rainbow6 wrote:If you can post the log and config files for both server and client it would be helpful.
site server, a openwrt box: /etc/config/openvpn
config openvpn 'site_server'
option local 'myserver.ddns.domain 5556'
option proto 'udp'
option dev 'tap'
option ca '/etc/openvpn/ca.crt'
option cert '/etc/openvpn/server.crt'
option key '/etc/openvpn/server.key'
option dh '/etc/openvpn/dh2048.pem'
option ifconfig_pool_persist '/tmp/ipp-site.txt'
#option keepalive '5 30'
option comp_lzo '1'
option persist_key '1'
option persist_tun '1'
option status '/tmp/openvpn-status-site.log'
option verb '3'
option server_bridge '192.168.1.1 255.255.255.0 192.168.1.220 192.168.1.229'
option port '5556'
option enabled '1'
option client_to_client '0'
option push 'dhcp-option DNS 8.8.8.8'
option scramble 'obfuscate hellokitty'
site client, openwrt box
config openvpn 'site_client'
option client '1'
option dev 'tap'
option proto 'udp'
list remote 'myserver.ddns.domain 5556'
option nobind '1'
option persist_key '1'
option persist_tun '1'
option ca '/etc/openvpn/ca.crt'
option cert '/etc/openvpn/Client2.crt'
option key '/etc/openvpn/Client2.key'
option comp_lzo '1'
option verb '3'
option scramble 'obfuscate hellokitty'
option enabled '1'
server process:
/usr/sbin/openvpn --syslog openvpn(site_server) --writepid /var/run/openvpn-site_server.pid --comp-lzo --persist-key --persist-tun --ca /etc/openvpn/ca.crt --cert /etc/openvpn/server.crt --dev tap --dh /etc/openvpn/dh2048.pem --ifconfig-pool-persist /tmp/ipp-site.txt --key /etc/openvpn/server.key --local myserver.ddns.domain --port 5556 --proto udp --server-bridge 192.168.1.1 255.255.255.0 192.168.1.220 192.168.1.229 --status /tmp/openvpn-status-site.log --verb 3 --push dhcp-option DNS 8.8.8.8 --scramble obfuscate hellokitty
client logread:
Wed Jul 16 06:24:12 2014 daemon.notice openvpn(site_client)[8066]: OpenVPN 2.3.4 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jul 15 2014
Wed Jul 16 06:24:12 2014 daemon.notice openvpn(site_client)[8066]: library versions: OpenSSL 1.0.1h 5 Jun 2014, LZO 2.06
Wed Jul 16 06:24:12 2014 daemon.warn openvpn(site_client)[8066]: WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.
Wed Jul 16 06:24:12 2014 daemon.warn openvpn(site_client)[8066]: WARNING: file '/etc/openvpn/Client2.key' is group or others accessible
Wed Jul 16 06:24:12 2014 daemon.notice openvpn(site_client)[8066]: Socket Buffers: R=[163840->131072] S=[163840->131072]
Wed Jul 16 06:24:12 2014 daemon.notice openvpn(site_client)[8066]: UDPv4 link local: [undef]
Wed Jul 16 06:24:12 2014 daemon.notice openvpn(site_client)[8066]: UDPv4 link remote: [AF_INET]1.2.3.4:5556
Wed Jul 16 06:24:12 2014 daemon.notice openvpn(site_client)[8066]: TLS: Initial packet from [AF_INET]1.2.3.4:5556, sid=e34df2c7 ffc85605
Wed Jul 16 06:24:13 2014 daemon.notice openvpn(site_client)[8066]: VERIFY OK: depth=1, C=US, ST=CA, L=Los Angeles, O=Paradise, OU=Master, CN=Gate, name=2014,
emailAddress=
admin@mail.domain
Wed Jul 16 06:24:13 2014 daemon.notice openvpn(site_client)[8066]: VERIFY OK: depth=0, C=US, ST=CA, L=Los Angeles, O=Paradise, OU=Master, CN=Gate, name=2014,
emailAddress=
admin@mail.domain
Wed Jul 16 06:24:15 2014 daemon.notice openvpn(site_client)[8066]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Jul 16 06:24:15 2014 daemon.notice openvpn(site_client)[8066]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Jul 16 06:24:15 2014 daemon.notice openvpn(site_client)[8066]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Jul 16 06:24:15 2014 daemon.notice openvpn(site_client)[8066]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Jul 16 06:24:15 2014 daemon.notice openvpn(site_client)[8066]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Wed Jul 16 06:24:15 2014 daemon.notice openvpn(site_client)[8066]: [Gate] Peer Connection Initiated with [AF_INET]1.2.3.4:5556
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: SENT CONTROL [Gate]: 'PUSH_REQUEST' (status=1)
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,route-gateway
192.168.1.1,ifconfig 192.168.1.221 255.255.255.0'
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: OPTIONS IMPORT: --ifconfig/up options modified
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: OPTIONS IMPORT: route-related options modified
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: TUN/TAP device tap0 opened
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: TUN/TAP TX queue length set to 100
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: /sbin/ifconfig tap0 192.168.1.221 netmask 255.255.255.0 mtu 1500 broadcast 192.168.1.255
Wed Jul 16 06:24:17 2014 daemon.notice openvpn(site_client)[8066]: Initialization Sequence Completed
server logread:
Jul 16 14:24:12 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 TLS: Initial packet from [AF_INET]5.6.7.8:59562, sid=a96cb00f eb629ee8
Jul 16 14:24:14 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 VERIFY OK: depth=1, C=US, ST=CA, L=Los Angeles, O=Paradise, OU=Master, CN=Gate,
name=2014, emailAddress=
admin@mail.domain
Jul 16 14:24:14 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 VERIFY OK: depth=0, C=US, ST=CA, L=Los Angeles, O=Paradise, OU=Master,
CN=Client2, name=2014, emailAddress=
admin@mail.domain
Jul 16 14:24:15 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jul 16 14:24:15 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 16 14:24:15 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jul 16 14:24:15 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 16 14:24:15 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Jul 16 14:24:15 OpenWrt daemon.notice openvpn(site_server)[13411]: 5.6.7.8:59562 [Client2] Peer Connection Initiated with [AF_INET]5.6.7.8:59562
Jul 16 14:24:15 OpenWrt daemon.notice openvpn(site_server)[13411]: Client2/5.6.7.8:59562 MULTI_sva: pool returned IPv4=192.168.1.221, IPv6=(Not enabled)
Jul 16 14:24:17 OpenWrt daemon.notice openvpn(site_server)[13411]: Client2/5.6.7.8:59562 PUSH: Received control message: 'PUSH_REQUEST'
Jul 16 14:24:17 OpenWrt daemon.notice openvpn(site_server)[13411]: Client2/5.6.7.8:59562 send_push_reply(): safe_cap=940
Jul 16 14:24:17 OpenWrt daemon.notice openvpn(site_server)[13411]: Client2/5.6.7.8:59562 SENT CONTROL [Client2]: 'PUSH_REPLY,dhcp-option DNS
114.114.114.114,route-gateway 192.168.1.1,ifconfig 192.168.1.221 255.255.255.0' (status=1)
Jul 16 14:24:17 OpenWrt daemon.notice openvpn(site_server)[13411]: Client2/5.6.7.8:59562 MULTI: Learn: 2a:b7:0a:cf:f0:99 -> Client2/5.6.7.8:59562
ifconfig on client:
tap0 Link encap:Ethernet HWaddr 2A:B7:0A:CF:F0:99
inet addr:192.168.1.221 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::28b7:aff:fecf:f099/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:46 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:0 (0.0 B) TX bytes:2172 (2.1 KiB)
try to ping sever from client shell, it just stuck there
root@OpenWrt:~# ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
and in arp table the server arp is empty , all are zero:
root@OpenWrt:~# arp
IP address HW type Flags HW address Mask Device
192.168.1.1 0x1 0x0 00:00:00:00:00:00 * tap0