Zojuist met 192.168.2.1 en 192.168.1.1 verbonden vanaf de PC. Dit werkt. Dus, naar mijn inzien, lijkt het dus goed te zitten qua certificaten, keys en instellingen (intern dan)
Als ik dit adres vervolgens weer wijzig naar m'n daadwerkelijke WAN IP, dan zit alles weer vol meldingen...
Hier de output van het log van de client als het goed gaat, vanuit LAN:
Wed Feb 21 14:24:34 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Wed Feb 21 14:24:34 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Feb 21 14:24:34 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Enter Management Password:
Wed Feb 21 14:24:34 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Feb 21 14:24:34 2018 Need hold release from management interface, waiting...
Wed Feb 21 14:24:35 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Feb 21 14:24:35 2018 MANAGEMENT: CMD 'state on'
Wed Feb 21 14:24:35 2018 MANAGEMENT: CMD 'log all on'
Wed Feb 21 14:24:35 2018 MANAGEMENT: CMD 'echo all on'
Wed Feb 21 14:24:35 2018 MANAGEMENT: CMD 'hold off'
Wed Feb 21 14:24:35 2018 MANAGEMENT: CMD 'hold release'
Wed Feb 21 14:24:35 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.2.1:1194
Wed Feb 21 14:24:35 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 21 14:24:35 2018 UDP link local: (not bound)
Wed Feb 21 14:24:35 2018 UDP link remote: [AF_INET]192.168.2.1:1194
Wed Feb 21 14:24:35 2018 MANAGEMENT: >STATE:1519219475,WAIT,,,,,,
Wed Feb 21 14:24:35 2018 MANAGEMENT: >STATE:1519219475,AUTH,,,,,,
Wed Feb 21 14:24:35 2018 TLS: Initial packet from [AF_INET]192.168.2.1:1194, sid=39e64d69 c5c6282f
Wed Feb 21 14:24:35 2018 VERIFY OK: depth=1, C=NL, ST=NB, L=Kollum, O=OpenVPN, OU=vdzaag, CN=changeme, name=vdzaag, emailAddress=mail@host.domain
Wed Feb 21 14:24:35 2018 VERIFY KU OK
Wed Feb 21 14:24:35 2018 Validating certificate extended key usage
Wed Feb 21 14:24:35 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Feb 21 14:24:35 2018 VERIFY EKU OK
Wed Feb 21 14:24:35 2018 VERIFY OK: depth=0, C=NL, ST=NB, L=Kollum, O=OpenVPN, OU=vdzaag, CN=server, name=vdzaag, emailAddress=mail@host.domain
Wed Feb 21 14:24:35 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Wed Feb 21 14:24:35 2018 [server] Peer Connection Initiated with [AF_INET]192.168.2.1:1194
Wed Feb 21 14:24:36 2018 MANAGEMENT: >STATE:1519219476,GET_CONFIG,,,,,,
Wed Feb 21 14:24:36 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Feb 21 14:24:36 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Wed Feb 21 14:24:36 2018 OPTIONS IMPORT: timers and/or timeouts modified
Wed Feb 21 14:24:36 2018 OPTIONS IMPORT: --ifconfig/up options modified
Wed Feb 21 14:24:36 2018 OPTIONS IMPORT: route options modified
Wed Feb 21 14:24:36 2018 OPTIONS IMPORT: route-related options modified
Wed Feb 21 14:24:36 2018 OPTIONS IMPORT: peer-id set
Wed Feb 21 14:24:36 2018 OPTIONS IMPORT: adjusting link_mtu to 1625
Wed Feb 21 14:24:36 2018 OPTIONS IMPORT: data channel crypto options modified
Wed Feb 21 14:24:36 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Feb 21 14:24:36 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Feb 21 14:24:36 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Feb 21 14:24:36 2018 interactive service msg_channel=0
Wed Feb 21 14:24:36 2018 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=7 HWADDR=10:7b:44:95:24:fa
Wed Feb 21 14:24:36 2018 open_tun
Wed Feb 21 14:24:36 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2824BCEC-A700-4BD2-BD20-130B62704E7D}.tap
Wed Feb 21 14:24:36 2018 TAP-Windows Driver Version 9.21
Wed Feb 21 14:24:36 2018 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Wed Feb 21 14:24:36 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {2824BCEC-A700-4BD2-BD20-130B62704E7D} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Wed Feb 21 14:24:36 2018 Successful ARP Flush on interface [36] {2824BCEC-A700-4BD2-BD20-130B62704E7D}
Wed Feb 21 14:24:36 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Wed Feb 21 14:24:36 2018 MANAGEMENT: >STATE:1519219476,ASSIGN_IP,,10.8.0.2,,,,
Wed Feb 21 14:24:41 2018 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Wed Feb 21 14:24:41 2018 C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.1.1
Wed Feb 21 14:24:41 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
Wed Feb 21 14:24:41 2018 Route addition via IPAPI succeeded [adaptive]
Wed Feb 21 14:24:41 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Wed Feb 21 14:24:41 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Wed Feb 21 14:24:41 2018 Route addition via IPAPI succeeded [adaptive]
Wed Feb 21 14:24:41 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Wed Feb 21 14:24:41 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Wed Feb 21 14:24:41 2018 Route addition via IPAPI succeeded [adaptive]
Wed Feb 21 14:24:41 2018 Initialization Sequence Completed
Wed Feb 21 14:24:41 2018 MANAGEMENT: >STATE:1519219481,CONNECTED,SUCCESS,10.8.0.2,192.168.2.1,1194,,
En hier als ik hem via de WAN laat lopen:
Wed Feb 21 14:20:51 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Wed Feb 21 14:20:51 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Feb 21 14:20:51 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Enter Management Password:
Wed Feb 21 14:20:51 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Feb 21 14:20:51 2018 Need hold release from management interface, waiting...
Wed Feb 21 14:20:52 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Feb 21 14:20:52 2018 MANAGEMENT: CMD 'state on'
Wed Feb 21 14:20:52 2018 MANAGEMENT: CMD 'log all on'
Wed Feb 21 14:20:52 2018 MANAGEMENT: CMD 'echo all on'
Wed Feb 21 14:20:52 2018 MANAGEMENT: CMD 'hold off'
Wed Feb 21 14:20:52 2018 MANAGEMENT: CMD 'hold release'
Wed Feb 21 14:20:52 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]XX.XXX.XXX.XX:1194
Wed Feb 21 14:20:52 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 21 14:20:52 2018 UDP link local: (not bound)
Wed Feb 21 14:20:52 2018 UDP link remote: [AF_INET]XX.XXX.XXX.XX:1194
Wed Feb 21 14:20:52 2018 MANAGEMENT: >STATE:1519219252,WAIT,,,,,,
Wed Feb 21 14:21:52 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Wed Feb 21 14:21:52 2018 TLS Error: TLS handshake failed
Wed Feb 21 14:21:52 2018 SIGUSR1[soft,tls-error] received, process restarting
Wed Feb 21 14:21:52 2018 MANAGEMENT: >STATE:1519219312,RECONNECTING,tls-error,,,,,
Wed Feb 21 14:21:52 2018 Restart pause, 5 second(s)
Wed Feb 21 14:21:55 2018 SIGTERM[hard,init_instance] received, process exiting
Wed Feb 21 14:21:55 2018 MANAGEMENT: >STATE:1519219315,EXITING,init_instance,,,,,
EDIT:
Deze twee regels in de config file van de client gezet, en het werkte..
push "route 192.168.1.0 255.255.255.0"
push "redirect-gateway def1"
[
Voor 167% gewijzigd door
Fryslanboy op 21-02-2018 16:57
]