This is the second time I deploy a vpn client, in another laptop.
Everything seems to be ok but connecting to internet doesn't work.
Here's what displays after logging in with my account ids :
Code: Select all
Thu Mar 22 20:39:16 2018 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Mar 22 20:39:16 2018 NOTE: --fast-io is disabled since we are not using UDP
Thu Mar 22 20:39:16 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Mar 22 20:39:16 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Mar 22 20:39:16 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.18.3:443
Thu Mar 22 20:39:16 2018 Socket Buffers: R=[87380->87380] S=[16384->16384]
Thu Mar 22 20:39:16 2018 Attempting to establish TCP connection with [AF_INET]82.102.18.3:443 [nonblock]
Thu Mar 22 20:39:17 2018 TCP connection established with [AF_INET]82.102.18.3:443
Thu Mar 22 20:39:17 2018 TCP_CLIENT link local: (not bound)
Thu Mar 22 20:39:17 2018 TCP_CLIENT link remote: [AF_INET]82.102.18.3:443
Thu Mar 22 20:39:17 2018 TLS: Initial packet from [AF_INET]82.102.18.3:443, sid=3090bf91 e0717c7f
Thu Mar 22 20:39:17 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Mar 22 20:39:17 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr30.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Thu Mar 22 20:39:17 2018 Validating certificate key usage
Thu Mar 22 20:39:17 2018 ++ Certificate has key usage 00a0, expects 00a0
Thu Mar 22 20:39:17 2018 VERIFY KU OK
Thu Mar 22 20:39:17 2018 Validating certificate extended key usage
Thu Mar 22 20:39:17 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Mar 22 20:39:17 2018 VERIFY EKU OK
Thu Mar 22 20:39:17 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr30.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Thu Mar 22 20:39:17 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Mar 22 20:39:17 2018 [fr30.nordvpn.com] Peer Connection Initiated with [AF_INET]82.102.18.3:443
Thu Mar 22 20:39:19 2018 SENT CONTROL [fr30.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Mar 22 20:39:19 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.54 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: timers and/or timeouts modified
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Mar 22 20:39:19 2018 Socket Buffers: R=[341760->327680] S=[44800->327680]
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: --ifconfig/up options modified
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: route options modified
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: route-related options modified
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: peer-id set
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: adjusting link_mtu to 1659
Thu Mar 22 20:39:19 2018 OPTIONS IMPORT: data channel crypto options modified
Thu Mar 22 20:39:19 2018 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Mar 22 20:39:19 2018 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Mar 22 20:39:19 2018 ROUTE_GATEWAY 192.168.0.254/255.255.255.0 IFACE=wlp10s0 HWADDR=80:56:f2:00:24:4a
Thu Mar 22 20:39:19 2018 TUN/TAP device tun0 opened
Thu Mar 22 20:39:19 2018 TUN/TAP TX queue length set to 100
Thu Mar 22 20:39:19 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Mar 22 20:39:19 2018 /sbin/ip link set dev tun0 up mtu 1500
Thu Mar 22 20:39:19 2018 /sbin/ip addr add dev tun0 10.7.7.54/24 broadcast 10.7.7.255
Thu Mar 22 20:39:19 2018 /sbin/ip route add 82.102.18.3/32 via 192.168.0.254
Thu Mar 22 20:39:19 2018 /sbin/ip route add 0.0.0.0/1 via 10.7.7.1
Thu Mar 22 20:39:19 2018 /sbin/ip route add 128.0.0.0/1 via 10.7.7.1
Thu Mar 22 20:39:19 2018 Initialization Sequence Completed
^CThu Mar 22 20:41:02 2018 event_wait : Interrupted system call (code=4)
Thu Mar 22 20:41:02 2018 /sbin/ip route del 82.102.18.3/32
Thu Mar 22 20:41:02 2018 /sbin/ip route del 0.0.0.0/1
Thu Mar 22 20:41:02 2018 /sbin/ip route del 128.0.0.0/1
Thu Mar 22 20:41:02 2018 Closing TUN/TAP interface
Thu Mar 22 20:41:02 2018 /sbin/ip addr del dev tun0 10.7.7.54/24
Thu Mar 22 20:41:02 2018 SIGINT[hard,] received, process exiting
root@debian-portable:/etc/openvpn/ovpn_tcp#
root@debian-portable:/etc/openvpn/ovpn_tcp#
root@debian-portable:/etc/openvpn/ovpn_tcp#
root@debian-portable:/etc/openvpn/ovpn_tcp#
root@debian-portable:/etc/openvpn/ovpn_tcp# openvpn fr30*
Thu Mar 22 21:06:51 2018 OpenVPN 2.4.0 i686-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
Thu Mar 22 21:06:51 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Enter Auth Username: olivier.marais75@gmail.com
Enter Auth Password: **************
Thu Mar 22 21:07:02 2018 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Mar 22 21:07:02 2018 NOTE: --fast-io is disabled since we are not using UDP
Thu Mar 22 21:07:02 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Mar 22 21:07:02 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Mar 22 21:07:02 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.18.3:443
Thu Mar 22 21:07:02 2018 Socket Buffers: R=[87380->87380] S=[16384->16384]
Thu Mar 22 21:07:02 2018 Attempting to establish TCP connection with [AF_INET]82.102.18.3:443 [nonblock]
Thu Mar 22 21:07:03 2018 TCP connection established with [AF_INET]82.102.18.3:443
Thu Mar 22 21:07:03 2018 TCP_CLIENT link local: (not bound)
Thu Mar 22 21:07:03 2018 TCP_CLIENT link remote: [AF_INET]82.102.18.3:443
Thu Mar 22 21:07:03 2018 TLS: Initial packet from [AF_INET]82.102.18.3:443, sid=837f0ef5 79c41192
Thu Mar 22 21:07:03 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Mar 22 21:07:04 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr30.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Thu Mar 22 21:07:04 2018 Validating certificate key usage
Thu Mar 22 21:07:04 2018 ++ Certificate has key usage 00a0, expects 00a0
Thu Mar 22 21:07:04 2018 VERIFY KU OK
Thu Mar 22 21:07:04 2018 Validating certificate extended key usage
Thu Mar 22 21:07:04 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Mar 22 21:07:04 2018 VERIFY EKU OK
Thu Mar 22 21:07:04 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr30.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
Thu Mar 22 21:07:04 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Mar 22 21:07:04 2018 [fr30.nordvpn.com] Peer Connection Initiated with [AF_INET]82.102.18.3:443
Thu Mar 22 21:07:05 2018 SENT CONTROL [fr30.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Mar 22 21:07:06 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.54 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: timers and/or timeouts modified
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Mar 22 21:07:06 2018 Socket Buffers: R=[341760->327680] S=[44800->327680]
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: --ifconfig/up options modified
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: route options modified
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: route-related options modified
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: peer-id set
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: adjusting link_mtu to 1659
Thu Mar 22 21:07:06 2018 OPTIONS IMPORT: data channel crypto options modified
Thu Mar 22 21:07:06 2018 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Mar 22 21:07:06 2018 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Mar 22 21:07:06 2018 ROUTE_GATEWAY 192.168.0.254/255.255.255.0 IFACE=wlp10s0 HWADDR=80:56:f2:00:24:4a
Thu Mar 22 21:07:06 2018 TUN/TAP device tun0 opened
Thu Mar 22 21:07:06 2018 TUN/TAP TX queue length set to 100
Thu Mar 22 21:07:06 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Mar 22 21:07:06 2018 /sbin/ip link set dev tun0 up mtu 1500
Thu Mar 22 21:07:06 2018 /sbin/ip addr add dev tun0 10.7.7.54/24 broadcast 10.7.7.255
Thu Mar 22 21:07:06 2018 /sbin/ip route add 82.102.18.3/32 via 192.168.0.254
Thu Mar 22 21:07:06 2018 /sbin/ip route add 0.0.0.0/1 via 10.7.7.1
Thu Mar 22 21:07:06 2018 /sbin/ip route add 128.0.0.0/1 via 10.7.7.1
Thu Mar 22 21:07:06 2018 Initialization Sequence Completed