined = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 ip_win32_type = 3
Sun Feb 12 16:06:33 2017 us=778316 dhcp_masq_offset = 0
Sun Feb 12 16:06:33 2017 us=778316 dhcp_lease_time = 31536000
Sun Feb 12 16:06:33 2017 us=778316 tap_sleep = 0
Sun Feb 12 16:06:33 2017 us=778316 dhcp_options = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 dhcp_renew = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 dhcp_pre_release = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 dhcp_release = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 domain = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 netbios_scope = '[UNDEF]'
Sun Feb 12 16:06:33 2017 us=778316 netbios_node_type = 0
Sun Feb 12 16:06:33 2017 us=778316 disable_nbt = DISABLED
Sun Feb 12 16:06:33 2017 us=778316 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
Sun Feb 12 16:06:33 2017 us=778316 Windows version 6.2 (Windows 8 or greater) 64bit
Sun Feb 12 16:06:33 2017 us=778316 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
Enter Management Password:
Sun Feb 12 16:06:33 2017 us=778316 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sun Feb 12 16:06:33 2017 us=778316 Need hold release from management interface, waiting...
Sun Feb 12 16:06:34 2017 us=231690 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sun Feb 12 16:06:34 2017 us=341072 MANAGEMENT: CMD 'state on'
Sun Feb 12 16:06:34 2017 us=341072 MANAGEMENT: CMD 'log all on'
Sun Feb 12 16:06:34 2017 us=669005 MANAGEMENT: CMD 'hold off'
Sun Feb 12 16:06:34 2017 us=669005 MANAGEMENT: CMD 'hold release'
Sun Feb 12 16:06:34 2017 us=669005 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sun Feb 12 16:06:34 2017 us=903392 LZO compression initializing
Sun Feb 12 16:06:34 2017 us=903392 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Sun Feb 12 16:06:34 2017 us=903392 Control Channel MTU parms [ L:1524 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Sun Feb 12 16:06:34 2017 us=903392 MANAGEMENT: >STATE:1486915594,RESOLVE,,,,,,
Sun Feb 12 16:06:34 2017 us=981530 Data Channel MTU parms [ L:1524 D:1450 EF:124 EB:390 ET:0 EL:3 ]
Sun Feb 12 16:06:34 2017 us=981530 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1460,tun-mtu 1400,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Feb 12 16:06:34 2017 us=981530 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1460,tun-mtu 1400,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Feb 12 16:06:34 2017 us=981530 TCP/UDP: Preserving recently used remote address: [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Feb 12 16:06:34 2017 us=981530 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Feb 12 16:06:34 2017 us=981530 Attempting to establish TCP connection with [AF_INET]xxx.xxx.xxx.xxx:1194 [nonblock]
Sun Feb 12 16:06:34 2017 us=981530 MANAGEMENT: >STATE:1486915594,TCP_CONNECT,,,,,,
Sun Feb 12 16:06:35 2017 us=981813 TCP connection established with [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Feb 12 16:06:35 2017 us=981813 TCP_CLIENT link local: (not bound)
Sun Feb 12 16:06:35 2017 us=981813 TCP_CLIENT link remote: [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Feb 12 16:06:35 2017 us=981813 MANAGEMENT: >STATE:1486915595,WAIT,,,,,,
Sun Feb 12 16:06:36 2017 us=44319 MANAGEMENT: >STATE:1486915596,AUTH,,,,,,
Sun Feb 12 16:06:36 2017 us=44319 TLS: Initial packet from [AF_INET]xxx.xxx.xxx.xxx:1194, sid=e9ea34e9 acb09b66
Sun Feb 12 16:06:36 2017 us=341294 VERIFY OK: depth=1, C=UK, ST=xxxxxxxx, L=xxxx, O=None, OU=None, CN=xxxxxxxxxxx, name=test, emailAddress=xxxxxxxxxxx@hotmail.com
Sun Feb 12 16:06:36 2017 us=356632 VERIFY OK: depth=0, C=UK, ST=xxxxxxxx, L=xxxx, O=OpenVPN, OU=changeme, CN=xxxxxxxxxxx, name=server, emailAddress=xxxxxxxxxxx@hotmail.com
Sun Feb 12 16:06:36 2017 us=700580 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sun Feb 12 16:06:36 2017 us=700580 [xxxxxxxxxxx] Peer Connection Initiated with [AF_INET]xxx.xxx.xxx.xxx:1194
Sun Feb 12 16:06:37 2017 us=825694 MANAGEMENT: >STATE:1486915597,GET_CONFIG,,,,,,
Sun Feb 12 16:06:37 2017 us=825694 SENT CONTROL [xxxxxxxxxxx]: 'PUSH_REQUEST' (status=1)
Sun Feb 12 16:06:37 2017 us=934998 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DNS 8.8.8.8,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,socket-flags TCP_NODELAY,ifconfig 10.8.0.2 255.255.255.0'
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: timers and/or timeouts modified
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: --socket-flags option modified
Sun Feb 12 16:06:37 2017 us=934998 Socket flags: TCP_NODELAY=1 succeeded
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: --ifconfig/up options modified
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: route options modified
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: route-related options modified
Sun Feb 12 16:06:37 2017 us=934998 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Feb 12 16:06:37 2017 us=934998 Data Channel MTU parms [ L:1460 D:1450 EF:60 EB:390 ET:0 EL:3 ]
Sun Feb 12 16:06:37 2017 us=934998 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Feb 12 16:06:37 2017 us=934998 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 12 16:06:37 2017 us=934998 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Feb 12 16:06:37 2017 us=934998 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 12 16:06:37 2017 us=934998 interactive service msg_channel=0
Sun Feb 12 16:06:37 2017 us=966116 ROUTE_GATEWAY 10.38.232.145/255.255.255.248 I=7 HWADDR=cc:b0:da:63:99:9b
Sun Feb 12 16:06:37 2017 us=997368 open_tun
Sun Feb 12 16:06:37 2017 us=997368 TAP-WIN32 device [Ethernet] opened: \\.\Global\{EF53950D-7C25-4E95-AA6F-E43C199A10D1}.tap
Sun Feb 12 16:06:37 2017 us=997368 TAP-Windows Driver Version 9.21
Sun Feb 12 16:06:37 2017 us=997368 TAP-Windows MTU=1500
Sun Feb 12 16:06:38 2017 us=12990 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Sun Feb 12 16:06:38 2017 us=12990 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {EF53950D-7C25-4E95-AA6F-E43C199A10D1} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Sun Feb 12 16:06:38 2017 us=12990 DHCP option string: 06040808 0808
Sun Feb 12 16:06:38 2017 us=12990 Successful ARP Flush on interface [37] {EF53950D-7C25-4E95-AA6F-E43C199A10D1}
Sun Feb 12 16:06:38 2017 us=12990 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sun Feb 12 16:06:38 2017 us=12990 MANAGEMENT: >STATE:1486915598,ASSIGN_IP,,10.8.0.2,,,,
Sun Feb 12 16:06:43 2017 us=341501 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Sun Feb 12 16:06:43 2017 us=341501 C:\WINDOWS\system32\route.exe ADD xxx.xxx.xxx.xxx MASK 255.255.255.255 10.38.232.145
Sun Feb 12 16:06:43 2017 us=372810 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
Sun Feb 12 16:06:43 2017 us=372810 Route addition via IPAPI succeeded [adaptive]
Sun Feb 12 16:06:43 2017 us=372810 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Sun Feb 12 16:06:43 2017 us=388377 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Sun Feb 12 16:06:43 2017 us=388377 Route addition via IPAPI succeeded [adaptive]
Sun Feb 12 16:06:43 2017 us=388377 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Sun Feb 12 16:06:43 2017 us=404004 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Sun Feb 12 16:06:43 2017 us=404004 Route addition via IPAPI succeeded [adaptive]
Sun Feb 12 16:06:43 2017 us=404004 MANAGEMENT: >STATE:1486915603,ADD_ROUTES,,,,,,
Sun Feb 12 16:06:43 2017 us=404004 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.8.0.1
Sun Feb 12 16:06:43 2017 us=419629 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Sun Feb 12 16:06:43 2017 us=419629 Route addition via IPAPI succeeded [adaptive]
Sun Feb 12 16:06:43 2017 us=419629 Initialization Sequence Completed
Sun Feb 12 16:06:43 2017 us=419629 MANAGEMENT: >STATE:1486915603,CONNECTED,SUCCESS,10.8.0.2,xxx.xxx.xxx.xxx,1194,10.38.232.146,55286


OpenVPN Connection Log - Server Side
Quote:

20170212 16:06:06 I OpenVPN 2.3.13 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Dec 7 2016
20170212 16:06:06 I library versions: OpenSSL 1.0.2h 3 May 2016 LZO 2.09
20170212 16:06:06 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:14
20170212 16:06:06 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170212 16:06:06 W Note: cannot open ipp.txt for READ/WRITE
20170212 16:06:06 Diffie-Hellman initialized with 2048 bit key
20170212 16:06:06 W WARNING: normally if you use --mssfix and/or --fragment you should also set --tun-mtu 1500 (currently it is 1400)
20170212 16:06:06 Socket Buffers: R=[87380->87380] S=[16384->16384]
20170212 16:06:06 I TUN/TAP device tun2 opened
20170212 16:06:06 TUN/TAP TX queue length set to 100
20170212 16:06:06 I do_ifconfig tt->ipv6=1 tt->did_ifconfig_ipv6_setup=0
20170212 16:06:06 I /sbin/ifconfig tun2 10.8.0.1 netmask 255.255.255.0 mtu 1400 broadcast 10.8.0.255
20170212 16:06:06 I Listening for incoming TCP connection on [undef]
20170212 16:06:06 I TCPv4_SERVER link local (bound): [undef]
20170212 16:06:06 I TCPv4_SERVER link remote: [undef]
20170212 16:06:06 MULTI: multi_init called r=256 v=256
20170212 16:06:06 IFCONFIG POOL: base=10.8.0.2 size=252 ipv6=0
20170212 16:06:06 IFCONFIG POOL LIST
20170212 16:06:06 MULTI: TCP INIT maxclients=1024 maxevents=1028
20170212 16:06:06 I Initialization Sequence Completed
20170212 16:06:11 W WARNING: normally if you use --mssfix and/or --fragment you should also set --tun-mtu 1500 (currently it is 1400)
20170212 16:06:11 I TCP connection established with [AF_INET]yyy.yyy.yyy.yyy:5889
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 TLS: Initial packet from [AF_INET]yyy.yyy.yyy.yyy:5889 sid=d6c94a64 9fd635df
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 VERIFY OK: depth=1 C=UK ST=xxxxxxxx L=xxxx O=None OU=None CN=xxxxxxxxxx name=test emailAddress=xxxxxxxxxx@hotmail.com
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 VERIFY OK: depth=0 C=UK ST=xxxxxxxx L=xxxx O=OpenVPN OU=changeme CN=xxxxxxxxxx name=laptop1 emailAddress=xxxxxxxxxx@hotmail.com
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 NOTE: --mute triggered...
20170212 16:06:12 yyy.yyy.yyy.yyy:5889 5 variation(s) on previous 3 message(s) suppressed by --mute
20170212 16:06:12 I yyy.yyy.yyy.yyy:5889 [xxxxxxxxxx] Peer Connection Initiated with [AF_INET]yyy.yyy.yyy.yyy:5889
20170212 16:06:12 I xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 MULTI_sva: pool returned IPv4=10.8.0.2 IPv6=(Not enabled)
20170212 16:06:12 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_c6837646a42729798b4b1695f534d3c8.tmp
20170212 16:06:12 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 MULTI: Learn: 10.8.0.2 -> xxxxxxxxxx/yyy.yyy.yyy.yyy:5889
20170212 16:06:12 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 MULTI: primary virtual IP for xxxxxxxxxx/yyy.yyy.yyy.yyy:5889: 10.8.0.2
20170212 16:06:14 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 PUSH: Received control message: 'PUSH_REQUEST'
20170212 16:06:14 I xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 send_push_reply(): safe_cap=940
20170212 16:06:14 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 SENT CONTROL [xxxxxxxxxx]: 'PUSH_REPLY route 192.168.1.0 255.255.255.0 dhcp-option DNS 8.8.8.8 redirect-gateway def1 bypass-dhcp route-gateway 10.8.0.1 topology subnet ping 10 ping-restart 120 socket-flags TCP_NODELAY ifconfig 10.8.0.2 255.255.255.0' (status=1)
20170212 16:06:37 N xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 Connection reset restarting [-1]
20170212 16:06:37 xxxxxxxxxx/yyy.yyy.yyy.yyy:5889 SIGUSR1[soft connection-reset] received client-instance restarting
20170212 16:06:43 W WARNING: normally if you use --mssfix and/or --fragment you should also set --tun-mtu 1500 (currently it is 1400)
20170212 16:06:43 I TCP connection established with [AF_INET]yyy.yyy.yyy.yyy:6018
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 TLS: Initial packet from [AF_INET]yyy.yyy.yyy.yyy:6018 sid=72c0d573 afed5724
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 VERIFY OK: depth=1 C=UK ST=xxxxxxxx L=xxxx O=None OU=None CN=xxxxxxxxxx name=test emailAddress=xxxxxxxxxx@hotmail.com
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 VERIFY OK: depth=0 C=UK ST=xxxxxxxx L=xxxx O=OpenVPN OU=changeme CN=xxxxxxxxxx name=laptop1 emailAddress=xxxxxxxxxx@hotmail.com
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 NOTE: --mute triggered...
20170212 16:06:44 yyy.yyy.yyy.yyy:6018 5 variation(s) on previous 3 message(s) suppressed by --mute
20170212 16:06:44 I yyy.yyy.yyy.yyy:6018 [xxxxxxxxxx] Peer Connection Initiated with [AF_INET]yyy.yyy.yyy.yyy:6018
20170212 16:06:44 I xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 MULTI_sva: pool returned IPv4=10.8.0.2 IPv6=(Not enabled)
20170212 16:06:44 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_e5f723eb6fe323b05f89127beb1d3849.tmp
20170212 16:06:44 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 MULTI: Learn: 10.8.0.2 -> xxxxxxxxxx/yyy.yyy.yyy.yyy:6018
20170212 16:06:44 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 MULTI: primary virtual IP for xxxxxxxxxx/yyy.yyy.yyy.yyy:6018: 10.8.0.2
20170212 16:06:45 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 PUSH: Received control message: 'PUSH_REQUEST'
20170212 16:06:45 I xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 send_push_reply(): safe_cap=940
20170212 16:06:45 xxxxxxxxxx/yyy.yyy.yyy.yyy:6018 SENT CONTROL [xxxxxxxxxx]: 'PUSH_REPLY route 192.168.1.0 255.255.255.0 dhcp-option DNS 8.8.8.8 redirect-gateway def1 bypass-dhcp route-gateway 10.8.0.1 topology subnet ping 10 ping-restart 120 socket-flags TCP_NODELAY ifconfig 10.8.0.2 255.255.255.0' (status=1)
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'state'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'state'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'state'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 NOTE: --mute triggered...
20170212 16:22:19 1 variation(s) on previous 3 message(s) suppressed by --mute
20170212 16:22:19 D MANAGEMENT: CMD 'status 2'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'status 2'
20170212 16:22:19 MANAGEMENT: Client disconnected
20170212 16:22:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:14
20170212 16:22:19 D MANAGEMENT: CMD 'log 500'
19700101 00:00:00
dh /tmp/openvpn/dh.pem ca /tmp/openvpn/ca.crt cert /tmp/openvpn/cert.pem key /tmp/openvpn/key.pem keepalive 10 120 verb 3 mute 3 syslog writepid /var/run/openvpnd.pid management 127.0.0.1 14 management-log-cache 100 topology subnet script-security 2 port 1194 proto tcp-server cipher aes-256-cbc auth sha1 client-connect /tmp/openvpn/clcon.sh client-disconnect /tmp/openvpn/cldiscon.sh client-config-dir /tmp/openvpn/ccd comp-lzo yes tls-server ifconfig-pool-persist /tmp/openvpn/ip-pool 86400 client-to-client tcp-nodelay tun-mtu 1400 mtu-disc yes server 10.8.0.0 255.255.255.0 dev tun2 tun-ipv6 push "route 192.168.1.0 255.255.255.0" push "dhcp-option DNS 8.8.8.8" ifconfig-pool-persist ipp.txt push "redirect-gateway def1 bypass-dhcp"


DD-WRT OpenVPN Status Page
(See attached image)

Router Interfaces
Quote:

BusyBox v1.24.2 (2016-12-07 23:41:43 CET) built-in shell (ash)

root@DD-WRT:~# ifconfig

ath0
Link encap:Ethernet HWaddr 9C:3D:CF:E0:6C:42
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:14650 errors:0 dropped:0 overruns:0 frame:0
TX packets:26976 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:2177360 (2.0 MiB) TX bytes:27816623 (26.5 MiB)

ath1
Link encap:Ethernet HWaddr 9C:3D:CF:E0:6C:43
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:43622 errors:0 dropped:0 overruns:0 frame:0
TX packets:43569 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:7451397 (7.1 MiB) TX bytes:41637560 (39.7 MiB)

br0
Link encap:Ethernet HWaddr 9C:3D:CF:E0:6C:40
inet addr:192.168.1.1 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:57292 errors:0 dropped:556 overruns:0 frame:0
TX packets:65539 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:8770865 (8.3 MiB) TX bytes:67352405 (64.2 MiB)

br0:0
Link encap:Ethernet HWaddr 9C:3D:CF:E0:6C:40
inet addr:169.254.255.1 Bcast:169.254.255.255 Mask:255.255.0.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

eth0
Link encap:Ethernet HWaddr 9C:3D:CF:E0:6C:41
inet addr:151.229.221.160 Bcast:151.229.223.255 Mask:255.255.252.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:44207 errors:0 dropped:0 overruns:0 frame:0
TX packets:36630 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:39498809 (37.6 MiB) TX bytes:7496984 (7.1 MiB)
Interrupt:255

eth1
Link encap:Ethernet HWaddr 9C:3D:CF:E0:6C:40
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:2703 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:359616 (351.1 KiB)
Interrupt:2

lo
Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MULTICAST MTU:65536 Metric:1
RX packets:171 errors:0 dropped:0 overruns:0 frame:0
TX packets:171 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:23800 (23.2 KiB) TX bytes:23800 (23.2 KiB)

tun2
Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:10.8.0.1 P-t-P:10.8.0.1 Mask:255.255.255.0
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1400 Metric:1
RX packets:278 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:16060 (15.6 KiB) TX bytes:0 (0.0 B)

root@DD-WRT:~#


Pings
When the VPN is connected:
I CAN ping 192.168.1.1 with a response (router)
I CAN ping 10.8.0.1 with a response (vpn server)
Pinging google.com does not return a reply but it DOES resolve the hostname to an IP.

IP Tables
Quote:

BusyBox v1.24.2 (2016-12-07 23:41:43 CET) built-in shell (ash)

root@DD-WRT:~# iptables -L INPUT
Chain INPUT (policy ACCEPT)
target prot opt source destination
DROP tcp -- anywhere anywhere tcp dpt:webcache
DROP tcp -- anywhere anywhere tcp dpt:www
DROP tcp -- anywhere anywhere tcp dpt:https
DROP tcp -- anywhere anywhere tcp dpt:69
DROP tcp -- anywhere anywhere tcp dpt:telnet
root@DD-WRT:~# iptables -L OUTPUT
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
root@DD-WRT:~# iptables -L FORWARD
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT 0 -- anywhere anywhere state RELATED,ESTAB LISHED
lan2wan 0 -- anywhere anywhere
ACCEPT 0 -- anywhere anywhere
ACCEPT udp -- anywhere base-address.mcast.net/4
TRIGGER 0 -- anywhere anywhere TRIGGER type:in mat ch:0 relate:0
trigger_out 0 -- anywhere anywhere
ACCEPT 0 -- anywhere anywhere state NEW
root@DD-WRT:~# iptables -L PREROUTING
root@DD-WRT:~# iptables -L POSTROUTING
root@DD-WRT:~#


Last edited by Nazbit on Fri Feb 17, 2017 14:21; edited 2 times in total
Sponsor
Nazbit
DD-WRT Novice


Joined: 11 Feb 2017
Posts: 7

PostPosted: Mon Feb 13, 2017 17:48    Post subject: Reply with quote
Thanks for the reply.

I have now re-enabled the DD-WRT firewall, but the results are the same.

To answer your question, I had deactivated it when I was troubleshooting some initial connection errors. I - perhaps naively - thought that if I left it deactivated I was making things simpler to prove that the connection worked to begin with and then try and re-enable the firewall at a later time when I knew that it had been successfully tested.

Quote:

tracert 192.168.1.1

Tracing route to 192.168.1.1 over a maximum of 30 hops

1 662 ms 151 ms 149 ms 192.168.1.1

Trace complete.

tracert google.com

Tracing route to google.com [216.58.208.174]
over a maximum of 30 hops:

1 385 ms 144 ms 624 ms 10.8.0.1
2 * * * Request timed out.
3 * * * Request timed out.
4 * * * Request timed out.
5 ^C


It looks to me like the connection is established ok, and that DNS resolution is working. But the traffic can't get from my VPN server out to the internet.

Do I need to do something to tell the router what to do with traffic between 10.8.0.1 and 192.168.0.1?

Most of the guides seem to suggest the above configuration should be working?

Thanks in advance for any assistance that you can offer. Sad
Nazbit
DD-WRT Novice


Joined: 11 Feb 2017
Posts: 7

PostPosted: Tue Feb 14, 2017 17:37    Post subject: Reply with quote
I've just tested that command but it didn't make any difference Sad

I have also set up another client device to test, but the result is the same on both devices. They can connect to the VPN but there is no internet connection.
Nazbit
DD-WRT Novice


Joined: 11 Feb 2017
Posts: 7

PostPosted: Fri Feb 17, 2017 14:20    Post subject: Reply with quote
Yes that worked.

Thanks for taking the time to help me. Very Happy
titanium_akt
DD-WRT Novice


Joined: 08 Feb 2017
Posts: 18

PostPosted: Fri May 04, 2018 16:39    Post subject: No Internet Reply with quote
Hi,
I hope you could help me based on your previous experience.
I'm on build v3.0-r35034
I'm using internet to connect to an OPENVPN server provided and then I want my internet connection trough that server. I do connect with OPENVPN CLIENT on windows PC and every thing is OK but when I put exactly those settings in OPENVPN Client of DD-WRT I get connected but I can not access internet through that VPN connection!
OPENVPN Configuration:
https://www.dd-wrt.com/phpBB2/files/openvpn_config_498.jpg
Connection Establishes:
https://www.dd-wrt.com/phpBB2/files/connection_597.jpg

and here are my "route -n" and "ifconfig tun1":

root@T-Link:/# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 10.13.0.149 128.0.0.0 UG 0 0 0 tun1
0.0.0.0 192.168.0.1 0.0.0.0 UG 0 0 0 eth0
10.13.0.1 10.13.0.149 255.255.255.255 UGH 0 0 0 tun1
10.13.0.149 0.0.0.0 255.255.255.255 UH 0 0 0 tun1
##.##.#.131 (OVPN Server IP) 192.168.0.1 255.255.255.255 UGH 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
128.0.0.0 10.13.0.149 128.0.0.0 UG 0 0 0 tun1
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 br0
192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 br0

root@T-Link:~# ifconfig tun1
tun1 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:10.13.0.166 P-t-P:10.13.0.165 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:18 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100

There are two things that looks a little bit strange about them:
1-Two lines with same destination (0.0.0.0) but somehow justifiable cuz of different Genmasks
2-10.13.0.165 with mask of 255.255.255.255!!!

Why this open vpn connection works on PC and i have access to internet through that vpn but not when run on DD-WRT?

Many Thanks In Advance...


Last edited by titanium_akt on Sun May 06, 2018 13:50; edited 1 time in total
titanium_akt
DD-WRT Novice


Joined: 08 Feb 2017
Posts: 18

PostPosted: Sat May 05, 2018 11:42    Post subject: Reply with quote
eibgrad wrote:
@titanium_akt, most likely the LZO compression setting is the problem. Notice in the client log that it mentions that the local (client) has a LZO setting, but the remote (server) does NOT. When everything else looks right (and it does, I can see you are connected), and nothing happens across the tunnel (notice the btyes written across the tunnel = 0), it usually means communications isn't possible because the two sides are using different LZO settings. You need to try other LZO options (perhaps NO or Disabled) to get it working.



Dear eibgrad,
Thank you so much for your attention and quick reply.
I did what you said. As you can see, after choosing "Disabled" for LZO that warning vanished but unfortunately problem persists! And even changing MTU to 1532 resolved equivalent warning but didn't help with the main issue...

And sth strange! My PC (that is connected to internet through DD_WRT Router) can open Google site but no other websites and no ping over no other IPs and still google site connection is not through OPENCPN! ("MY IP" search shows my internet IP not OPENVPN servers IP!)

Dont you think there might be sth wrong with routing table or iptable?!
titanium_akt
DD-WRT Novice


Joined: 08 Feb 2017
Posts: 18

PostPosted: Sun May 06, 2018 6:40    Post subject: Reply with quote
eibgrad wrote:
As before, everything in that log looks correct. I can see the VPN gateway IP. I can see the routing table changes being made to change the gateway from the WAN/ISP to the VPN. But as before, there are NO WRITES across the tunnel. Just attempts to read. And that's a classic case of LZO not matching.

Might as well dump the router's routing table to be sure.

Code:
ip route


Btw, are you sure TLS Cipher is required? Few commercial OpenVPN providers use that option.


Thanks again...
I Disabled TLS too, connection to server is still successful but I can not access internet yet...

And here is the ip route:

Code:
root@T-Link:~# ip route
0.0.0.0/1 via 10.13.0.221 dev tun1
default via 192.168.0.1 dev eth0
10.13.0.1 via 10.13.0.221 dev tun1  metric 1
10.13.0.221 dev tun1 scope link  src 10.13.0.222
##.##.#.### (MY OVPN Server IP) via 192.168.0.1 dev eth0
127.0.0.0/8 dev lo scope link
128.0.0.0/1 via 10.13.0.221 dev tun1
169.254.0.0/16 dev br0 scope link  src 169.254.255.1
192.168.0.0/24 dev eth0 scope link  src 192.168.0.2
192.168.1.0/24 dev br0 scope link  src 192.168.1.1


Meanwhile this is log of my connection on PC using OPENVPN client for windows that works fine:

Code:
Sun May 06 18:06:14 2018 Note: option http-proxy-fallback ignored because no TCP-based connection profiles are defined
Sun May 06 18:06:14 2018 OpenVPNAS 2.1.1oOAS Win32-MSVC++ [SSL] [LZO2] built on Jul 29 2010
Sun May 06 18:06:14 2018 MANAGEMENT: Connected to management server at 127.0.0.1:33101
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'log on'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'state on'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'echo on'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'bytecount 5'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'hold off'
Sun May 06 18:06:14 2018 MANAGEMENT: CMD 'hold release'
Sun May 06 18:06:33 2018 MANAGEMENT: CMD 'username "Auth" "###"'
Sun May 06 18:06:33 2018 MANAGEMENT: CMD 'password [...]'
Sun May 06 18:06:33 2018 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Sun May 06 18:06:33 2018 NOTE: OpenVPNAS 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Sun May 06 18:06:33 2018 Control Channel MTU parms [ L:1541 D:138 EF:38 EB:0 ET:0 EL:0 ]
Sun May 06 18:06:33 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun May 06 18:06:33 2018 MANAGEMENT: >STATE:1525613793,RESOLVE,,,
Sun May 06 18:06:34 2018 Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Sun May 06 18:06:34 2018 Local Options hash (VER=V4): '3514370b'
Sun May 06 18:06:34 2018 Expected Remote Options hash (VER=V4): '239669a8'
Sun May 06 18:06:34 2018 UDPv4 link local: [undef]
Sun May 06 18:06:34 2018 UDPv4 link remote: ##.##.#.131:2648
Sun May 06 18:06:34 2018 MANAGEMENT: >STATE:1525613794,WAIT,,,
Sun May 06 18:06:34 2018 MANAGEMENT: >STATE:1525613794,AUTH,,,
Sun May 06 18:06:34 2018 TLS: Initial packet from ##.##.#.131:2648, sid=924d0647 223eae17
Sun May 06 18:06:35 2018 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=MyOrganizationalUnit/CN=Fort-Funston_CA/name=EasyRSA/emailAddress=me@myhost.mydomain
Sun May 06 18:06:35 2018 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=MyOrganizationalUnit/CN=server/name=EasyRSA/emailAddress=me@myhost.mydomain
Sun May 06 18:06:36 2018 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1541', remote='link-mtu 1573'
Sun May 06 18:06:36 2018 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1532'
Sun May 06 18:06:36 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun May 06 18:06:36 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun May 06 18:06:36 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun May 06 18:06:36 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun May 06 18:06:36 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sun May 06 18:06:36 2018 [server] Peer Connection Initiated with ##.##.#.131:2648
Sun May 06 18:06:37 2018 MANAGEMENT: >STATE:1525613797,GET_CONFIG,,,
Sun May 06 18:06:38 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun May 06 18:06:38 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 4.2.2.4,route 10.13.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.13.0.46 10.13.0.45'
Sun May 06 18:06:38 2018 OPTIONS IMPORT: timers and/or timeouts modified
Sun May 06 18:06:38 2018 OPTIONS IMPORT: --ifconfig/up options modified
Sun May 06 18:06:38 2018 OPTIONS IMPORT: route options modified
Sun May 06 18:06:38 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun May 06 18:06:38 2018 ROUTE default_gateway=192.168.1.1
Sun May 06 18:06:38 2018 MANAGEMENT: >STATE:1525613798,ASSIGN_IP,,10.13.0.46,
Sun May 06 18:06:38 2018 TAP-WIN32 device [Ethernet 5] opened: \\.\Global\{5EF05570-2630-4106-B130-4EEF6D63101E}.tap
Sun May 06 18:06:38 2018 TAP-Win32 Driver Version 9.7
Sun May 06 18:06:38 2018 TAP-Win32 MTU=1500
Sun May 06 18:06:38 2018 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.13.0.46/255.255.255.252 on interface {5EF05570-2630-4106-B130-4EEF6D63101E} [DHCP-serv: 10.13.0.45, lease-time: 31536000]
Sun May 06 18:06:38 2018 Successful ARP Flush on interface [8] {5EF05570-2630-4106-B130-4EEF6D63101E}
Sun May 06 18:06:43 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Sun May 06 18:06:43 2018 C:\Windows\system32\route.exe ADD ##.##.#.131 MASK 255.255.255.255 192.168.1.1
Sun May 06 18:06:43 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
Sun May 06 18:06:43 2018 Route addition via IPAPI succeeded [adaptive]
Sun May 06 18:06:43 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.13.0.45
Sun May 06 18:06:43 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
Sun May 06 18:06:43 2018 Route addition via IPAPI succeeded [adaptive]
Sun May 06 18:06:43 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.13.0.45
Sun May 06 18:06:43 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
Sun May 06 18:06:43 2018 Route addition via IPAPI succeeded [adaptive]
Sun May 06 18:06:43 2018 MANAGEMENT: >STATE:1525613803,ADD_ROUTES,,,
Sun May 06 18:06:43 2018 C:\Windows\system32\route.exe ADD 10.13.0.1 MASK 255.255.255.255 10.13.0.45 METRIC 1
Sun May 06 18:06:43 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
Sun May 06 18:06:43 2018 Route addition via IPAPI succeeded [adaptive]
Sun May 06 18:06:43 2018 Initialization Sequence Completed
Sun May 06 18:06:43 2018 MANAGEMENT: >STATE:1525613803,CONNECTED,SUCCESS,10.13.0.46,##.##.#.131


Why OPENVPN PC Client works perfectly but DD-WRT deosn't?


Your help is really appreciated...
Regards
titanium_akt
DD-WRT Novice


Joined: 08 Feb 2017
Posts: 18

PostPosted: Tue May 08, 2018 6:16    Post subject: HELP Reply with quote
I'm checking this thread almost every hour hoping for a clue...
titanium_akt
DD-WRT Novice


Joined: 08 Feb 2017
Posts: 18

PostPosted: Tue May 08, 2018 21:12    Post subject: Reply with quote
Dear eibgrad,
Thanks for your comprehensive reply.
I'll check and try all the points you mentioned one by one.
Meanwhile what is the build number of the stable build of DD-WRT you mentioned earlier?

Regards
titanium_akt
DD-WRT Novice


Joined: 08 Feb 2017
Posts: 18

PostPosted: Mon May 14, 2018 20:04    Post subject: One Step Forward Reply with quote
I did all the points gathered and now I'm one step forward:
1-I have both READ and WRITE:

Code:

State
Client: CONNECTED SUCCESS
Local Address: 10.13.0.74
Remote Address: 10.13.0.73

Status
VPN Client Stats
TUN/TAP read bytes   36376
TUN/TAP write bytes   12182
TCP/UDP read bytes   18008
TCP/UDP write bytes   44843
Auth read bytes   12182


But still no connection is established between PC and Internet...!
Some additional Info:
My modem is 192.168.0.1
My DD-WRT Router WAN side: 192.168.0.2
My DD-WRT Router LAN side: 192.168.1.1
My PC is: 192.168.1.126

on modem port of my OPENVPN server (2648) is forwarded to Router (192.168.0.2)

And this is full connection log of DD-WRT to OpenVPN (just replaced my server IP with ###.###.###.###):

Code:

State
Client: CONNECTED SUCCESS
Local Address: 10.13.0.74
Remote Address: 10.13.0.73

Status
VPN Client Stats
TUN/TAP read bytes   36376
TUN/TAP write bytes   12182
TCP/UDP read bytes   18008
TCP/UDP write bytes   44843
Auth read bytes   12182

Log
Clientlog:
20180515 00:22:38 W WARNING: file '/tmp/openvpncl/client.key' is group or others accessible
20180515 00:22:38 W WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
20180515 00:22:38 I OpenVPN 2.4.5 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 7 2018
20180515 00:22:38 I library versions: OpenSSL 1.1.0h 27 Mar 2018 LZO 2.09
20180515 00:22:38 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
20180515 00:22:38 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
20180515 00:22:38 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20180515 00:22:38 W WARNING: normally if you use --mssfix and/or --fragment you should also set --tun-mtu 1500 (currently it is 1532)
20180515 00:22:38 I TCP/UDP: Preserving recently used remote address: [AF_INET]###.###.###.###:2648
20180515 00:22:38 Socket Buffers: R=[180224->180224] S=[180224->180224]
20180515 00:22:38 I UDPv4 link local: (not bound)
20180515 00:22:38 I UDPv4 link remote: [AF_INET]###.###.###.###:2648
20180515 00:22:38 TLS: Initial packet from [AF_INET]###.###.###.###:2648 sid=4c82d367 0cb231f3
20180515 00:22:38 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
20180515 00:22:38 VERIFY OK: depth=1 C=US ST=CA L=SanFrancisco O=Fort-Funston OU=MyOrganizationalUnit CN=Fort-Funston CA name=EasyRSA emailAddress=me@myhost.mydomain
20180515 00:22:38 VERIFY OK: depth=0 C=US ST=CA L=SanFrancisco O=Fort-Funston OU=MyOrganizationalUnit CN=server name=EasyRSA emailAddress=me@myhost.mydomain
20180515 00:22:39 Control Channel: TLSv1.2 cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384 2048 bit RSA
20180515 00:22:39 I [server] Peer Connection Initiated with [AF_INET]###.###.###.###:2648
20180515 00:22:40 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
20180515 00:22:40 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 8.8.8.8 dhcp-option DNS 4.2.2.4 route 10.13.0.1 topology net30 ping 10 ping-restart 120 ifconfig 10.13.0.74 10.13.0.73'
20180515 00:22:40 OPTIONS IMPORT: timers and/or timeouts modified
20180515 00:22:40 NOTE: --mute triggered...
20180515 00:22:40 3 variation(s) on previous 3 message(s) suppressed by --mute
20180515 00:22:40 Outgoing Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
20180515 00:22:40 W WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
20180515 00:22:40 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
20180515 00:22:40 Incoming Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
20180515 00:22:40 W WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
20180515 00:22:40 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
20180515 00:22:40 W WARNING: cipher with small block size in use reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
20180515 00:22:40 I TUN/TAP device tun1 opened
20180515 00:22:40 TUN/TAP TX queue length set to 100
20180515 00:22:40 D do_ifconfig tt->did_ifconfig_ipv6_setup=0
20180515 00:22:40 I /sbin/ifconfig tun1 10.13.0.74 pointopoint 10.13.0.73 mtu 1532
20180515 00:22:40 /sbin/route add -net ###.###.###.### netmask 255.255.255.255 gw 192.168.0.1
20180515 00:22:40 W ERROR: Linux route add command failed: external program exited with error status: 1
20180515 00:22:40 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.13.0.73
20180515 00:22:40 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.13.0.73
20180515 00:22:40 /sbin/route add -net 10.13.0.1 netmask 255.255.255.255 gw 10.13.0.73
20180515 00:22:40 I Initialization Sequence Completed
20180515 00:22:41 N write UDPv4: Message too large (code=90)
20180515 00:22:42 N write UDPv4: Message too large (code=90)
20180515 00:22:42 N write UDPv4: Message too large (code=90)
20180515 00:22:44 NOTE: --mute triggered...
20180515 00:23:01 1 variation(s) on previous 3 message(s) suppressed by --mute
20180515 00:23:01 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:01 D MANAGEMENT: CMD 'state'
20180515 00:23:01 MANAGEMENT: Client disconnected
20180515 00:23:01 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:01 D MANAGEMENT: CMD 'state'
20180515 00:23:01 MANAGEMENT: Client disconnected
20180515 00:23:01 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:01 D MANAGEMENT: CMD 'state'
20180515 00:23:01 MANAGEMENT: Client disconnected
20180515 00:23:02 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:02 D MANAGEMENT: CMD 'status 2'
20180515 00:23:02 MANAGEMENT: Client disconnected
20180515 00:23:02 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20180515 00:23:02 D MANAGEMENT: CMD 'log 500'
19700101 03:30:00


There is no need to say how appreciated is any help...
Regards
ElDiller
DD-WRT Novice


Joined: 17 Nov 2019
Posts: 4

PostPosted: Sun Nov 17, 2019 18:37    Post subject: ... Reply with quote
...

Last edited by ElDiller on Mon Nov 18, 2019 12:19; edited 2 times in total
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12889
Location: Netherlands

PostPosted: Mon Nov 18, 2019 10:37    Post subject: Re: No internet access after VPN connection Reply with quote
ElDiller wrote:
I have a router with dd-wrt, and the VPN connects perfectly, but I have no connection from the local network. I Checked that from the router is a connection, so I think it is a problem with the ip tables.
Can you help me with this?


Welcome to the forum Smile

Below some pointers which might help to get the best out of DDWRT and out of the forum especially note point 6:

1. Research your router, start with the supported devices wiki:
https://wiki.dd-wrt.com/wiki/index.php/Supported_Devices .
2. In the supported devices wiki you can see if your router is supported and what architecture your router has and if you are lucky also an install guide/wiki.
3. Post in the right forum, from the former step you can see if your router is Broadcom, Qualcomm/Atheros, Marvell or other, use that forum to post router specific questions, for networking questions post in the Advanced Networking forum and for other things in the General Questions forum.
4. When posting always state router model, build number and when applicable the Kernel version.
Describe your problem and how you think it can be solved.
Give as much detail as you can also provide your network setup if applicable.
For your Network setup, state what wiki you have used: https://wiki.dd-wrt.com/wiki/index.php/Linking_Routers
5. When posting pictures make sure the maximum width is not more than 600 pixels.
6. Do not hijack a thread, meaning do not post your own problem in someone else's thread. Just start your own thread.
7. If your post is answered and your problem solved, mark your thread with [SOLVED] (the header of your first post).
8. Do [b]NOT
use the router database, builds can be found at:
https://dd-wrt.com/support/other-downloads/?path=betas%2F2019%2F
All builds are beta including those from the router database.
9. Before uploading a new build to your router, research the build by looking in the build threads.
This is an example of a build thread for build 41328 for Broadcom routers:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=321699&highlight=41328
Search build threads with the search function and search on build number.
10. Use the build threads from the former step to report success or problems.
11. For older Broadcom routers (Linksys WRT54 and E series) read the peacock thread although some of it is outdated: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=51486
Builds can be found in the Broadcom directory for Linux kernel 2.4, in Broadcom_K26 for Linux K2.6 and in Broadcom_K3X for Linux K3.X.
12. If you are sure you have discovered a bug, after asking and querying the forum, you can report a real bug in the bug tracker: https://svn.dd-wrt.com/
This is also the place where the commits/changes to the source are administrated.
13. Recommended reading:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=54845
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=54959
14. If you are happy with DDWRT and want it to live on then donate:
https://dd-wrt.com/donations/
_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
Display posts from previous:    Page 1 of 1
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum