I'm sure this is something simple, which explains why I can't see it, but I can't get OpenVPN to work with Windows Server 2012 R2 and a Windows 8.1 client. Here are the configurations:
proto udp
dev tun
ca ca.crt
cert WIN-CRHH9BLMSUF.crt
key WIN-CRHH9BLMSUF.key
dh dh1024.pem
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
keepalive 10 60
persist-key
persist-tun
status openvpn-status.log
verb 3
dev tun
proto udp
remote -Dynamic DNS name for server here- 1194
resolv-retry infinite
nobind
user nobody
group nobody
persist-key
persist-tun
ca ca.crt
cert jlenker-lt01.crt
key jlenker-lt01.key
remote-cert-tls server
#tls-auth /etc/openvpn/ta.key 1
verb 3
My goal is to connect this Windows 8.1 client, then to connect a client (using a new client cert of course) running Mac OSX and a utility like TunnelBlick. Thanks in advance for any help.
Client log (partial):
Tue Dec 06 22:48:50 2016 ROUTE_GATEWAY 192.168.4.1/255.255.252.0 I=3 HWADDR=c8:f7:33:8f:e0:2b
Tue Dec 06 22:48:50 2016 MANAGEMENT: Client disconnected
Tue Dec 06 22:48:50 2016 There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.
Tue Dec 06 22:48:50 2016 Exiting due to fatal error
Could this be as simple as creating a TAP adapter on the client? Unfortunately I don't know what that is ...
Server log when attempting to connect is below. I have no idea why there is an error log using a netgear cert issuer.
Tue Dec 06 22:47:30 2016 OpenVPN 2.3.13 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Nov 3 2016
Tue Dec 06 22:47:30 2016 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Dec 06 22:47:30 2016 library versions: OpenSSL 1.0.1u 22 Sep 2016, LZO 2.09
Enter Management Password:
Tue Dec 06 22:47:30 2016 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25343
Tue Dec 06 22:47:30 2016 Need hold release from management interface, waiting...
Tue Dec 06 22:47:30 2016 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25343
Tue Dec 06 22:47:30 2016 MANAGEMENT: CMD 'state on'
Tue Dec 06 22:47:30 2016 MANAGEMENT: CMD 'log all on'
Tue Dec 06 22:47:30 2016 MANAGEMENT: CMD 'hold off'
Tue Dec 06 22:47:30 2016 MANAGEMENT: CMD 'hold release'
Tue Dec 06 22:47:30 2016 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Tue Dec 06 22:47:31 2016 Diffie-Hellman initialized with 1024 bit key
Tue Dec 06 22:47:31 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Dec 06 22:47:31 2016 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=d8:cb:8a:43:bf:1c
Tue Dec 06 22:47:31 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Dec 06 22:47:31 2016 MANAGEMENT: >STATE:1481082451,ASSIGN_IP,,10.8.0.1,
Tue Dec 06 22:47:31 2016 open_tun, tt->ipv6=0
Tue Dec 06 22:47:31 2016 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{11819E4A-25E7-4EF9-BE91-41BACF981AB6}.tap
Tue Dec 06 22:47:31 2016 TAP-Windows Driver Version 9.21
Tue Dec 06 22:47:31 2016 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.1/255.255.255.252 on interface {11819E4A-25E7-4EF9-BE91-41BACF981AB6} [DHCP-serv: 10.8.0.2, lease-time: 31536000]
Tue Dec 06 22:47:31 2016 Sleeping for 10 seconds...
Tue Dec 06 22:47:41 2016 Successful ARP Flush on interface [17] {11819E4A-25E7-4EF9-BE91-41BACF981AB6}
Tue Dec 06 22:47:41 2016 MANAGEMENT: >STATE:1481082461,ADD_ROUTES,,,
Tue Dec 06 22:47:41 2016 C:\Windows\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.2
Tue Dec 06 22:47:41 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Dec 06 22:47:41 2016 Route addition via IPAPI succeeded [adaptive]
Tue Dec 06 22:47:41 2016 UDPv4 link local (bound): [undef]
Tue Dec 06 22:47:41 2016 UDPv4 link remote: [undef]
Tue Dec 06 22:47:41 2016 MULTI: multi_init called, r=256 v=256
Tue Dec 06 22:47:41 2016 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Tue Dec 06 22:47:41 2016 ifconfig_pool_read(), in='jlenker-lt01,10.8.0.4', TODO: IPv6
Tue Dec 06 22:47:41 2016 succeeded -> ifconfig_pool_set()
Tue Dec 06 22:47:41 2016 IFCONFIG POOL LIST
Tue Dec 06 22:47:41 2016 jlenker-lt01,10.8.0.4
Tue Dec 06 22:47:41 2016 Initialization Sequence Completed
Tue Dec 06 22:47:41 2016 MANAGEMENT: >STATE:1481082461,CONNECTED,SUCCESS,10.8.0.1,
Tue Dec 06 22:47:46 2016 75.176.148.87:49581 TLS: Initial packet from [AF_INET]75.176.148.87:49581, sid=21725bdb c68e14e5
Tue Dec 06 22:47:46 2016 75.176.148.87:49581 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear_user, emailAddress=mail@netgear.com
Tue Dec 06 22:47:46 2016 75.176.148.87:49581 OpenSSL: error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned
Tue Dec 06 22:47:46 2016 75.176.148.87:49581 TLS_ERROR: BIO read tls_read_plaintext error
Tue Dec 06 22:47:46 2016 75.176.148.87:49581 TLS Error: TLS object -> incoming plaintext read error
Tue Dec 06 22:47:46 2016 75.176.148.87:49581 TLS Error: TLS handshake failed
Tue Dec 06 22:47:46 2016 75.176.148.87:49581 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Dec 06 22:48:17 2016 75.176.148.87:54918 TLS: Initial packet from [AF_INET]75.176.148.87:54918, sid=3c4da98a 64eeca6f
Tue Dec 06 22:48:17 2016 75.176.148.87:54918 VERIFY ERROR: depth=0, error=unable to get local issuer certificate: C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear_user, emailAddress=mail@netgear.com
Tue Dec 06 22:48:17 2016 75.176.148.87:54918 OpenSSL: error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned
Tue Dec 06 22:48:17 2016 75.176.148.87:54918 TLS_ERROR: BIO read tls_read_plaintext error
Tue Dec 06 22:48:17 2016 75.176.148.87:54918 TLS Error: TLS object -> incoming plaintext read error
Tue Dec 06 22:48:17 2016 75.176.148.87:54918 TLS Error: TLS handshake failed
Tue Dec 06 22:48:17 2016 75.176.148.87:54918 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 TLS: Initial packet from [AF_INET]74.219.81.115:56812, sid=5bc05146 a3c80a29
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 VERIFY OK: depth=1, C=US, ST=FL, L=StAugustine, O=BlackCypress, OU=BCC, CN=WIN-CRHH9BLMSUF, name=WIN-CRHH9BLMSUF, emailAddress=admin@blackcypresscapital.com
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 VERIFY OK: depth=0, C=US, ST=FL, L=StAugustine, O=BlackCypress, OU=BCC, CN=jlenker-lt01, name=jlenker-lt01, emailAddress=admin@blackcypresscapital.com
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Tue Dec 06 22:48:48 2016 74.219.81.115:56812 [jlenker-lt01] Peer Connection Initiated with [AF_INET]74.219.81.115:56812
Tue Dec 06 22:48:48 2016 jlenker-lt01/74.219.81.115:56812 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
Tue Dec 06 22:48:48 2016 jlenker-lt01/74.219.81.115:56812 MULTI: Learn: 10.8.0.6 -> jlenker-lt01/74.219.81.115:56812
Tue Dec 06 22:48:48 2016 jlenker-lt01/74.219.81.115:56812 MULTI: primary virtual IP for jlenker-lt01/74.219.81.115:56812: 10.8.0.6
Tue Dec 06 22:48:50 2016 jlenker-lt01/74.219.81.115:56812 PUSH: Received control message: 'PUSH_REQUEST'
Tue Dec 06 22:48:50 2016 jlenker-lt01/74.219.81.115:56812 send_push_reply(): safe_cap=940
Tue Dec 06 22:48:50 2016 jlenker-lt01/74.219.81.115:56812 SENT CONTROL [jlenker-lt01]: 'PUSH_REPLY,route 10.8.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5' (status=1)