We installed the OpenVPN Community Edition on our Windows Server 2019 and configured it to run as a service.
The server is behind a router/firewall and we configured the port forwarding to the Windows server.
We added Remote Access roles > DirectAccess and VPN (RAS) and Routing, then configured the lan routing on the network interfaces.
We enabled the Internet Connection Sharing and changed the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\ ScopeAddress to 10.3.0.1
From our Windows 10 client laptop, we are able to access all servers and devices on our 10.0.1.x lan.
Everything seems to be working fine.
The issue is if we reboot the Windows Server, we are still able to connect the VPN but we could only access the Windows Server and not other servers/devices on 10.0.1.x
(We can ping the Windows server IP and the 10.3.0.1 but not other servers.)
We have to manually disable the Internet Connection Sharing and reenable it. Then we can access the 10.0.1.x devices again.
How can we make it work after reboot and not having to manually change the ICS?
Here are our configurations and logs.
Server
server
port xxxxx
proto udp
dev tun
ca "C:\\Program Files\\OpenVPN\\config-auto\\ca.crt"
cert "C:\\Program Files\\OpenVPN\\config-auto\\xxxxxx.crt"
key "C:\\Program Files\\OpenVPN\\config-auto\\xxxxxx.key" # This file should be kept secret
dh "C:\\Program Files\\OpenVPN\\config-auto\\dh.pem"
server 10.3.0.0 255.255.255.0
push "route 10.0.1.0 255.255.255.0"
push "dhcp-option DNS 10.3.0.1"
push "dhcp-option WINS 10.3.0.1"
push "dhcp-option DOMAIN xxxxxxxxxx.local"
keepalive 10 120
tls-auth ta.key 0 # This file is secret
cipher AES-256-GCM
persist-key
persist-tun
status openvpn-status.log
verb 4
explicit-exit-notify 1
Code: Select all
2022-02-23 11:56:08 us=656000 WARNING: --topology net30 support for server configs with IPv4 pools will be removed in a future release. Please migrate to --topology subnet as soon as possible.
2022-02-23 11:56:08 us=656000 Current Parameter Settings:
2022-02-23 11:56:08 us=656000 config = 'C:\Program Files\OpenVPN\config-auto\XXXXXX.ovpn'
2022-02-23 11:56:08 us=656000 mode = 1
2022-02-23 11:56:08 us=656000 show_ciphers = DISABLED
2022-02-23 11:56:08 us=656000 show_digests = DISABLED
2022-02-23 11:56:08 us=656000 show_engines = DISABLED
2022-02-23 11:56:08 us=656000 genkey = DISABLED
2022-02-23 11:56:08 us=656000 genkey_filename = '[UNDEF]'
2022-02-23 11:56:08 us=656000 key_pass_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 show_tls_ciphers = DISABLED
2022-02-23 11:56:08 us=656000 connect_retry_max = 0
2022-02-23 11:56:08 us=656000 Connection profiles [0]:
2022-02-23 11:56:08 us=656000 proto = udp
2022-02-23 11:56:08 us=656000 local = '[UNDEF]'
2022-02-23 11:56:08 us=656000 local_port = 'xxxxx'
2022-02-23 11:56:08 us=656000 remote = '[UNDEF]'
2022-02-23 11:56:08 us=656000 remote_port = 'xxxxx'
2022-02-23 11:56:08 us=656000 remote_float = DISABLED
2022-02-23 11:56:08 us=656000 bind_defined = DISABLED
2022-02-23 11:56:08 us=656000 bind_local = ENABLED
2022-02-23 11:56:08 us=656000 bind_ipv6_only = DISABLED
2022-02-23 11:56:08 us=656000 connect_retry_seconds = 5
2022-02-23 11:56:08 us=656000 connect_timeout = 120
2022-02-23 11:56:08 us=656000 socks_proxy_server = '[UNDEF]'
2022-02-23 11:56:08 us=656000 socks_proxy_port = '[UNDEF]'
2022-02-23 11:56:08 us=656000 tun_mtu = 1500
2022-02-23 11:56:08 us=656000 tun_mtu_defined = ENABLED
2022-02-23 11:56:08 us=656000 link_mtu = 1500
2022-02-23 11:56:08 us=656000 link_mtu_defined = DISABLED
2022-02-23 11:56:08 us=656000 tun_mtu_extra = 0
2022-02-23 11:56:08 us=656000 tun_mtu_extra_defined = DISABLED
2022-02-23 11:56:08 us=656000 mtu_discover_type = -1
2022-02-23 11:56:08 us=656000 fragment = 0
2022-02-23 11:56:08 us=656000 mssfix = 1450
2022-02-23 11:56:08 us=656000 explicit_exit_notification = 1
2022-02-23 11:56:08 us=656000 tls_auth_file = '[INLINE]'
2022-02-23 11:56:08 us=656000 key_direction = 0
2022-02-23 11:56:08 us=656000 tls_crypt_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 tls_crypt_v2_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 Connection profiles END
2022-02-23 11:56:08 us=656000 remote_random = DISABLED
2022-02-23 11:56:08 us=656000 ipchange = '[UNDEF]'
2022-02-23 11:56:08 us=656000 dev = 'tun'
2022-02-23 11:56:08 us=656000 dev_type = '[UNDEF]'
2022-02-23 11:56:08 us=656000 dev_node = '[UNDEF]'
2022-02-23 11:56:08 us=656000 lladdr = '[UNDEF]'
2022-02-23 11:56:08 us=656000 topology = 1
2022-02-23 11:56:08 us=656000 ifconfig_local = '10.3.0.1'
2022-02-23 11:56:08 us=656000 ifconfig_remote_netmask = '10.3.0.2'
2022-02-23 11:56:08 us=656000 ifconfig_noexec = DISABLED
2022-02-23 11:56:08 us=656000 ifconfig_nowarn = DISABLED
2022-02-23 11:56:08 us=656000 ifconfig_ipv6_local = '[UNDEF]'
2022-02-23 11:56:08 us=656000 ifconfig_ipv6_netbits = 0
2022-02-23 11:56:08 us=656000 ifconfig_ipv6_remote = '[UNDEF]'
2022-02-23 11:56:08 us=656000 shaper = 0
2022-02-23 11:56:08 us=656000 mtu_test = 0
2022-02-23 11:56:08 us=656000 mlock = DISABLED
2022-02-23 11:56:08 us=656000 keepalive_ping = 10
2022-02-23 11:56:08 us=656000 keepalive_timeout = 120
2022-02-23 11:56:08 us=656000 inactivity_timeout = 0
2022-02-23 11:56:08 us=656000 ping_send_timeout = 10
2022-02-23 11:56:08 us=656000 ping_rec_timeout = 240
2022-02-23 11:56:08 us=656000 ping_rec_timeout_action = 2
2022-02-23 11:56:08 us=656000 ping_timer_remote = DISABLED
2022-02-23 11:56:08 us=656000 remap_sigusr1 = 0
2022-02-23 11:56:08 us=656000 persist_tun = ENABLED
2022-02-23 11:56:08 us=656000 persist_local_ip = DISABLED
2022-02-23 11:56:08 us=656000 persist_remote_ip = DISABLED
2022-02-23 11:56:08 us=656000 persist_key = ENABLED
2022-02-23 11:56:08 us=656000 passtos = DISABLED
2022-02-23 11:56:08 us=656000 resolve_retry_seconds = 1000000000
2022-02-23 11:56:08 us=656000 resolve_in_advance = DISABLED
2022-02-23 11:56:08 us=656000 username = '[UNDEF]'
2022-02-23 11:56:08 us=656000 groupname = '[UNDEF]'
2022-02-23 11:56:08 us=656000 chroot_dir = '[UNDEF]'
2022-02-23 11:56:08 us=656000 cd_dir = '[UNDEF]'
2022-02-23 11:56:08 us=656000 writepid = '[UNDEF]'
2022-02-23 11:56:08 us=656000 up_script = '[UNDEF]'
2022-02-23 11:56:08 us=656000 down_script = '[UNDEF]'
2022-02-23 11:56:08 us=656000 down_pre = DISABLED
2022-02-23 11:56:08 us=656000 up_restart = DISABLED
2022-02-23 11:56:08 us=656000 up_delay = DISABLED
2022-02-23 11:56:08 us=656000 daemon = DISABLED
2022-02-23 11:56:08 us=656000 inetd = 0
2022-02-23 11:56:08 us=656000 log = DISABLED
2022-02-23 11:56:08 us=656000 suppress_timestamps = DISABLED
2022-02-23 11:56:08 us=656000 machine_readable_output = DISABLED
2022-02-23 11:56:08 us=656000 nice = 0
2022-02-23 11:56:08 us=656000 verbosity = 4
2022-02-23 11:56:08 us=656000 mute = 0
2022-02-23 11:56:08 us=656000 status_file = 'openvpn-status.log'
2022-02-23 11:56:08 us=656000 status_file_version = 1
2022-02-23 11:56:08 us=656000 status_file_update_freq = 60
2022-02-23 11:56:08 us=656000 occ = ENABLED
2022-02-23 11:56:08 us=656000 rcvbuf = 0
2022-02-23 11:56:08 us=656000 sndbuf = 0
2022-02-23 11:56:08 us=656000 sockflags = 0
2022-02-23 11:56:08 us=656000 fast_io = DISABLED
2022-02-23 11:56:08 us=656000 comp.alg = 0
2022-02-23 11:56:08 us=656000 comp.flags = 0
2022-02-23 11:56:08 us=656000 route_script = '[UNDEF]'
2022-02-23 11:56:08 us=656000 route_default_gateway = '[UNDEF]'
2022-02-23 11:56:08 us=656000 route_default_metric = 0
2022-02-23 11:56:08 us=656000 route_noexec = DISABLED
2022-02-23 11:56:08 us=656000 route_delay = 0
2022-02-23 11:56:08 us=656000 route_delay_window = 30
2022-02-23 11:56:08 us=656000 route_delay_defined = DISABLED
2022-02-23 11:56:08 us=656000 route_nopull = DISABLED
2022-02-23 11:56:08 us=656000 route_gateway_via_dhcp = DISABLED
2022-02-23 11:56:08 us=656000 allow_pull_fqdn = DISABLED
2022-02-23 11:56:08 us=656000 route 10.3.0.0/255.255.255.0/default (not set)/default (not set)
2022-02-23 11:56:08 us=656000 management_addr = '[UNDEF]'
2022-02-23 11:56:08 us=656000 management_port = '[UNDEF]'
2022-02-23 11:56:08 us=656000 management_user_pass = '[UNDEF]'
2022-02-23 11:56:08 us=656000 management_log_history_cache = 250
2022-02-23 11:56:08 us=656000 management_echo_buffer_size = 100
2022-02-23 11:56:08 us=656000 management_write_peer_info_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 management_client_user = '[UNDEF]'
2022-02-23 11:56:08 us=656000 management_client_group = '[UNDEF]'
2022-02-23 11:56:08 us=656000 management_flags = 0
2022-02-23 11:56:08 us=656000 shared_secret_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 key_direction = 0
2022-02-23 11:56:08 us=656000 ciphername = 'AES-256-GCM'
2022-02-23 11:56:08 us=656000 ncp_enabled = ENABLED
2022-02-23 11:56:08 us=656000 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
2022-02-23 11:56:08 us=656000 authname = 'SHA1'
2022-02-23 11:56:08 us=656000 prng_hash = 'SHA1'
2022-02-23 11:56:08 us=656000 prng_nonce_secret_len = 16
2022-02-23 11:56:08 us=656000 keysize = 0
2022-02-23 11:56:08 us=656000 engine = DISABLED
2022-02-23 11:56:08 us=656000 replay = ENABLED
2022-02-23 11:56:08 us=656000 mute_replay_warnings = DISABLED
2022-02-23 11:56:08 us=656000 replay_window = 64
2022-02-23 11:56:08 us=656000 replay_time = 15
2022-02-23 11:56:08 us=656000 packet_id_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 test_crypto = DISABLED
2022-02-23 11:56:08 us=656000 tls_server = ENABLED
2022-02-23 11:56:08 us=656000 tls_client = DISABLED
2022-02-23 11:56:08 us=656000 ca_file = 'C:\Program Files\OpenVPN\config-auto\ca.crt'
2022-02-23 11:56:08 us=656000 ca_path = '[UNDEF]'
2022-02-23 11:56:08 us=656000 dh_file = 'C:\Program Files\OpenVPN\config-auto\dh.pem'
2022-02-23 11:56:08 us=656000 cert_file = 'C:\Program Files\OpenVPN\config-auto\XXXXXX.crt'
2022-02-23 11:56:08 us=656000 extra_certs_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 priv_key_file = 'C:\Program Files\OpenVPN\config-auto\XXXXXX.key'
2022-02-23 11:56:08 us=656000 pkcs12_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 cryptoapi_cert = '[UNDEF]'
2022-02-23 11:56:08 us=656000 cipher_list = '[UNDEF]'
2022-02-23 11:56:08 us=656000 cipher_list_tls13 = '[UNDEF]'
2022-02-23 11:56:08 us=656000 tls_cert_profile = '[UNDEF]'
2022-02-23 11:56:08 us=656000 tls_verify = '[UNDEF]'
2022-02-23 11:56:08 us=656000 tls_export_cert = '[UNDEF]'
2022-02-23 11:56:08 us=656000 verify_x509_type = 0
2022-02-23 11:56:08 us=656000 verify_x509_name = '[UNDEF]'
2022-02-23 11:56:08 us=656000 crl_file = '[UNDEF]'
2022-02-23 11:56:08 us=656000 ns_cert_type = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_ku[i] = 0
2022-02-23 11:56:08 us=656000 remote_cert_eku = '[UNDEF]'
2022-02-23 11:56:08 us=656000 ssl_flags = 0
2022-02-23 11:56:08 us=656000 tls_timeout = 2
2022-02-23 11:56:08 us=656000 renegotiate_bytes = -1
2022-02-23 11:56:08 us=656000 renegotiate_packets = 0
2022-02-23 11:56:08 us=656000 renegotiate_seconds = 3600
2022-02-23 11:56:08 us=656000 handshake_window = 60
2022-02-23 11:56:08 us=656000 transition_window = 3600
2022-02-23 11:56:08 us=656000 single_session = DISABLED
2022-02-23 11:56:08 us=656000 push_peer_info = DISABLED
2022-02-23 11:56:08 us=656000 tls_exit = DISABLED
2022-02-23 11:56:08 us=656000 tls_crypt_v2_metadata = '[UNDEF]'
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_protected_authentication = DISABLED
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_private_mode = 00000000
2022-02-23 11:56:08 us=656000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_cert_private = DISABLED
2022-02-23 11:56:08 us=671000 pkcs11_pin_cache_period = -1
2022-02-23 11:56:08 us=671000 pkcs11_id = '[UNDEF]'
2022-02-23 11:56:08 us=671000 pkcs11_id_management = DISABLED
2022-02-23 11:56:08 us=671000 server_network = 10.3.0.0
2022-02-23 11:56:08 us=671000 server_netmask = 255.255.255.0
2022-02-23 11:56:08 us=671000 server_network_ipv6 = ::
2022-02-23 11:56:08 us=671000 server_netbits_ipv6 = 0
2022-02-23 11:56:08 us=671000 server_bridge_ip = 0.0.0.0
2022-02-23 11:56:08 us=671000 server_bridge_netmask = 0.0.0.0
2022-02-23 11:56:08 us=671000 server_bridge_pool_start = 0.0.0.0
2022-02-23 11:56:08 us=671000 server_bridge_pool_end = 0.0.0.0
2022-02-23 11:56:08 us=671000 push_entry = 'route 10.0.1.0 255.255.255.0'
2022-02-23 11:56:08 us=671000 push_entry = 'dhcp-option DNS 10.3.0.1'
2022-02-23 11:56:08 us=671000 push_entry = 'dhcp-option WINS 10.3.0.1'
2022-02-23 11:56:08 us=671000 push_entry = 'dhcp-option DOMAIN xxxxxxxxxxx.local'
2022-02-23 11:56:08 us=671000 push_entry = 'route 10.3.0.1'
2022-02-23 11:56:08 us=671000 push_entry = 'topology net30'
2022-02-23 11:56:08 us=671000 push_entry = 'ping 10'
2022-02-23 11:56:08 us=671000 push_entry = 'ping-restart 120'
2022-02-23 11:56:08 us=671000 ifconfig_pool_defined = ENABLED
2022-02-23 11:56:08 us=671000 ifconfig_pool_start = 10.3.0.4
2022-02-23 11:56:08 us=671000 ifconfig_pool_end = 10.3.0.251
2022-02-23 11:56:08 us=671000 ifconfig_pool_netmask = 0.0.0.0
2022-02-23 11:56:08 us=671000 ifconfig_pool_persist_filename = '[UNDEF]'
2022-02-23 11:56:08 us=671000 ifconfig_pool_persist_refresh_freq = 600
2022-02-23 11:56:08 us=671000 ifconfig_ipv6_pool_defined = DISABLED
2022-02-23 11:56:08 us=671000 ifconfig_ipv6_pool_base = ::
2022-02-23 11:56:08 us=671000 ifconfig_ipv6_pool_netbits = 0
2022-02-23 11:56:08 us=671000 n_bcast_buf = 256
2022-02-23 11:56:08 us=671000 tcp_queue_limit = 64
2022-02-23 11:56:08 us=671000 real_hash_size = 256
2022-02-23 11:56:08 us=671000 virtual_hash_size = 256
2022-02-23 11:56:08 us=671000 client_connect_script = '[UNDEF]'
2022-02-23 11:56:08 us=671000 learn_address_script = '[UNDEF]'
2022-02-23 11:56:08 us=671000 client_disconnect_script = '[UNDEF]'
2022-02-23 11:56:08 us=671000 client_config_dir = '[UNDEF]'
2022-02-23 11:56:08 us=671000 ccd_exclusive = DISABLED
2022-02-23 11:56:08 us=671000 tmp_dir = 'C:\Windows\TEMP\'
2022-02-23 11:56:08 us=671000 push_ifconfig_defined = DISABLED
2022-02-23 11:56:08 us=671000 push_ifconfig_local = 0.0.0.0
2022-02-23 11:56:08 us=671000 push_ifconfig_remote_netmask = 0.0.0.0
2022-02-23 11:56:08 us=671000 push_ifconfig_ipv6_defined = DISABLED
2022-02-23 11:56:08 us=671000 push_ifconfig_ipv6_local = ::/0
2022-02-23 11:56:08 us=671000 push_ifconfig_ipv6_remote = ::
2022-02-23 11:56:08 us=671000 enable_c2c = DISABLED
2022-02-23 11:56:08 us=671000 duplicate_cn = DISABLED
2022-02-23 11:56:08 us=671000 cf_max = 0
2022-02-23 11:56:08 us=671000 cf_per = 0
2022-02-23 11:56:08 us=671000 max_clients = 1024
2022-02-23 11:56:08 us=671000 max_routes_per_client = 256
2022-02-23 11:56:08 us=671000 auth_user_pass_verify_script = '[UNDEF]'
2022-02-23 11:56:08 us=671000 auth_user_pass_verify_script_via_file = DISABLED
2022-02-23 11:56:08 us=671000 auth_token_generate = DISABLED
2022-02-23 11:56:08 us=671000 auth_token_lifetime = 0
2022-02-23 11:56:08 us=671000 auth_token_secret_file = '[UNDEF]'
2022-02-23 11:56:08 us=671000 vlan_tagging = DISABLED
2022-02-23 11:56:08 us=671000 vlan_accept = all
2022-02-23 11:56:08 us=671000 vlan_pvid = 1
2022-02-23 11:56:08 us=671000 client = DISABLED
2022-02-23 11:56:08 us=671000 pull = DISABLED
2022-02-23 11:56:08 us=671000 auth_user_pass_file = '[UNDEF]'
2022-02-23 11:56:08 us=671000 show_net_up = DISABLED
2022-02-23 11:56:08 us=671000 route_method = 0
2022-02-23 11:56:08 us=671000 block_outside_dns = DISABLED
2022-02-23 11:56:08 us=671000 ip_win32_defined = DISABLED
2022-02-23 11:56:08 us=671000 ip_win32_type = 3
2022-02-23 11:56:08 us=671000 dhcp_masq_offset = 0
2022-02-23 11:56:08 us=671000 dhcp_lease_time = 31536000
2022-02-23 11:56:08 us=671000 tap_sleep = 10
2022-02-23 11:56:08 us=671000 dhcp_options = DISABLED
2022-02-23 11:56:08 us=671000 dhcp_renew = DISABLED
2022-02-23 11:56:08 us=671000 dhcp_pre_release = DISABLED
2022-02-23 11:56:08 us=671000 domain = '[UNDEF]'
2022-02-23 11:56:08 us=671000 netbios_scope = '[UNDEF]'
2022-02-23 11:56:08 us=671000 netbios_node_type = 0
2022-02-23 11:56:08 us=671000 disable_nbt = DISABLED
2022-02-23 11:56:08 us=671000 OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
2022-02-23 11:56:08 us=671000 Windows version 10.0 (Windows 10 or greater) 64bit
2022-02-23 11:56:08 us=671000 library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10
2022-02-23 11:56:08 us=687000 Diffie-Hellman initialized with 2048 bit key
2022-02-23 11:56:08 us=703000 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-02-23 11:56:08 us=703000 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-02-23 11:56:08 us=703000 TLS-Auth MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2022-02-23 11:56:08 us=703000 interactive service msg_channel=0
2022-02-23 11:56:08 us=718000 open_tun
2022-02-23 11:56:08 us=718000 tap-windows6 device [OpenVPN TAP-Windows6] opened
2022-02-23 11:56:08 us=718000 TAP-Windows Driver Version 9.24
2022-02-23 11:56:08 us=718000 TAP-Windows MTU=1500
2022-02-23 11:56:08 us=718000 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.3.0.1/255.255.255.252 on interface {B76BD71D-99EF-472F-96EF-1D6874DD6A79} [DHCP-serv: 10.3.0.2, lease-time: 31536000]
2022-02-23 11:56:08 us=718000 Sleeping for 10 seconds...
2022-02-23 11:56:18 us=734000 Successful ARP Flush on interface [15] {B76BD71D-99EF-472F-96EF-1D6874DD6A79}
2022-02-23 11:56:18 us=734000 do_ifconfig, ipv4=1, ipv6=0
2022-02-23 11:56:18 us=734000 IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry()
2022-02-23 11:56:18 us=734000 C:\Windows\system32\route.exe ADD 10.3.0.0 MASK 255.255.255.0 10.3.0.2
2022-02-23 11:56:18 us=734000 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
2022-02-23 11:56:18 us=734000 Route addition via IPAPI succeeded [adaptive]
2022-02-23 11:56:18 us=734000 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2022-02-23 11:56:18 us=734000 Could not determine IPv4/IPv6 protocol. Using AF_INET6
2022-02-23 11:56:18 us=734000 Socket Buffers: R=[131072->131072] S=[131072->131072]
2022-02-23 11:56:18 us=734000 setsockopt(IPV6_V6ONLY=0)
2022-02-23 11:56:18 us=734000 UDPv6 link local (bound): [AF_INET6][undef]:xxxxx
2022-02-23 11:56:18 us=734000 UDPv6 link remote: [AF_UNSPEC]
2022-02-23 11:56:18 us=734000 MULTI: multi_init called, r=256 v=256
2022-02-23 11:56:18 us=734000 IFCONFIG POOL IPv4: base=10.3.0.4 size=62
2022-02-23 11:56:18 us=734000 Initialization Sequence Completed
2022-02-23 11:57:47 MULTI: multi_create_instance called
2022-02-23 11:57:47 10.0.1.254:50229 Re-using SSL/TLS context
2022-02-23 11:57:47 10.0.1.254:50229 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-02-23 11:57:47 10.0.1.254:50229 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-02-23 11:57:47 us=15000 10.0.1.254:50229 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2022-02-23 11:57:47 us=15000 10.0.1.254:50229 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2022-02-23 11:57:47 us=15000 10.0.1.254:50229 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
2022-02-23 11:57:47 us=15000 10.0.1.254:50229 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
2022-02-23 11:57:47 us=15000 10.0.1.254:50229 TLS: Initial packet from [AF_INET6]::ffff:10.0.1.254:50229, sid=d7e42b31 545952db
2022-02-23 11:57:47 us=78000 10.0.1.254:50229 VERIFY OK: depth=1, CN=XXXXXX-CA
2022-02-23 11:57:47 us=78000 10.0.1.254:50229 VERIFY OK: depth=0, CN=testpc
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_VER=3.git::c2153df1
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_PLAT=win
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_NCP=2
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_TCPNL=1
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_PROTO=30
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_AUTO_SESS=1
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_GUI_VER=OCWindows_3.3.2-2475
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 peer info: IV_SSO=openurl,crtext
2022-02-23 11:57:47 us=93000 10.0.1.254:50229 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1521'
2022-02-23 11:57:47 us=109000 10.0.1.254:50229 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-02-23 11:57:47 us=109000 10.0.1.254:50229 [testpc] Peer Connection Initiated with [AF_INET6]::ffff:10.0.1.254:50229
2022-02-23 11:57:47 us=109000 testpc/10.0.1.254:50229 MULTI_sva: pool returned IPv4=10.3.0.6, IPv6=(Not enabled)
2022-02-23 11:57:47 us=109000 testpc/10.0.1.254:50229 MULTI: Learn: 10.3.0.6 -> testpc/10.0.1.254:50229
2022-02-23 11:57:47 us=109000 testpc/10.0.1.254:50229 MULTI: primary virtual IP for testpc/10.0.1.254:50229: 10.3.0.6
2022-02-23 11:57:47 us=109000 testpc/10.0.1.254:50229 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-02-23 11:57:47 us=109000 testpc/10.0.1.254:50229 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-02-23 11:57:47 us=109000 testpc/10.0.1.254:50229 SENT CONTROL [testpc]: 'PUSH_REPLY,route 10.0.1.0 255.255.255.0,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,dhcp-option DOMAIN xxxxxxxxxxx.local,route 10.3.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.3.0.6 10.3.0.5,peer-id 0,cipher AES-256-GCM' (status=1)
2022-02-23 11:57:47 us=109000 testpc/10.0.1.254:50229 PUSH: Received control message: 'PUSH_REQUEST'
2022-02-23 11:57:48 us=125000 testpc/10.0.1.254:50229 IP packet with unknown IP version=0 seen
2022-02-23 11:57:48 us=125000 testpc/10.0.1.254:50229 MULTI: bad source address from client [::], packet dropped
2022-02-23 12:00:53 us=875000 testpc/10.0.1.254:50229 SIGTERM[soft,remote-exit] received, client-instance exiting
2022-02-23 12:05:06 us=734000 MULTI: multi_create_instance called
2022-02-23 12:05:06 us=734000 10.0.1.254:64873 Re-using SSL/TLS context
2022-02-23 12:05:06 us=734000 10.0.1.254:64873 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-02-23 12:05:06 us=734000 10.0.1.254:64873 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-02-23 12:05:06 us=734000 10.0.1.254:64873 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2022-02-23 12:05:06 us=734000 10.0.1.254:64873 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2022-02-23 12:05:06 us=734000 10.0.1.254:64873 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
2022-02-23 12:05:06 us=734000 10.0.1.254:64873 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
2022-02-23 12:05:06 us=734000 10.0.1.254:64873 TLS: Initial packet from [AF_INET6]::ffff:10.0.1.254:64873, sid=c4cc7a79 ca0d28e6
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 VERIFY OK: depth=1, CN=XXXXXX-CA
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 VERIFY OK: depth=0, CN=testpc
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_VER=3.git::c2153df1
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_PLAT=win
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_NCP=2
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_TCPNL=1
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_PROTO=30
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_AUTO_SESS=1
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_GUI_VER=OCWindows_3.3.2-2475
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 peer info: IV_SSO=openurl,crtext
2022-02-23 12:05:06 us=781000 10.0.1.254:64873 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1521'
2022-02-23 12:05:06 us=796000 10.0.1.254:64873 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-02-23 12:05:06 us=796000 10.0.1.254:64873 [testpc] Peer Connection Initiated with [AF_INET6]::ffff:10.0.1.254:64873
2022-02-23 12:05:06 us=796000 testpc/10.0.1.254:64873 MULTI_sva: pool returned IPv4=10.3.0.6, IPv6=(Not enabled)
2022-02-23 12:05:06 us=796000 testpc/10.0.1.254:64873 MULTI: Learn: 10.3.0.6 -> testpc/10.0.1.254:64873
2022-02-23 12:05:06 us=796000 testpc/10.0.1.254:64873 MULTI: primary virtual IP for testpc/10.0.1.254:64873: 10.3.0.6
2022-02-23 12:05:06 us=796000 testpc/10.0.1.254:64873 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-02-23 12:05:06 us=796000 testpc/10.0.1.254:64873 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-02-23 12:05:06 us=796000 testpc/10.0.1.254:64873 SENT CONTROL [testpc]: 'PUSH_REPLY,route 10.0.1.0 255.255.255.0,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,dhcp-option DOMAIN xxxxxxxxxxx.local,route 10.3.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.3.0.6 10.3.0.5,peer-id 0,cipher AES-256-GCM' (status=1)
2022-02-23 12:05:06 us=796000 testpc/10.0.1.254:64873 PUSH: Received control message: 'PUSH_REQUEST'
2022-02-23 12:05:07 us=781000 testpc/10.0.1.254:64873 IP packet with unknown IP version=0 seen
2022-02-23 12:05:07 us=781000 testpc/10.0.1.254:64873 MULTI: bad source address from client [::], packet dropped
2022-02-23 12:05:41 us=15000 testpc/10.0.1.254:64873 SIGTERM[soft,remote-exit] received, client-instance exiting
client
client
dev tun
proto udp
remote x.x.x.x xxxxx
resolv-retry infinite
nobind
persist-key
persist-tun
ca "ca.crt"
cert "testpc.crt"
key "testpc.key"
remote-cert-tls server
tls-auth ta.key 1
cipher AES-256-GCM
verb 4
Code: Select all
⏎[Feb 23, 2022, 11:57:47] OpenVPN core 3.git::c2153df1 win x86_64 64-bit built on Oct 6 2021 14:20:53
⏎[Feb 23, 2022, 11:57:47] Frame=512/2048/512 mssfix-ctrl=1250
⏎[Feb 23, 2022, 11:57:47] UNUSED OPTIONS
4 [resolv-retry] [infinite]
5 [nobind]
6 [persist-key]
7 [persist-tun]
15 [verb] [3]
⏎[Feb 23, 2022, 11:57:47] EVENT: RESOLVE ⏎[Feb 23, 2022, 11:57:47] Contacting xxx.xxx.xxx.xxx:xxxxx via UDP
⏎[Feb 23, 2022, 11:57:47] EVENT: WAIT ⏎[Feb 23, 2022, 11:57:47] WinCommandAgent: transmitting bypass route to xxx.xxx.xxx.xxx
{
"host" : "xxx.xxx.xxx.xxx",
"ipv6" : false
}
⏎[Feb 23, 2022, 11:57:47] Connecting to [xxx.xxx.xxx.xxx]:xxxxx (xxx.xxx.xxx.xxx) via UDPv4
⏎[Feb 23, 2022, 11:57:47] EVENT: CONNECTING ⏎[Feb 23, 2022, 11:57:47] Tunnel Options:V4,dev-type tun,link-mtu 1521,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client
⏎[Feb 23, 2022, 11:57:47] Creds: UsernameEmpty/PasswordEmpty
⏎[Feb 23, 2022, 11:57:47] Peer Info:
IV_VER=3.git::c2153df1
IV_PLAT=win
IV_NCP=2
IV_TCPNL=1
IV_PROTO=30
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
IV_AUTO_SESS=1
IV_GUI_VER=OCWindows_3.3.2-2475
IV_SSO=openurl,crtext
⏎[Feb 23, 2022, 11:57:47] SSL Handshake: peer certificate: CN=MPDC01, 2048 bit RSA, cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
⏎[Feb 23, 2022, 11:57:47] Session is ACTIVE
⏎[Feb 23, 2022, 11:57:47] EVENT: GET_CONFIG ⏎[Feb 23, 2022, 11:57:47] Sending PUSH_REQUEST to server...
⏎[Feb 23, 2022, 11:57:47] OPTIONS:
0 [route] [10.0.1.0] [255.255.255.0]
1 [dhcp-option] [DNS] [10.3.0.1]
2 [dhcp-option] [WINS] [10.3.0.1]
3 [dhcp-option] [DOMAIN] [xxxxxxxxxxx.local]
4 [route] [10.3.0.1]
5 [topology] [net30]
6 [ping] [10]
7 [ping-restart] [120]
8 [ifconfig] [10.3.0.6] [10.3.0.5]
9 [peer-id] [0]
10 [cipher] [AES-256-GCM]
⏎[Feb 23, 2022, 11:57:47] PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: NONE
key-derivation: OpenVPN PRF
compress: NONE
peer ID: 0
control channel: tls-auth enabled
⏎[Feb 23, 2022, 11:57:47] EVENT: ASSIGN_IP ⏎[Feb 23, 2022, 11:57:47] CAPTURED OPTIONS:
Session Name: xxx.xxx.xxx.xxx
Layer: OSI_LAYER_3
Remote Address: xxx.xxx.xxx.xxx
Tunnel Addresses:
10.3.0.6/30 -> 10.3.0.5 [net30]
Reroute Gateway: IPv4=0 IPv6=0 flags=[ IPv4 ]
Block IPv6: no
Add Routes:
10.0.1.0/24
10.3.0.1/32
Exclude Routes:
DNS Servers:
10.3.0.1
Search Domains:
xxxxxxxxxxx.local
WINS Servers:
10.3.0.1
⏎[Feb 23, 2022, 11:57:48] SetupClient: transmitting tun setup list to \\.\pipe\agent_ovpnconnect
{
"allow_local_dns_resolvers" : false,
"confirm_event" : "f829000000000000",
"destroy_event" : "d02a000000000000",
"tun" :
{
"adapter_domain_suffix" : "",
"add_routes" :
[
{
"address" : "10.0.1.0",
"gateway" : "",
"ipv6" : false,
"metric" : -1,
"net30" : false,
"prefix_length" : 24
},
{
"address" : "10.3.0.1",
"gateway" : "",
"ipv6" : false,
"metric" : -1,
"net30" : false,
"prefix_length" : 32
}
],
"block_ipv6" : false,
"dns_servers" :
[
{
"address" : "10.3.0.1",
"ipv6" : false
}
],
"layer" : 3,
"mtu" : 0,
"remote_address" :
{
"address" : "xxx.xxx.xxx.xxx",
"ipv6" : false
},
"reroute_gw" :
{
"flags" : 256,
"ipv4" : false,
"ipv6" : false
},
"route_metric_default" : -1,
"search_domains" :
[
{
"domain" : "xxxxxxxxxxx.local"
}
],
"session_name" : "xxx.xxx.xxx.xxx",
"tunnel_address_index_ipv4" : 0,
"tunnel_address_index_ipv6" : -1,
"tunnel_addresses" :
[
{
"address" : "10.3.0.6",
"gateway" : "10.3.0.5",
"ipv6" : false,
"metric" : -1,
"net30" : true,
"prefix_length" : 30
}
],
"wins_servers" :
[
{
"address" : "10.3.0.1"
}
]
},
"wintun" : false
}
POST np://[\\.\pipe\agent_ovpnconnect]/tun-setup : 200 OK
TAP ADAPTERS:
guid='{1E009FCB-5DE8-4225-BB78-D866E76763A8}' index=3 name='Local Area Connection'
Open TAP device "Local Area Connection" PATH="\\.\Global\{1E009FCB-5DE8-4225-BB78-D866E76763A8}.tap" SUCCEEDED
TAP-Windows Driver Version 9.24
ActionDeleteAllRoutesOnInterface iface_index=3
netsh interface ip set interface 3 metric=1
Ok.
netsh interface ip set address 3 static 10.3.0.6 255.255.255.252 gateway=10.3.0.5 store=active
IPHelper: add route 10.0.1.0/24 3 10.3.0.5 metric=-1
IPHelper: add route 10.3.0.1/32 3 10.3.0.5 metric=-1
NRPT::ActionCreate names=[.xxxxxxxxxxx.local] dns_servers=[10.3.0.1]
netsh interface ip set winsservers 3 static 10.3.0.1
ipconfig /flushdns
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
TAP: ARP flush succeeded
TAP handle: 902a000000000000
⏎[Feb 23, 2022, 11:57:48] Connected via TUN_WIN
⏎[Feb 23, 2022, 11:57:48] EVENT: CONNECTED xxx.xxx.xxx.xxx:xxxxx (xxx.xxx.xxx.xxx) via /UDPv4 on TUN_WIN/10.3.0.6/ gw=[10.3.0.5/]⏎[Feb 23, 2022, 12:00:54] SetupClient: signaling tun destroy event
⏎[Feb 23, 2022, 12:00:54] EVENT: DISCONNECTED ⏎[Feb 23, 2022, 12:05:07] OpenVPN core 3.git::c2153df1 win x86_64 64-bit built on Oct 6 2021 14:20:53
⏎[Feb 23, 2022, 12:05:07] Frame=512/2048/512 mssfix-ctrl=1250
⏎[Feb 23, 2022, 12:05:07] UNUSED OPTIONS
4 [resolv-retry] [infinite]
5 [nobind]
6 [persist-key]
7 [persist-tun]
15 [verb] [3]
⏎[Feb 23, 2022, 12:05:07] EVENT: RESOLVE ⏎[Feb 23, 2022, 12:05:07] Contacting xxx.xxx.xxx.xxx:xxxxx via UDP
⏎[Feb 23, 2022, 12:05:07] EVENT: WAIT ⏎[Feb 23, 2022, 12:05:07] WinCommandAgent: transmitting bypass route to xxx.xxx.xxx.xxx
{
"host" : "xxx.xxx.xxx.xxx",
"ipv6" : false
}
⏎[Feb 23, 2022, 12:05:07] Connecting to [xxx.xxx.xxx.xxx]:xxxxx (xxx.xxx.xxx.xxx) via UDPv4
⏎[Feb 23, 2022, 12:05:07] EVENT: CONNECTING ⏎[Feb 23, 2022, 12:05:07] Tunnel Options:V4,dev-type tun,link-mtu 1521,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client
⏎[Feb 23, 2022, 12:05:07] Creds: UsernameEmpty/PasswordEmpty
⏎[Feb 23, 2022, 12:05:07] Peer Info:
IV_VER=3.git::c2153df1
IV_PLAT=win
IV_NCP=2
IV_TCPNL=1
IV_PROTO=30
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
IV_AUTO_SESS=1
IV_GUI_VER=OCWindows_3.3.2-2475
IV_SSO=openurl,crtext
⏎[Feb 23, 2022, 12:05:07] SSL Handshake: peer certificate: CN=MPDC01, 2048 bit RSA, cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
⏎[Feb 23, 2022, 12:05:07] Session is ACTIVE
⏎[Feb 23, 2022, 12:05:07] EVENT: GET_CONFIG ⏎[Feb 23, 2022, 12:05:07] Sending PUSH_REQUEST to server...
⏎[Feb 23, 2022, 12:05:07] OPTIONS:
0 [route] [10.0.1.0] [255.255.255.0]
1 [dhcp-option] [DNS] [10.3.0.1]
2 [dhcp-option] [WINS] [10.3.0.1]
3 [dhcp-option] [DOMAIN] [xxxxxxxxxxx.local]
4 [route] [10.3.0.1]
5 [topology] [net30]
6 [ping] [10]
7 [ping-restart] [120]
8 [ifconfig] [10.3.0.6] [10.3.0.5]
9 [peer-id] [0]
10 [cipher] [AES-256-GCM]
⏎[Feb 23, 2022, 12:05:07] PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: NONE
key-derivation: OpenVPN PRF
compress: NONE
peer ID: 0
control channel: tls-auth enabled
⏎[Feb 23, 2022, 12:05:07] EVENT: ASSIGN_IP ⏎[Feb 23, 2022, 12:05:07] CAPTURED OPTIONS:
Session Name: xxx.xxx.xxx.xxx
Layer: OSI_LAYER_3
Remote Address: xxx.xxx.xxx.xxx
Tunnel Addresses:
10.3.0.6/30 -> 10.3.0.5 [net30]
Reroute Gateway: IPv4=0 IPv6=0 flags=[ IPv4 ]
Block IPv6: no
Add Routes:
10.0.1.0/24
10.3.0.1/32
Exclude Routes:
DNS Servers:
10.3.0.1
Search Domains:
xxxxxxxxxxx.local
WINS Servers:
10.3.0.1
⏎[Feb 23, 2022, 12:05:08] SetupClient: transmitting tun setup list to \\.\pipe\agent_ovpnconnect
{
"allow_local_dns_resolvers" : false,
"confirm_event" : "9c29000000000000",
"destroy_event" : "042b000000000000",
"tun" :
{
"adapter_domain_suffix" : "",
"add_routes" :
[
{
"address" : "10.0.1.0",
"gateway" : "",
"ipv6" : false,
"metric" : -1,
"net30" : false,
"prefix_length" : 24
},
{
"address" : "10.3.0.1",
"gateway" : "",
"ipv6" : false,
"metric" : -1,
"net30" : false,
"prefix_length" : 32
}
],
"block_ipv6" : false,
"dns_servers" :
[
{
"address" : "10.3.0.1",
"ipv6" : false
}
],
"layer" : 3,
"mtu" : 0,
"remote_address" :
{
"address" : "xxx.xxx.xxx.xxx",
"ipv6" : false
},
"reroute_gw" :
{
"flags" : 256,
"ipv4" : false,
"ipv6" : false
},
"route_metric_default" : -1,
"search_domains" :
[
{
"domain" : "xxxxxxxxxxx.local"
}
],
"session_name" : "xxx.xxx.xxx.xxx",
"tunnel_address_index_ipv4" : 0,
"tunnel_address_index_ipv6" : -1,
"tunnel_addresses" :
[
{
"address" : "10.3.0.6",
"gateway" : "10.3.0.5",
"ipv6" : false,
"metric" : -1,
"net30" : true,
"prefix_length" : 30
}
],
"wins_servers" :
[
{
"address" : "10.3.0.1"
}
]
},
"wintun" : false
}
POST np://[\\.\pipe\agent_ovpnconnect]/tun-setup : 200 OK
TAP ADAPTERS:
guid='{1E009FCB-5DE8-4225-BB78-D866E76763A8}' index=3 name='Local Area Connection'
Open TAP device "Local Area Connection" PATH="\\.\Global\{1E009FCB-5DE8-4225-BB78-D866E76763A8}.tap" SUCCEEDED
TAP-Windows Driver Version 9.24
ActionDeleteAllRoutesOnInterface iface_index=3
netsh interface ip set interface 3 metric=1
Ok.
netsh interface ip set address 3 static 10.3.0.6 255.255.255.252 gateway=10.3.0.5 store=active
IPHelper: add route 10.0.1.0/24 3 10.3.0.5 metric=-1
IPHelper: add route 10.3.0.1/32 3 10.3.0.5 metric=-1
NRPT::ActionCreate names=[.xxxxxxxxxxx.local] dns_servers=[10.3.0.1]
netsh interface ip set winsservers 3 static 10.3.0.1
ipconfig /flushdns
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
TAP: ARP flush succeeded
TAP handle: 582a000000000000
⏎[Feb 23, 2022, 12:05:08] Connected via TUN_WIN
⏎[Feb 23, 2022, 12:05:08] EVENT: CONNECTED xxx.xxx.xxx.xxx:xxxxx (xxx.xxx.xxx.xxx) via /UDPv4 on TUN_WIN/10.3.0.6/ gw=[10.3.0.5/]⏎[Feb 23, 2022, 12:05:41] SetupClient: signaling tun destroy event
⏎[Feb 23, 2022, 12:05:41] EVENT: DISCONNECTED ⏎