port 1194
proto udp
dev tun
ca MAIN-ca.crt
cert MAIN-server.crt
key MAIN-server.key
dh MAIN-dh1024.pem
server 10.8.8.0 255.255.255.0
ifconfig-pool-persist ipp.txt
keepalive 10 120
comp-lzo
persist-key
persist-tun
status openvpn-status.log
verb 4
client
dev tap
proto udp
remote kontor.MAIN.se 1194
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca-MAIN.crt
cert MAIN-sam.crt
key MAIN-sam.key
remote-cert-tls server
comp-lzo
verb 4
Yes, I see here I have mixed TAP and TUN in the configs... Strange. Could this ever have worked?... If not I must have grabbed the wrong config-file from the Client...
Your logs show the same error so I expect you "grabbed" the config file which is in use. Now you know why that does not work, what happens if resolve the device type ?
As you can see, some clients are connected, but I have the log for one, my test client:
MAIN-sam: 10.8.8.10
Server at: 10.8.8.1
As I understand the client gets the IP from DHCP 10.8.8.2.
The openvpn-status on server tells me I have several clients including my test client connected.
All seems to be ok until I try to communicate (ping 10.8.8.1 from client = fail). Browsing SMB = fail...
Your openvpn logs show no problems have been encountered.
As your server is windows and you are using --proto udp I presume you are reasonably familiar with windows firewall (You must have created a firewall rule to allow incoming UDP packets for the VPN session). Now create a firewall rule on both server and client to allow all packets over your VPN subnet 10.8.8.0/24
Thanks for having someone to discuss my thoughts with...
As you said the logs seem to be ok.
The first thing I did when I got the problem was to disable the Windows Firewall temporarily. It didn't work, but I had the mix of TAP / TUN in the misconfigured client!.. So actually I did not test without the Firewall when I posted my last logs.
Disabling the firewall on the server-side "solved" the issue.
I'll reconfigure the FW and then I'll be happy!...
But I have not solved that part yet (have UDP on port 1194 allowed)... But now I know where to look!
(please provide as much detail as you can for the many other people reading this thread)
For you, disabling the server firewall allows you to ping the server from the client over the VPN subnet and you are using Windows 10 Redstone, anniversary update 1607 on the server ?
I solved it now...
First I have updated to latest version of OpenVPN (probably not the problem, but I did it to try and the old was a year old).
I run the server on a Windows 10 1607 machine. The only things is to make some SMB share on that machine available over VPN.
Firewall had openvpn.exe allowed to use (UDP on 1194). Router is have port forwarding to the W10 machine also as is should.
Windows Firewall was the problem, the update have re-configured the File and Printer sharing default rules in Windows Firewall. I know I have changed these settings when I initially set this up.
So I have to put back the settings to include not only local lan in the rules (Remote IP-address), but also the VPN adapter. I just set ALL IP's, because its just these two interfaces.
I can also confirm: The 1607 Update didn't brake anything on the clients, only server-side.
Tue Nov 22 16:23:43 2016 us=556026 Current Parameter Settings:
Tue Nov 22 16:23:43 2016 us=556026 config = 'client.ovpn'
Tue Nov 22 16:23:43 2016 us=556026 mode = 0
Tue Nov 22 16:23:43 2016 us=556026 show_ciphers = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 show_digests = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 show_engines = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 genkey = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 key_pass_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 show_tls_ciphers = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 Connection profiles [default]:
Tue Nov 22 16:23:43 2016 us=556026 proto = udp
Tue Nov 22 16:23:43 2016 us=556026 local = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 local_port = 0
Tue Nov 22 16:23:43 2016 us=556026 remote = 'XXX'
Tue Nov 22 16:23:43 2016 us=556026 remote_port = 1195
Tue Nov 22 16:23:43 2016 us=556026 remote_float = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 bind_defined = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 bind_local = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 connect_retry_seconds = 5
Tue Nov 22 16:23:43 2016 us=556026 connect_timeout = 10
Tue Nov 22 16:23:43 2016 us=556026 connect_retry_max = 0
Tue Nov 22 16:23:43 2016 us=556026 socks_proxy_server = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 socks_proxy_port = 0
Tue Nov 22 16:23:43 2016 us=556026 socks_proxy_retry = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 tun_mtu = 1500
Tue Nov 22 16:23:43 2016 us=556026 tun_mtu_defined = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 link_mtu = 1500
Tue Nov 22 16:23:43 2016 us=556026 link_mtu_defined = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 tun_mtu_extra = 32
Tue Nov 22 16:23:43 2016 us=556026 tun_mtu_extra_defined = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 mtu_discover_type = -1
Tue Nov 22 16:23:43 2016 us=556026 fragment = 0
Tue Nov 22 16:23:43 2016 us=556026 mssfix = 1450
Tue Nov 22 16:23:43 2016 us=556026 explicit_exit_notification = 0
Tue Nov 22 16:23:43 2016 us=556026 Connection profiles END
Tue Nov 22 16:23:43 2016 us=556026 remote_random = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 ipchange = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 dev = 'tap'
Tue Nov 22 16:23:43 2016 us=556026 dev_type = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 dev_node = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 lladdr = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 topology = 1
Tue Nov 22 16:23:43 2016 us=556026 tun_ipv6 = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_local = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_remote_netmask = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_noexec = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_nowarn = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_ipv6_local = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_ipv6_netbits = 0
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_ipv6_remote = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 shaper = 0
Tue Nov 22 16:23:43 2016 us=556026 mtu_test = 0
Tue Nov 22 16:23:43 2016 us=556026 mlock = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 keepalive_ping = 0
Tue Nov 22 16:23:43 2016 us=556026 keepalive_timeout = 0
Tue Nov 22 16:23:43 2016 us=556026 inactivity_timeout = 0
Tue Nov 22 16:23:43 2016 us=556026 ping_send_timeout = 0
Tue Nov 22 16:23:43 2016 us=556026 ping_rec_timeout = 0
Tue Nov 22 16:23:43 2016 us=556026 ping_rec_timeout_action = 0
Tue Nov 22 16:23:43 2016 us=556026 ping_timer_remote = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 remap_sigusr1 = 0
Tue Nov 22 16:23:43 2016 us=556026 persist_tun = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 persist_local_ip = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 persist_remote_ip = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 persist_key = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 passtos = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 resolve_retry_seconds = 1000000000
Tue Nov 22 16:23:43 2016 us=556026 username = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 groupname = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 chroot_dir = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 cd_dir = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 writepid = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 up_script = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 down_script = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 down_pre = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 up_restart = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 up_delay = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 daemon = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 inetd = 0
Tue Nov 22 16:23:43 2016 us=556026 log = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 suppress_timestamps = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 nice = 0
Tue Nov 22 16:23:43 2016 us=556026 verbosity = 4
Tue Nov 22 16:23:43 2016 us=556026 mute = 0
Tue Nov 22 16:23:43 2016 us=556026 gremlin = 0
Tue Nov 22 16:23:43 2016 us=556026 status_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 status_file_version = 1
Tue Nov 22 16:23:43 2016 us=556026 status_file_update_freq = 60
Tue Nov 22 16:23:43 2016 us=556026 occ = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 rcvbuf = 0
Tue Nov 22 16:23:43 2016 us=556026 sndbuf = 0
Tue Nov 22 16:23:43 2016 us=556026 sockflags = 0
Tue Nov 22 16:23:43 2016 us=556026 fast_io = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 lzo = 7
Tue Nov 22 16:23:43 2016 us=556026 route_script = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 route_default_gateway = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 route_default_metric = 0
Tue Nov 22 16:23:43 2016 us=556026 route_noexec = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 route_delay = 5
Tue Nov 22 16:23:43 2016 us=556026 route_delay_window = 30
Tue Nov 22 16:23:43 2016 us=556026 route_delay_defined = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 route_nopull = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 route_gateway_via_dhcp = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 max_routes = 100
Tue Nov 22 16:23:43 2016 us=556026 allow_pull_fqdn = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 management_addr = '127.0.0.1'
Tue Nov 22 16:23:43 2016 us=556026 management_port = 25340
Tue Nov 22 16:23:43 2016 us=556026 management_user_pass = 'stdin'
Tue Nov 22 16:23:43 2016 us=556026 management_log_history_cache = 250
Tue Nov 22 16:23:43 2016 us=556026 management_echo_buffer_size = 100
Tue Nov 22 16:23:43 2016 us=556026 management_write_peer_info_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 management_client_user = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 management_client_group = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 management_flags = 6
Tue Nov 22 16:23:43 2016 us=556026 shared_secret_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 key_direction = 2
Tue Nov 22 16:23:43 2016 us=556026 ciphername_defined = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 ciphername = 'AES-256-CBC'
Tue Nov 22 16:23:43 2016 us=556026 authname_defined = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 authname = 'SHA1'
Tue Nov 22 16:23:43 2016 us=556026 prng_hash = 'SHA1'
Tue Nov 22 16:23:43 2016 us=556026 prng_nonce_secret_len = 16
Tue Nov 22 16:23:43 2016 us=556026 keysize = 0
Tue Nov 22 16:23:43 2016 us=556026 engine = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 replay = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 mute_replay_warnings = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 replay_window = 64
Tue Nov 22 16:23:43 2016 us=556026 replay_time = 15
Tue Nov 22 16:23:43 2016 us=556026 packet_id_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 use_iv = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 test_crypto = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 tls_server = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 tls_client = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 key_method = 2
Tue Nov 22 16:23:43 2016 us=556026 ca_file = 'ca.crt'
Tue Nov 22 16:23:43 2016 us=556026 ca_path = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 dh_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 cert_file = 'lberteau.crt'
Tue Nov 22 16:23:43 2016 us=556026 extra_certs_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 priv_key_file = 'lberteau.key'
Tue Nov 22 16:23:43 2016 us=556026 pkcs12_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 cryptoapi_cert = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 cipher_list = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 tls_verify = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 tls_export_cert = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 verify_x509_type = 0
Tue Nov 22 16:23:43 2016 us=556026 verify_x509_name = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 crl_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 ns_cert_type = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_ku[i] = 0
Tue Nov 22 16:23:43 2016 us=556026 remote_cert_eku = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 ssl_flags = 0
Tue Nov 22 16:23:43 2016 us=556026 tls_timeout = 2
Tue Nov 22 16:23:43 2016 us=556026 renegotiate_bytes = -1
Tue Nov 22 16:23:43 2016 us=556026 renegotiate_packets = 0
Tue Nov 22 16:23:43 2016 us=556026 renegotiate_seconds = 3600
Tue Nov 22 16:23:43 2016 us=556026 handshake_window = 60
Tue Nov 22 16:23:43 2016 us=556026 transition_window = 3600
Tue Nov 22 16:23:43 2016 us=556026 single_session = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 push_peer_info = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 tls_exit = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 tls_auth_file = 'ta.key'
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_protected_authentication = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_private_mode = 00000000
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_cert_private = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_pin_cache_period = -1
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_id = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 pkcs11_id_management = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 server_network = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 server_netmask = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 server_network_ipv6 = ::
Tue Nov 22 16:23:43 2016 us=556026 server_netbits_ipv6 = 0
Tue Nov 22 16:23:43 2016 us=556026 server_bridge_ip = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 server_bridge_netmask = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 server_bridge_pool_start = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 server_bridge_pool_end = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_pool_defined = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_pool_start = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_pool_end = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_pool_netmask = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_pool_persist_filename = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_pool_persist_refresh_freq = 600
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_ipv6_pool_defined = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_ipv6_pool_base = ::
Tue Nov 22 16:23:43 2016 us=556026 ifconfig_ipv6_pool_netbits = 0
Tue Nov 22 16:23:43 2016 us=556026 n_bcast_buf = 256
Tue Nov 22 16:23:43 2016 us=556026 tcp_queue_limit = 64
Tue Nov 22 16:23:43 2016 us=556026 real_hash_size = 256
Tue Nov 22 16:23:43 2016 us=556026 virtual_hash_size = 256
Tue Nov 22 16:23:43 2016 us=556026 client_connect_script = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 learn_address_script = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 client_disconnect_script = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 client_config_dir = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 ccd_exclusive = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 tmp_dir = 'C:\Users\laure\AppData\Local\Temp\'
Tue Nov 22 16:23:43 2016 us=556026 push_ifconfig_defined = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 push_ifconfig_local = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 push_ifconfig_remote_netmask = 0.0.0.0
Tue Nov 22 16:23:43 2016 us=556026 push_ifconfig_ipv6_defined = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 push_ifconfig_ipv6_local = ::/0
Tue Nov 22 16:23:43 2016 us=556026 push_ifconfig_ipv6_remote = ::
Tue Nov 22 16:23:43 2016 us=556026 enable_c2c = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 duplicate_cn = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 cf_max = 0
Tue Nov 22 16:23:43 2016 us=556026 cf_per = 0
Tue Nov 22 16:23:43 2016 us=556026 max_clients = 1024
Tue Nov 22 16:23:43 2016 us=556026 max_routes_per_client = 256
Tue Nov 22 16:23:43 2016 us=556026 auth_user_pass_verify_script = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 auth_user_pass_verify_script_via_file = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 client = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 pull = ENABLED
Tue Nov 22 16:23:43 2016 us=556026 auth_user_pass_file = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 show_net_up = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 route_method = 0
Tue Nov 22 16:23:43 2016 us=556026 block_outside_dns = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 ip_win32_defined = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 ip_win32_type = 3
Tue Nov 22 16:23:43 2016 us=556026 dhcp_masq_offset = 0
Tue Nov 22 16:23:43 2016 us=556026 dhcp_lease_time = 31536000
Tue Nov 22 16:23:43 2016 us=556026 tap_sleep = 0
Tue Nov 22 16:23:43 2016 us=556026 dhcp_options = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 dhcp_renew = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 dhcp_pre_release = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 dhcp_release = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 domain = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 netbios_scope = '[UNDEF]'
Tue Nov 22 16:23:43 2016 us=556026 netbios_node_type = 0
Tue Nov 22 16:23:43 2016 us=556026 disable_nbt = DISABLED
Tue Nov 22 16:23:43 2016 us=556026 OpenVPN 2.3.13 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Nov 3 2016
Tue Nov 22 16:23:43 2016 us=556026 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Nov 22 16:23:43 2016 us=556026 library versions: OpenSSL 1.0.1u 22 Sep 2016, LZO 2.09
Enter Management Password:
Tue Nov 22 16:23:43 2016 us=556026 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Tue Nov 22 16:23:43 2016 us=556026 Need hold release from management interface, waiting...
Tue Nov 22 16:23:44 2016 us=39975 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Tue Nov 22 16:23:44 2016 us=155744 MANAGEMENT: CMD 'state on'
Tue Nov 22 16:23:44 2016 us=155744 MANAGEMENT: CMD 'log all on'
Tue Nov 22 16:23:44 2016 us=372360 MANAGEMENT: CMD 'hold off'
Tue Nov 22 16:23:44 2016 us=372360 MANAGEMENT: CMD 'hold release'
Tue Nov 22 16:23:44 2016 us=372360 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Nov 22 16:23:44 2016 us=557043 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
Tue Nov 22 16:23:44 2016 us=557043 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Nov 22 16:23:44 2016 us=557043 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Nov 22 16:23:44 2016 us=557043 LZO compression initialized
Tue Nov 22 16:23:44 2016 us=557043 Control Channel MTU parms [ L:1590 D:1184 EF:66 EB:0 ET:0 EL:3 ]
Tue Nov 22 16:23:44 2016 us=557043 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Nov 22 16:23:44 2016 us=557043 MANAGEMENT: >STATE:1479828224,RESOLVE,,,
Tue Nov 22 16:23:44 2016 us=610434 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:143 ET:32 EL:3 AF:3/1 ]
Tue Nov 22 16:23:44 2016 us=610434 Local Options String: 'V4,dev-type tap,link-mtu 1590,tun-mtu 1532,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Tue Nov 22 16:23:44 2016 us=610434 Expected Remote Options String: 'V4,dev-type tap,link-mtu 1590,tun-mtu 1532,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Tue Nov 22 16:23:44 2016 us=610434 Local Options hash (VER=V4): '48527533'
Tue Nov 22 16:23:44 2016 us=610434 Expected Remote Options hash (VER=V4): '44bd8b5e'
Tue Nov 22 16:23:44 2016 us=610434 UDPv4 link local: [undef]
Tue Nov 22 16:23:44 2016 us=610434 UDPv4 link remote: [AF_INET]XXX.XXX.XXX.XXX:1195
Tue Nov 22 16:23:44 2016 us=610434 MANAGEMENT: >STATE:1479828224,WAIT,,,
Tue Nov 22 16:23:44 2016 us=688558 MANAGEMENT: >STATE:1479828224,AUTH,,,
Tue Nov 22 16:23:44 2016 us=688558 TLS: Initial packet from [AF_INET]XXX.XXX.XXX.XXX:1195, sid=ecd77894 571ab298
Tue Nov 22 16:23:44 2016 us=825722 VERIFY OK: depth=1, XXX
Tue Nov 22 16:23:44 2016 us=841346 VERIFY OK: depth=0, XXX
Tue Nov 22 16:23:45 2016 us=56861 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Tue Nov 22 16:23:45 2016 us=56861 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Nov 22 16:23:45 2016 us=56861 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Tue Nov 22 16:23:45 2016 us=56861 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Nov 22 16:23:45 2016 us=56861 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Tue Nov 22 16:23:45 2016 us=56861 [landroval] Peer Connection Initiated with [AF_INET]XXX.XXX.XXX.XXX:1195
Tue Nov 22 16:23:46 2016 us=395721 MANAGEMENT: >STATE:1479828226,GET_CONFIG,,,
Tue Nov 22 16:23:47 2016 us=558501 SENT CONTROL [landroval]: 'PUSH_REQUEST' (status=1)
Tue Nov 22 16:23:47 2016 us=630385 PUSH: Received control message: 'PUSH_REPLY,route 192.168.64.0 255.255.255.0,dhcp-option DNS 192.168.64.250,route-gateway 192.168.64.247,ping 10,ping-restart 120,ifconfig 192.168.64.100 255.255.255.0'
Tue Nov 22 16:23:47 2016 us=630385 OPTIONS IMPORT: timers and/or timeouts modified
Tue Nov 22 16:23:47 2016 us=630385 OPTIONS IMPORT: --ifconfig/up options modified
Tue Nov 22 16:23:47 2016 us=630385 OPTIONS IMPORT: route options modified
Tue Nov 22 16:23:47 2016 us=630385 OPTIONS IMPORT: route-related options modified
Tue Nov 22 16:23:47 2016 us=630385 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Nov 22 16:23:47 2016 us=630385 ROUTE_GATEWAY 192.168.0.254/255.255.255.0 I=3 HWADDR=00:26:9e:33:6c:37
Tue Nov 22 16:23:47 2016 us=630385 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Nov 22 16:23:47 2016 us=630385 MANAGEMENT: >STATE:1479828227,ASSIGN_IP,,192.168.64.100,
Tue Nov 22 16:23:47 2016 us=630385 open_tun, tt->ipv6=0
Tue Nov 22 16:23:47 2016 us=630385 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D7559976-1D08-41B9-A78D-B96847B05917}.tap
Tue Nov 22 16:23:47 2016 us=630385 TAP-Windows Driver Version 9.21
Tue Nov 22 16:23:47 2016 us=630385 TAP-Windows MTU=1500
Tue Nov 22 16:23:47 2016 us=630385 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.64.100/255.255.255.0 on interface {D7559976-1D08-41B9-A78D-B96847B05917} [DHCP-serv: 192.168.64.0, lease-time: 31536000]
Tue Nov 22 16:23:47 2016 us=630385 DHCP option string: 0604c0a8 40fa
Tue Nov 22 16:23:47 2016 us=630385 Successful ARP Flush on interface [7] {D7559976-1D08-41B9-A78D-B96847B05917}
Tue Nov 22 16:23:52 2016 us=250167 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
Tue Nov 22 16:23:52 2016 us=250167 Route: Waiting for TUN/TAP interface to come up...
Tue Nov 22 16:23:57 2016 us=411202 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
Tue Nov 22 16:23:57 2016 us=411202 Route: Waiting for TUN/TAP interface to come up...
Tue Nov 22 16:23:58 2016 us=131083 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
Tue Nov 22 16:23:58 2016 us=131083 Route: Waiting for TUN/TAP interface to come up...
Tue Nov 22 16:23:59 2016 us=301492 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
Tue Nov 22 16:23:59 2016 us=301492 Route: Waiting for TUN/TAP interface to come up...
Tue Nov 22 16:24:00 2016 us=77758 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
Tue Nov 22 16:24:00 2016 us=77758 Route: Waiting for TUN/TAP interface to come up...
Tue Nov 22 16:24:01 2016 us=7070 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Tue Nov 22 16:24:01 2016 us=7070 MANAGEMENT: >STATE:1479828241,ADD_ROUTES,,,
Tue Nov 22 16:24:01 2016 us=7569 C:\WINDOWS\system32\route.exe ADD 192.168.64.0 MASK 255.255.255.0 192.168.64.247
Tue Nov 22 16:24:01 2016 us=10569 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Tue Nov 22 16:24:01 2016 us=10569 Route addition via IPAPI succeeded [adaptive]
Tue Nov 22 16:24:01 2016 us=10569 Initialization Sequence Completed
Tue Nov 22 16:24:01 2016 us=10569 MANAGEMENT: >STATE:1479828241,CONNECTED,SUCCESS,192.168.64.100,XXX.XXX.XXX.XXX
Symptom still the same :
Windows 1511 client side : everything works fine, client has access to server's local network 192.168.64.0
Windows 1607 client side : client has only access to server host (192.168.64.247), but cannot ping any other machine in server's local network 192.168.64.0
Thus so far we are forced to stay with Windows 1511 client side.
The Manual wrote:or the IP/netmask of the default gateway/router on the bridged subnet
Which is what I would use ..
Unfortunately changing the gateway of server-bridge didn't corrected anything.
As said previously, the problem seems to be client side, depending on the windows 10 version.
May be this is not the right forum section for such isssues. If not, could you please provide me the link to the correct forum section ?