I manage to install my OpenVPN and it's running fine. I configured the OpenVPN client and it connected to my server well fine.
I check whatismyIP website when connected to the VPN and it correctly masking my IP to use my VPS public IP.
However, it seems that not all my connections went through the VPN link because some websites are still blocked.
Here's my server settings :
Server Config
;port 1194
port **** masked
# TCP or UDP server?
;proto tcp
proto udp
;dev tap
dev tun
ca ca.crt
cert server.crt
key server.key # This file should be kept secret
dh dh2048.pem
;topology subnet
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "redirect-gateway def1 bypass-dhcp"
;push "redirect-gateway def1"
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
keepalive 10 120
tls-auth ta.key 0 # This file is secret
cipher AES-256-CBC
comp-lzo
max-clients 10
persist-key
persist-tun
status openvpn-status.log
log-append /var/log/openvpn.log
verb 3
explicit-exit-notify 1
port **** masked
# TCP or UDP server?
;proto tcp
proto udp
;dev tap
dev tun
ca ca.crt
cert server.crt
key server.key # This file should be kept secret
dh dh2048.pem
;topology subnet
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "redirect-gateway def1 bypass-dhcp"
;push "redirect-gateway def1"
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
keepalive 10 120
tls-auth ta.key 0 # This file is secret
cipher AES-256-CBC
comp-lzo
max-clients 10
persist-key
persist-tun
status openvpn-status.log
log-append /var/log/openvpn.log
verb 3
explicit-exit-notify 1
Here are my client settings :
Client Config Windows 10
client
dev tun
proto udp
remote *** *** udp masked
resolv-retry infinite
nobind
persist-key
persist-tun
comp-lzo
verb 3
ca d:\\cc\\ca.crt
cert d:\\cc\\client1.crt
key d:\\cc\\client1.key
tls-auth d:\\cc\\ta.key 1
cipher AES-256-CBC
tls-client
remote-cert-tls server
route-method exe
route-delay 2
Here's my server log :
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 TLS: Initial packet from [AF_INET]139.194.75.60:61676, sid=e31364f8 04c5de87
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=www.jn$
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=client$
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 peer info: IV_VER=2.3.17
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 peer info: IV_PLAT=win
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 peer info: IV_PROTO=2
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bi$
Fri Oct 20 09:07:19 2017 139.194.75.60:61676 [client1] Peer Connection Initiated with [AF_INET]139.194.75.60:61676
Fri Oct 20 09:07:19 2017 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dr$
Fri Oct 20 09:07:19 2017 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
Fri Oct 20 09:07:19 2017 MULTI: Learn: 10.8.0.6 -> client1/139.194.75.60:61676
Fri Oct 20 09:07:19 2017 MULTI: primary virtual IP for client1/139.194.75.60:61676: 10.8.0.6
Fri Oct 20 09:07:22 2017 client1/139.194.75.60:61676 PUSH: Received control message: 'PUSH_REQUEST'
Fri Oct 20 09:07:22 2017 client1/139.194.75.60:61676 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhc$