problem with kali linux

Need help configuring your VPN? Just post here and you'll get that help.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
halas
OpenVpn Newbie
Posts: 1
Joined: Thu Mar 02, 2023 6:50 pm

problem with kali linux

Post by halas » Thu Mar 02, 2023 7:06 pm

hello everyone!
I tried many times to connect openvpn through kali (for tryhackme) and it says in the terminal that it failed to open tun/tap interface and another failed massages as you can see below.

2023-03-02 14:01:48 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305). OpenVPN ignores --cipher for cipher negotiations.
2023-03-02 14:01:48 Note: Kernel support for ovpn-dco missing, disabling data channel offload.
2023-03-02 14:01:48 OpenVPN 2.6.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-03-02 14:01:48 library versions: OpenSSL 3.0.7 1 Nov 2022, LZO 2.10
2023-03-02 14:01:48 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
2023-03-02 14:01:48 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
2023-03-02 14:01:48 TCP/UDP: Preserving recently used remote address: [AF_INET]18.202.168.160:1194
2023-03-02 14:01:48 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-03-02 14:01:48 UDPv4 link local: (not bound)
2023-03-02 14:01:48 UDPv4 link remote: [AF_INET]18.202.168.160:1194
2023-03-02 14:01:48 TLS: Initial packet from [AF_INET]18.202.168.160:1194, sid=a93a86a1 3daa26fa
2023-03-02 14:01:48 VERIFY OK: depth=1, CN=ChangeMe
2023-03-02 14:01:48 VERIFY KU OK
2023-03-02 14:01:48 Validating certificate extended key usage
2023-03-02 14:01:48 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-02 14:01:48 VERIFY EKU OK
2023-03-02 14:01:48 VERIFY OK: depth=0, CN=server
2023-03-02 14:01:48 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-03-02 14:01:48 [server] Peer Connection Initiated with [AF_INET]18.202.168.160:1194
2023-03-02 14:01:48 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2023-03-02 14:01:48 TLS: tls_multi_process: initial untrusted session promoted to trusted
2023-03-02 14:01:49 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
2023-03-02 14:01:50 PUSH: Received control message: 'PUSH_REPLY,route 10.10.0.0 255.255.0.0,route-metric 1000,route-gateway 10.18.0.1,topology subnet,ping 5,ping-restart 120,ifconfig 10.18.116.82 255.255.128.0,peer-id 281'
2023-03-02 14:01:50 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-02 14:01:50 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-02 14:01:50 OPTIONS IMPORT: route options modified
2023-03-02 14:01:50 OPTIONS IMPORT: route-related options modified
2023-03-02 14:01:50 OPTIONS IMPORT: peer-id set
2023-03-02 14:01:50 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-256-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2023-03-02 14:01:50 ERROR: Failed to apply push options
2023-03-02 14:01:50 Failed to open tun/tap interface
2023-03-02 14:01:50 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2023-03-02 14:01:50 Restart pause, 1 second(s)

and it keep going until i cancel it.
I hope someone can help me solve it.

Post Reply