Quantcast
Channel: Active questions tagged openvpn - Unix & Linux Stack Exchange
Viewing all articles
Browse latest Browse all 827

Internet not working used OpenVPN with route to my subnet

$
0
0

My server: ubuntu 20.04. I use pritunl on my server (non commerce) v1.30.3116.68 1326c6. I create OpenVPN server with route to my subnet, I disable route all traffic in server. My target - create vpn tonnel to my private server and route traffic in my subnet. Other traffic should not send through vpn tonnel.

My server config:

ignore-unknown-option ncp-ciphersport 9026proto tcp6-serverdev tun3server 192.168.222.0 255.255.255.0management /var/run/pritunl_63d787c998cf947ec03bc156.sock unixmanagement-client-authauth-user-pass-optionaltopology subnettls-version-min 1.2max-clients 2000ping 10ping-restart 80persist-tuncipher AES-256-CBCncp-ciphers AES-256-GCM:AES-256-CBCauth SHA256status-version 2script-security 2sndbuf 393216rcvbuf 393216reneg-sec 2592000hash-size 1024 1024txqueuelen 1000verb 4mute 8client-to-clientcomp-lzo nopush "comp-lzo no"push "route 200.151.54.0 255.255.255.0"<ca>-----BEGIN CERTIFICATE----------END CERTIFICATE-----</ca>key-direction 0<tls-auth>## 2048 bit OpenVPN static key#-----BEGIN OpenVPN Static key V1----------END OpenVPN Static key V1-----</tls-auth><cert>-----BEGIN CERTIFICATE----------END CERTIFICATE-----</cert><key>-----BEGIN PRIVATE KEY----------END PRIVATE KEY-----</key><dh>-----BEGIN DH PARAMETERS----------END DH PARAMETERS-----</dh>

My client android:

setenv UV_ID 3a9cd71cb0e040939993b4fc2adc2159setenv UV_NAME ancient-plains-2403clientdev tundev-type tunremote 185.244.6.34 9026 tcp-clientnobindpersist-tuncipher AES-256-CBCauth SHA256verb 2mute 3push-peer-infoping 10ping-restart 60hand-window 70server-poll-timeout 4reneg-sec 2592000sndbuf 393216rcvbuf 393216remote-cert-tls servercomp-lzo nokey-direction 1<ca>-----BEGIN CERTIFICATE----------END CERTIFICATE-----</ca><tls-auth>## 2048 bit OpenVPN static key#-----BEGIN OpenVPN Static key V1----------END OpenVPN Static key V1-----</tls-auth><cert>-----BEGIN CERTIFICATE----------END CERTIFICATE-----</cert><key>-----BEGIN PRIVATE KEY----------END PRIVATE KEY-----</key>

My client windows:

setenv UV_ID b449ddd3f5cc4450a347d3a58b5f3418setenv UV_NAME summer-plateau-3318clientdev tundev-type tunremote 185.244.6.34 9026 tcp-clientnobindpersist-tuncipher AES-256-CBCauth SHA256verb 2mute 3push-peer-infoping 10ping-restart 60hand-window 70server-poll-timeout 4reneg-sec 2592000sndbuf 393216rcvbuf 393216remote-cert-tls servercomp-lzo nokey-direction 1<ca>-----BEGIN CERTIFICATE----------END CERTIFICATE-----</ca><tls-auth>## 2048 bit OpenVPN static key#-----BEGIN OpenVPN Static key V1----------END OpenVPN Static key V1-----</tls-auth><cert>-----BEGIN CERTIFICATE----------END CERTIFICATE-----</cert><key>-----BEGIN PRIVATE KEY----------END PRIVATE KEY-----</key>

My trouble:When I enable vpn on OS Windows, my internet connection not working.Example ping:enter image description here

  1. route to my subnet
  2. google dns
  3. google host

Log server:

[restless-plains-3431] 2023-01-30 14:06:59 us=834327 MULTI: multi_create_instance called[restless-plains-3431] 2023-01-30 14:06:59 us=834390 Re-using SSL/TLS context[restless-plains-3431] 2023-01-30 14:06:59 us=834492 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication[restless-plains-3431] 2023-01-30 14:06:59 us=834508 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication[restless-plains-3431] 2023-01-30 14:06:59 us=834587 Control Channel MTU parms [ L:1624 D:1170 EF:80 EB:0 ET:0 EL:3 ][restless-plains-3431] 2023-01-30 14:06:59 us=834609 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ][restless-plains-3431] 2023-01-30 14:06:59 us=834658 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA256,keysize 256,tls-auth,key-method 2,tls-server'[restless-plains-3431] 2023-01-30 14:06:59 us=834671 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA256,keysize 256,tls-auth,key-method 2,tls-client'[restless-plains-3431] 2023-01-30 14:06:59 us=834712 TCP connection established with [AF_INET6]::ffff:200.151.54.1:62883[restless-plains-3431] 2023-01-30 14:06:59 us=834741 TCPv6_SERVER link local: (not bound)[restless-plains-3431] 2023-01-30 14:06:59 us=834756 TCPv6_SERVER link remote: [AF_INET6]::ffff:200.151.54.1:62883[restless-plains-3431] 2023-01-30 14:06:59 us=834856 200.151.54.1:62883 TLS: Initial packet from [AF_INET6]::ffff:200.151.54.1:62883, sid=74eb504a 9630641e[restless-plains-3431] 2023-01-30 14:06:59 us=864700 200.151.54.1:62883 VERIFY OK: depth=1, O=63d6a660871fd84ef80dafcb, CN=63d6a660871fd84ef80dafd0[restless-plains-3431] 2023-01-30 14:06:59 us=865155 200.151.54.1:62883 VERIFY OK: depth=0, O=63d6a660871fd84ef80dafcb, CN=63d6a660871fd84ef80dafe4[restless-plains-3431] 2023-01-30 14:06:59 us=865744 200.151.54.1:62883 peer info: IV_VER=3.git::d3f8b18b[restless-plains-3431] 2023-01-30 14:06:59 us=865766 200.151.54.1:62883 peer info: IV_PLAT=win[restless-plains-3431] 2023-01-30 14:06:59 Client conf 63d6a660871fd84ef80dafe4:[restless-plains-3431] 2023-01-30 14:06:59 us=865779 200.151.54.1:62883 peer info: IV_NCP=2[restless-plains-3431] 2023-01-30 14:06:59   push "ping 10"[restless-plains-3431] 2023-01-30 14:06:59 us=865791 200.151.54.1:62883 peer info: IV_TCPNL=1[restless-plains-3431] 2023-01-30 14:06:59   push "ping-restart 60"[restless-plains-3431] 2023-01-30 14:06:59 us=865803 200.151.54.1:62883 peer info: IV_PROTO=30[restless-plains-3431] 2023-01-30 14:06:59   push "dhcp-option DNS 8.8.8.8"[restless-plains-3431] 2023-01-30 14:06:59 us=865816 200.151.54.1:62883 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305:AES-256-CBC[restless-plains-3431] 2023-01-30 14:06:59   ifconfig-push 192.168.222.6 255.255.255.0[restless-plains-3431] 2023-01-30 14:06:59 us=865828 200.151.54.1:62883 peer info: IV_LZO_STUB=1[restless-plains-3431] 2023-01-30 14:06:59 us=865840 200.151.54.1:62883 peer info: IV_COMP_STUB=1[restless-plains-3431] 2023-01-30 14:06:59 COM> SUCCESS: client-auth command succeeded[restless-plains-3431] 2023-01-30 14:06:59 us=865852 200.151.54.1:62883 peer info: IV_COMP_STUBv2=1[restless-plains-3431] 2023-01-30 14:06:59 us=865864 200.151.54.1:62883 peer info: IV_AUTO_SESS=1[restless-plains-3431] 2023-01-30 14:06:59 us=865876 200.151.54.1:62883 peer info: UV_ID=a5fff360a7194b1d880913ea02ab3079[restless-plains-3431] 2023-01-30 14:06:59 us=865888 200.151.54.1:62883 peer info: UV_NAME=winter-forest-6214[restless-plains-3431] 2023-01-30 14:06:59 us=865901 200.151.54.1:62883 peer info: UV_ASCLI_VER=3.3.4-2600[restless-plains-3431] 2023-01-30 14:06:59 us=865913 200.151.54.1:62883 peer info: IV_GUI_VER=OCWindows_3.3.4-2600[restless-plains-3431] 2023-01-30 14:06:59 us=865925 200.151.54.1:62883 peer info: IV_SSO=webauth,openurl,crtext[restless-plains-3431] 2023-01-30 14:06:59 us=865936 200.151.54.1:62883 peer info: IV_HWADDR=1c:bf:ce:4b:2e:c8[restless-plains-3431] 2023-01-30 14:06:59 us=865949 200.151.54.1:62883 peer info: IV_SSL=OpenSSL_1.1.1l__24_Aug_2021[restless-plains-3431] 2023-01-30 14:06:59 us=866075 200.151.54.1:62883 TLS: Username/Password authentication deferred for username ''[restless-plains-3431] 2023-01-30 14:06:59 us=883264 MANAGEMENT: CMD 'client-auth 4 0'[restless-plains-3431] 2023-01-30 14:06:59 us=922488 200.151.54.1:62883 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA[restless-plains-3431] 2023-01-30 14:06:59 User connected user_id=63d6a660871fd84ef80dafe4[restless-plains-3431] 2023-01-30 14:06:59 us=922543 200.151.54.1:62883 [63d6a660871fd84ef80dafe4] Peer Connection Initiated with [AF_INET6]::ffff:200.151.54.1:62883[restless-plains-3431] 2023-01-30 14:06:59 us=922576 63d6a660871fd84ef80dafe4/200.151.54.1:62883 MULTI_sva: pool returned IPv4=192.168.222.2, IPv6=(Not enabled)[restless-plains-3431] 2023-01-30 14:06:59 us=922688 63d6a660871fd84ef80dafe4/200.151.54.1:62883 MULTI: Learn: 192.168.222.6 -> 63d6a660871fd84ef80dafe4/200.151.54.1:62883[restless-plains-3431] 2023-01-30 14:06:59 us=922711 63d6a660871fd84ef80dafe4/200.151.54.1:62883 MULTI: primary virtual IP for 63d6a660871fd84ef80dafe4/200.151.54.1:62883: 192.168.222.6[restless-plains-3431] 2023-01-30 14:06:59 us=922743 63d6a660871fd84ef80dafe4/200.151.54.1:62883 Data Channel: using negotiated cipher 'AES-256-GCM'[restless-plains-3431] 2023-01-30 14:06:59 us=922771 63d6a660871fd84ef80dafe4/200.151.54.1:62883 Data Channel MTU parms [ L:1552 D:1450 EF:52 EB:406 ET:0 EL:3 ][restless-plains-3431] 2023-01-30 14:06:59 us=922890 63d6a660871fd84ef80dafe4/200.151.54.1:62883 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key[restless-plains-3431] 2023-01-30 14:06:59 us=922907 63d6a660871fd84ef80dafe4/200.151.54.1:62883 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key[restless-plains-3431] 2023-01-30 14:06:59 us=922958 63d6a660871fd84ef80dafe4/200.151.54.1:62883 SENT CONTROL [63d6a660871fd84ef80dafe4]: 'PUSH_REPLY,comp-lzo no,route 200.151.54.0 255.255.255.0,route-gateway 192.168.222.1,topology subnet,ping 10,ping-restart 60,dhcp-option DNS 8.8.8.8,ifconfig 192.168.222.6 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)[restless-plains-3431] 2023-01-30 14:06:59 us=923119 63d6a660871fd84ef80dafe4/200.151.54.1:62883 PUSH: Received control message: 'PUSH_REQUEST'[restless-plains-3431] 2023-01-30 14:07:00 us=361473 63d6a660871fd84ef80dafe4/200.151.54.1:62883 MULTI: bad source address from client [::], packet dropped

I trying other OS Windows (other PC, other network), but not workingHow fix it?


Viewing all articles
Browse latest Browse all 827

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>