At one point I was pleasantly surprised to come into work and actually have samba access, which was lost upon restart and hasn't be obtained since.
SMB on the linux box is configured as a WINS server, and I've added a few lines in effort to get this working.
I'm not looking to redirect any internet traffic over the VPN.
Server-Side-Lan: 192.168.192.0/24
Not entirely sure how to get the OpenVPN Server config from the Asus:
Routing table on Asus
Client file on remote Windows 7 machine (minus CA info):
Code: Select all
client
dev tun
proto udp
remote *.*.*.* 1194
float
comp-lzo adaptive
keepalive 15 60
auth-user-pass
ns-cert-type server
resolv-retry infinite
nobind
Code: Select all
workgroup = WORKGROUP
server string = %h server
wins support = yes
dns proxy = yes
name resolve order = wins lmhosts host bcast
hosts allow = 192.168.192.0/24 10.10.0.0/24 127.0.0.1
syslog = 0
panic action = /usr/share/samba/panic-action %d
security = user
encrypt passwords = true
passdb backend = tdbsam
obey pam restrictions = yes
unix password sync = yes
passwd program = /usr/bin/passwd %u
passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
pam password change = yes
map to guest = bad user
Code: Select all
Mar 22 13:28:20 rc_service: watchdog 261:notify_rc start_httpd
Mar 22 12:28:20 RT-AC66U: start httpd - SSL
Mar 22 13:28:49 openvpn[14783]: MULTI: multi_create_instance called
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 Re-using SSL/TLS context
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 LZO compression initialized
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 Local Options hash (VER=V4): '530fdded'
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 Expected Remote Options hash (VER=V4): '41690919'
Mar 22 13:28:49 openvpn[14783]: 108.160.41.13:21374 TLS: Initial packet from [AF_INET]108.160.41.13:21374, sid=a868af5e dbee481d
Mar 22 13:28:51 openvpn[14783]: 108.160.41.13:21374 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC66U, emailAddress=me@myhost.mydomain
Mar 22 13:28:51 openvpn[14783]: 108.160.41.13:21374 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
Mar 22 13:28:52 watchdog: restart httpd
Mar 22 13:28:52 rc_service: watchdog 261:notify_rc start_httpd
Mar 22 12:28:53 RT-AC66U: start httpd - SSL
Mar 22 13:28:53 openvpn[14783]: 108.160.41.13:21374 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
Mar 22 13:28:53 openvpn[14783]: 108.160.41.13:21374 TLS: Username/Password authentication succeeded for username 'kelsey'
Mar 22 13:28:53 openvpn[14783]: 108.160.41.13:21374 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mar 22 13:28:53 openvpn[14783]: 108.160.41.13:21374 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 22 13:28:53 openvpn[14783]: 108.160.41.13:21374 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mar 22 13:28:53 openvpn[14783]: 108.160.41.13:21374 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 22 13:28:53 openvpn[14783]: 108.160.41.13:21374 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mar 22 13:28:53 openvpn[14783]: 108.160.41.13:21374 [client] Peer Connection Initiated with [AF_INET]108.160.41.13:21374
Mar 22 13:28:53 openvpn[14783]: client/108.160.41.13:21374 MULTI_sva: pool returned IPv4=10.10.0.6, IPv6=(Not enabled)
Mar 22 13:28:53 openvpn[14783]: client/108.160.41.13:21374 MULTI: Learn: 10.10.0.6 -> client/108.160.41.13:21374
Mar 22 13:28:53 openvpn[14783]: client/108.160.41.13:21374 MULTI: primary virtual IP for client/108.160.41.13:21374: 10.10.0.6
Mar 22 13:28:55 openvpn[14783]: client/108.160.41.13:21374 PUSH: Received control message: 'PUSH_REQUEST'
Mar 22 13:28:55 openvpn[14783]: client/108.160.41.13:21374 send_push_reply(): safe_cap=940
Mar 22 13:28:55 openvpn[14783]: client/108.160.41.13:21374 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.192.0 255.255.255.0,dhcp-option DNS 192.168.192.2,dhcp-option WINS 192.168.192.100,route 192.168.192.0 255.255.255.0,route 10.10.0.1,topology net30,ping 15,ping-restart 60,ifconfig 10.10.0.6 10.10.0.5' (status=1)
Mar 22 13:28:55 openvpn[14783]: client/108.160.41.13:21374 MULTI: bad source address from client [fe80::b929:c7dc:db5f:319f], packet dropped
Mar 22 13:28:55 openvpn[14783]: client/108.160.41.13:21374 MULTI: bad source address from client [fe80::b929:c7dc:db5f:319f], packet dropped
Hope this is all in order, any help is crazy appreciated as I've been unsuccessfully working on this for awhile now. If I've missed anything I'll try and get it up asap.