TinCanTech wrote: ↑Wed Apr 18, 2018 4:13 pm
nikolaiortiz wrote: ↑Wed Apr 18, 2018 3:10 pm
So I disable the firewall in the client and also in the server
I could
not see the shared files of the server from the client... But I
can see the shared files of the client from the server
Sounds like you have not turned the firewall off completely .. try that.
Hi..
I Finally made the test, turn off Windows firewall, full turn off, and nothing hanppens
I still can see the client files from the server, but I cant see the server files from the client.
I made a ping to the server and:
Code: Select all
C:\Users\user>ping -f -l 1024 10.8.0.1
Haciendo ping a 10.8.0.1 con 1024 bytes de datos:
Respuesta desde 10.8.0.1: bytes=1024 tiempo=78ms TTL=128
Respuesta desde 10.8.0.1: bytes=1024 tiempo=70ms TTL=128
Respuesta desde 10.8.0.1: bytes=1024 tiempo=39ms TTL=128
Respuesta desde 10.8.0.1: bytes=1024 tiempo=57ms TTL=128
Estadísticas de ping para 10.8.0.1:
Paquetes: enviados = 4, recibidos = 4, perdidos = 0
(0% perdidos),
Tiempos aproximados de ida y vuelta en milisegundos:
Mínimo = 39ms, Máximo = 78ms, Media = 61ms
from the client this is the log:
Code: Select all
Wed Apr 25 11:28:31 2018 VERIFY OK: depth=1, C=XXX, ST=XXX, L=XXXa, O=XXXXX, OU=XXX, CN=XXXXX-CA, name=XXXX, emailAddress=XXXXX@XXXXX.com
Wed Apr 25 11:28:31 2018 VERIFY KU OK
Wed Apr 25 11:28:31 2018 Validating certificate extended key usage
Wed Apr 25 11:28:31 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Apr 25 11:28:31 2018 VERIFY EKU OK
Wed Apr 25 11:28:31 2018 VERIFY OK: depth=0, C=XXX, ST=XXXX, L=XXXX, O=XXX, OU=XXX, CN=server, name=XXX, emailAddress=XXXXXXXXX@gmail.com
Wed Apr 25 11:28:40 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Apr 25 11:28:40 2018 [server] Peer Connection Initiated with [AF_INET]XXX.XXX.XXX.XXXX:1194
Wed Apr 25 11:28:41 2018 MANAGEMENT: >STATE:1524673721,GET_CONFIG,,,,,,
Wed Apr 25 11:28:41 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Apr 25 11:28:43 2018 PUSH: Received control message: 'PUSH_REPLY,route-metric 512,route 0.0.0.0 0.0.0.0,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.4 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Wed Apr 25 11:28:43 2018 OPTIONS IMPORT: timers and/or timeouts modified
Wed Apr 25 11:28:43 2018 OPTIONS IMPORT: --ifconfig/up options modified
Wed Apr 25 11:28:43 2018 OPTIONS IMPORT: route options modified
Wed Apr 25 11:28:43 2018 OPTIONS IMPORT: route-related options modified
Wed Apr 25 11:28:43 2018 OPTIONS IMPORT: peer-id set
Wed Apr 25 11:28:43 2018 OPTIONS IMPORT: adjusting link_mtu to 1624
Wed Apr 25 11:28:43 2018 OPTIONS IMPORT: data channel crypto options modified
Wed Apr 25 11:28:43 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Apr 25 11:28:43 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Apr 25 11:28:43 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Apr 25 11:28:43 2018 interactive service msg_channel=0
Wed Apr 25 11:28:43 2018 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=9c:30:5b:1d:5e:db
Wed Apr 25 11:28:43 2018 open_tun
Wed Apr 25 11:28:43 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{7A3880BF-A829-4D1C-80F5-08C8D0571EB5}.tap
Wed Apr 25 11:28:43 2018 TAP-Windows Driver Version 9.21
Wed Apr 25 11:28:43 2018 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.4/255.255.255.0 [SUCCEEDED]
Wed Apr 25 11:28:43 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.4/255.255.255.0 on interface {7A3880BF-A829-4D1C-80F5-08C8D0571EB5} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Wed Apr 25 11:28:43 2018 Successful ARP Flush on interface [14] {7A3880BF-A829-4D1C-80F5-08C8D0571EB5}
Wed Apr 25 11:28:43 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Wed Apr 25 11:28:43 2018 MANAGEMENT: >STATE:1524673723,ASSIGN_IP,,10.8.0.4,,,,
Wed Apr 25 11:28:48 2018 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Apr 25 11:28:48 2018 MANAGEMENT: >STATE:1524673728,ADD_ROUTES,,,,,,
Wed Apr 25 11:28:48 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 0.0.0.0 10.8.0.1 METRIC 512
Wed Apr 25 11:28:48 2018 Route addition via IPAPI succeeded [adaptive]
Wed Apr 25 11:28:48 2018 Initialization Sequence Completed
Wed Apr 25 11:28:48 2018 MANAGEMENT: >STATE:1524673728,CONNECTED,SUCCESS,10.8.0.4,190.85.44.122,1194,,
The log of the server:
Code: Select all
Wed Apr 25 11:45:40 2018 OpenVPN 2.4.5 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Mar 1 2018
Wed Apr 25 11:45:40 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Apr 25 11:45:40 2018 library versions: OpenSSL 1.1.0f 25 May 2017, LZO 2.10
Enter Management Password:
Wed Apr 25 11:45:40 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Apr 25 11:45:40 2018 Need hold release from management interface, waiting...
Wed Apr 25 11:45:40 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Apr 25 11:45:41 2018 MANAGEMENT: CMD 'state on'
Wed Apr 25 11:45:41 2018 MANAGEMENT: CMD 'log all on'
Wed Apr 25 11:45:41 2018 MANAGEMENT: CMD 'echo all on'
Wed Apr 25 11:45:41 2018 MANAGEMENT: CMD 'bytecount 5'
Wed Apr 25 11:45:41 2018 MANAGEMENT: CMD 'hold off'
Wed Apr 25 11:45:41 2018 MANAGEMENT: CMD 'hold release'
Wed Apr 25 11:45:41 2018 Diffie-Hellman initialized with 2048 bit key
Wed Apr 25 11:45:41 2018 interactive service msg_channel=0
Wed Apr 25 11:45:41 2018 open_tun
Wed Apr 25 11:45:41 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C1FB0D92-4B53-4AFA-8CDF-680EC49CBCA1}.tap
Wed Apr 25 11:45:41 2018 TAP-Windows Driver Version 9.21
Wed Apr 25 11:45:41 2018 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.1/255.255.255.0 [SUCCEEDED]
Wed Apr 25 11:45:41 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.1/255.255.255.0 on interface {C1FB0D92-4B53-4AFA-8CDF-680EC49CBCA1} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Wed Apr 25 11:45:41 2018 Sleeping for 10 seconds...
Wed Apr 25 11:45:51 2018 Successful ARP Flush on interface [12] {C1FB0D92-4B53-4AFA-8CDF-680EC49CBCA1}
Wed Apr 25 11:45:51 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Wed Apr 25 11:45:51 2018 MANAGEMENT: >STATE:1524674751,ASSIGN_IP,,10.8.0.1,,,,
Wed Apr 25 11:45:51 2018 Could not determine IPv4/IPv6 protocol. Using AF_INET6
Wed Apr 25 11:45:51 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Apr 25 11:45:51 2018 setsockopt(IPV6_V6ONLY=0)
Wed Apr 25 11:45:51 2018 UDPv6 link local (bound): [AF_INET6][undef]:1194
Wed Apr 25 11:45:51 2018 UDPv6 link remote: [AF_UNSPEC]
Wed Apr 25 11:45:51 2018 MULTI: multi_init called, r=256 v=256
Wed Apr 25 11:45:51 2018 IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
Wed Apr 25 11:45:51 2018 ifconfig_pool_read(), in='XXXXXXXX,10.8.0.4', TODO: IPv6
Wed Apr 25 11:45:51 2018 succeeded -> ifconfig_pool_set()
Wed Apr 25 11:45:51 2018 IFCONFIG POOL LIST
Wed Apr 25 11:45:51 2018 XXXXXXXX,10.8.0.4
Wed Apr 25 11:45:51 2018 Initialization Sequence Completed
Wed Apr 25 11:45:51 2018 MANAGEMENT: >STATE:1524674751,CONNECTED,SUCCESS,10.8.0.1,,,,
Wed Apr 25 11:47:52 2018 XXXXXX7.37 TLS: Initial packet from [AF_INET6]::ffff:181.57.247.37:35978, sid=90cc39a7 be7bafe6
Wed Apr 25 11:47:53 2018 XXXXXXXX7 VERIFY OK: depth=1, C=XX, ST=XXX, L=XXXX, O=XXXX, OU=XXXXX, CN=XXXX-CA, name=XXXXXX, emailAddress=XXXXXXXX
Wed Apr 25 11:47:53 2018 XXXXX7 VERIFY OK: depth=0, C=XX, ST=XXX, L=XXXota, O=XXXXXXXXX, OU=XXXXXXXXX, CN=XXXXXX, name=XXXXXX, emailAddress=XXXXX@XXXXX.com
Wed Apr 25 11:47:53 2018 XXXX47.37 peer info: IV_VER=2.4.5
Wed Apr 25 11:47:53 2018 1XXXXX7.37 peer info: IV_PLAT=win
Wed Apr 25 11:47:53 2018 1XXXXX7.37 peer info: IV_PROTO=2
Wed Apr 25 11:47:53 2018 1XXXXXXXX.37 peer info: IV_NCP=2
Wed Apr 25 11:47:53 2018 XXXX7.37 peer info: IV_LZ4=1
Wed Apr 25 11:47:53 2018 XXXXX7.37 peer info: IV_LZ4v2=1
Wed Apr 25 11:47:53 2018 XXXXX7.37 peer info: IV_LZO=1
Wed Apr 25 11:47:53 2018 XXXXXX47.37 peer info: IV_COMP_STUB=1
Wed Apr 25 11:47:53 2018 XXXXXXX247.37 peer info: IV_COMP_STUBv2=1
Wed Apr 25 11:47:53 2018 XXXXXX47.37 peer info: IV_TCPNL=1
Wed Apr 25 11:47:53 2018 XXXXXX7.37 peer info: IV_GUI_VER=OpenVPN_GUI_11
Wed Apr 25 11:47:53 2018 XXXXX.37 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Apr 25 11:47:53 2018 1XXXX.37 [XXXXXXp] Peer Connection Initiated with [AF_INET6]::ffff:181.57.247.37:35978
Wed Apr 25 11:47:53 2018 XXXXX/XXXXXX.37 MULTI_sva: pool returned IPv4=10.8.0.4, IPv6=(Not enabled)
Wed Apr 25 11:47:53 2018 XXXXX/XXX.XXX.37 MULTI: Learn: 10.8.0.4 -> XXXXXXXXXX.37
Wed Apr 25 11:47:53 2018 XXXX/XXXXXXXX.37 MULTI: primary virtual IP for XXXXXXXXX.37: 10.8.0.4
Wed Apr 25 11:47:54 2018 XXXXXX/XXXXXXXX.37 PUSH: Received control message: 'PUSH_REQUEST'
Wed Apr 25 11:47:54 2018 XXXXXX/XXXXXX.37 SENT CONTROL [XXXXXX]: 'PUSH_REPLY,route-metric 512,route 0.0.0.0 0.0.0.0,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.4 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Wed Apr 25 11:47:54 2018 XXXXXX/XXXXXXX.37 Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Apr 25 11:47:54 2018 XXXXXXX/XXXX7.37 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Apr 25 11:47:54 2018 JXXXXXXXp/XXX57.247.37 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
some help please...