Connection Failure Randomly Without Reason

This forum is for admins who are looking to build or expand their OpenVPN setup.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
supernova
OpenVpn Newbie
Posts: 1
Joined: Tue Mar 06, 2018 10:50 pm

Connection Failure Randomly Without Reason

Post by supernova » Tue Mar 06, 2018 10:54 pm

I was able to connect to my vpn server completely fine until yesterday.
Now when I connect, it goes through, but I can only connect to things in the intranet of my server.

Last log:

Code: Select all

Tue Mar 06 13:34:43 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Tue Mar 06 13:34:43 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Mar 06 13:34:43 2018 library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
Enter Management Password:
Tue Mar 06 13:34:43 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Tue Mar 06 13:34:43 2018 Need hold release from management interface, waiting...
Tue Mar 06 13:34:43 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Tue Mar 06 13:34:43 2018 MANAGEMENT: CMD 'state on'
Tue Mar 06 13:34:43 2018 MANAGEMENT: CMD 'log all on'
Tue Mar 06 13:34:43 2018 MANAGEMENT: CMD 'echo all on'
Tue Mar 06 13:34:43 2018 MANAGEMENT: CMD 'hold off'
Tue Mar 06 13:34:43 2018 MANAGEMENT: CMD 'hold release'
Tue Mar 06 13:34:43 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Mar 06 13:34:43 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Mar 06 13:34:43 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]SERVERIPHERE:1194
Tue Mar 06 13:34:43 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Mar 06 13:34:43 2018 UDP link local: (not bound)
Tue Mar 06 13:34:43 2018 UDP link remote: [AF_INET]SERVERIPHERE9:1194
Tue Mar 06 13:34:43 2018 MANAGEMENT: >STATE:1520372083,WAIT,,,,,,
Tue Mar 06 13:34:43 2018 MANAGEMENT: >STATE:1520372083,AUTH,,,,,,
Tue Mar 06 13:34:43 2018 TLS: Initial packet from [AF_INET]SERVERIPHERE:1194, sid=2ba0d4e1 a2765cfb
Tue Mar 06 13:34:44 2018 VERIFY OK: depth=1, CN=cn_htcS2dg5BtbJVyXY
Tue Mar 06 13:34:44 2018 VERIFY KU OK
Tue Mar 06 13:34:44 2018 Validating certificate extended key usage
Tue Mar 06 13:34:44 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Mar 06 13:34:44 2018 VERIFY EKU OK
Tue Mar 06 13:34:44 2018 VERIFY X509NAME OK: CN=server_H1PRUc0ui6KtCDh4
Tue Mar 06 13:34:44 2018 VERIFY OK: depth=0, CN=server_H1PRUc0ui6KtCDh4
Tue Mar 06 13:34:44 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES128-GCM-SHA256, 4096 bit RSA
Tue Mar 06 13:34:44 2018 [server_H1PRUc0ui6KtCDh4] Peer Connection Initiated with [AF_INET]SERVERIPHERE:1194
Tue Mar 06 13:34:45 2018 MANAGEMENT: >STATE:1520372085,GET_CONFIG,,,,,,
Tue Mar 06 13:34:45 2018 SENT CONTROL [server_H1PRUc0ui6KtCDh4]: 'PUSH_REQUEST' (status=1)
Tue Mar 06 13:34:45 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 185.61.138.12,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM'
Tue Mar 06 13:34:45 2018 OPTIONS IMPORT: timers and/or timeouts modified
Tue Mar 06 13:34:45 2018 OPTIONS IMPORT: --ifconfig/up options modified
Tue Mar 06 13:34:45 2018 OPTIONS IMPORT: route options modified
Tue Mar 06 13:34:45 2018 OPTIONS IMPORT: route-related options modified
Tue Mar 06 13:34:45 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Mar 06 13:34:45 2018 OPTIONS IMPORT: peer-id set
Tue Mar 06 13:34:45 2018 OPTIONS IMPORT: adjusting link_mtu to 1624
Tue Mar 06 13:34:45 2018 OPTIONS IMPORT: data channel crypto options modified
Tue Mar 06 13:34:45 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Mar 06 13:34:45 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Mar 06 13:34:45 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Mar 06 13:34:45 2018 interactive service msg_channel=712
Tue Mar 06 13:34:45 2018 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=14 HWADDR=d4:be:d9:95:d0:32
Tue Mar 06 13:34:46 2018 open_tun
Tue Mar 06 13:34:46 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{39D06121-1B0F-4FB9-A576-46E1827257BA}.tap
Tue Mar 06 13:34:46 2018 TAP-Windows Driver Version 9.21 
Tue Mar 06 13:34:46 2018 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Tue Mar 06 13:34:46 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {39D06121-1B0F-4FB9-A576-46E1827257BA} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Tue Mar 06 13:34:46 2018 Successful ARP Flush on interface [6] {39D06121-1B0F-4FB9-A576-46E1827257BA}
Tue Mar 06 13:34:46 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Tue Mar 06 13:34:46 2018 MANAGEMENT: >STATE:1520372086,ASSIGN_IP,,10.8.0.2,,,,
Tue Mar 06 13:34:46 2018 Blocking outside dns using service succeeded.
Tue Mar 06 13:34:51 2018 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Mar 06 13:34:51 2018 C:\WINDOWS\system32\route.exe ADD SERVERIPHERE MASK 255.255.255.255 192.168.1.1
Tue Mar 06 13:34:51 2018 Route addition via service succeeded
Tue Mar 06 13:34:51 2018 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Tue Mar 06 13:34:51 2018 Route addition via service succeeded
Tue Mar 06 13:34:51 2018 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Tue Mar 06 13:34:51 2018 Route addition via service succeeded
Tue Mar 06 13:34:51 2018 Initialization Sequence Completed
Tue Mar 06 13:34:51 2018 MANAGEMENT: >STATE:1520372091,CONNECTED,SUCCESS,10.8.0.2,SERVERIPHERE,1194,,
Tue Mar 06 13:38:36 2018 C:\WINDOWS\system32\route.exe DELETE SERVERIPHERE MASK 255.255.255.255 192.168.1.1
Tue Mar 06 13:38:36 2018 Route deletion via service succeeded
Tue Mar 06 13:38:36 2018 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Tue Mar 06 13:38:36 2018 Route deletion via service succeeded
Tue Mar 06 13:38:36 2018 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Tue Mar 06 13:38:36 2018 Route deletion via service succeeded
Tue Mar 06 13:38:36 2018 Closing TUN/TAP interface
Tue Mar 06 13:38:36 2018 TAP: DHCP address released
Tue Mar 06 13:38:36 2018 Unblocking outside dns using service succeeded.
Tue Mar 06 13:38:36 2018 SIGTERM[hard,] received, process exiting
Tue Mar 06 13:38:36 2018 MANAGEMENT: >STATE:1520372316,EXITING,SIGTERM,,,,,
This also happens on my ubuntu (This is windows 10 currently)

Post Reply