Curiouser and curiouser....
With that statement in the work config as well (adjusted for my home network IP) the oping now returns:
Code: Select all
Pinging 192.168.69.100 with 32 bytes of data:
Reply from 192.168.69.150: Destination host unreachable.
Reply from 69.31.34.193: Destination net unreachable.
Request timed out.
Reply from 69.31.34.193: Destination net unreachable.
Ping statistics for 192.168.69.100:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
No idea where the 69.31.34.193 address is coming from...
Thats not my "real IP" from my home router, nor is it my assigned IP from the private VPN....
Just to confirm I have the work vpn config right:
Code: Select all
client
dev tap
dev-node xxxxTap1
proto udp
remote xxxxxxxxxxxxxxxxxxxx 1194
nobind
persist-key
persist-tun
ca "C:\\Program Files (x86)\\OpenVPN\\keys\\ca.crt"
cert "C:\\Program Files (x86)\\OpenVPN\\keys\\xxxx.crt"
key "C:\\Program Files (x86)\\OpenVPN\\keys\\xxxx.key"
comp-lzo
verb 5
push "route 192.168.16.0 255.255.255.0"
route 192.168.69.222 255.255.255.255 net_gateway
#Work VPN Server address is 192.168.69.222
#Work network is 192.168.69.xxx
#Home network is 192.168.16.xxx
Here's the current Work Log:
Code: Select all
Wed Apr 24 11:17:46 2013 us=279051 OpenVPN 2.3.0 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Feb 14 2013
Wed Apr 24 11:17:46 2013 us=280051 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Wed Apr 24 11:17:46 2013 us=280051 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Wed Apr 24 11:17:46 2013 us=597069 LZO compression initialized
Wed Apr 24 11:17:46 2013 us=597069 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
Wed Apr 24 11:17:46 2013 us=607070 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Apr 24 11:17:46 2013 us=726077 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
Wed Apr 24 11:17:46 2013 us=726077 Local Options String: 'V4,dev-type tap,link-mtu 1574,tun-mtu 1532,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Wed Apr 24 11:17:46 2013 us=726077 Expected Remote Options String: 'V4,dev-type tap,link-mtu 1574,tun-mtu 1532,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Wed Apr 24 11:17:46 2013 us=726077 Local Options hash (VER=V4): 'd79ca330'
Wed Apr 24 11:17:46 2013 us=726077 Expected Remote Options hash (VER=V4): 'f7df56b8'
Wed Apr 24 11:17:46 2013 us=726077 UDPv4 link local: [undef]
Wed Apr 24 11:17:46 2013 us=727077 UDPv4 link remote: [AF_INET]72.83.xxx.xxx:1194
Wed Apr 24 11:17:46 2013 us=730077 TLS: Initial packet from [AF_INET]72.83.xxx.xxx:1194, sid=f88ce49a d4b00ab9
Wed Apr 24 11:17:46 2013 us=746078 VERIFY OK: depth=1, C=US, ST=VA, L=HERNDON, O=xxxxxxxxxxxxxxxxxx, CN=OpenVPN, emailAddress=xxxx@xxxxxxxxxxxxxxxxxxx.COM
Wed Apr 24 11:17:46 2013 us=746078 VERIFY OK: depth=0, C=US, ST=VA, O=xxxxxxxxxxxxxxxxxx, CN=server, emailAddress=xxxx@xxxxxxxxxxxxxxxxxxx.COM
Wed Apr 24 11:17:46 2013 us=776079 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Apr 24 11:17:46 2013 us=776079 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Apr 24 11:17:46 2013 us=776079 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Apr 24 11:17:46 2013 us=776079 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Apr 24 11:17:46 2013 us=776079 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Apr 24 11:17:46 2013 us=776079 [server] Peer Connection Initiated with [AF_INET]72.83.xxx.xxx:1194
Wed Apr 24 11:17:48 2013 us=326168 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Apr 24 11:17:48 2013 us=328168 PUSH: Received control message: 'PUSH_REPLY,route-gateway 192.168.69.222,ping 10,ping-restart 120,ifconfig 192.168.69.150 255.255.255.0'
Wed Apr 24 11:17:48 2013 us=329168 OPTIONS IMPORT: timers and/or timeouts modified
Wed Apr 24 11:17:48 2013 us=329168 OPTIONS IMPORT: --ifconfig/up options modified
Wed Apr 24 11:17:48 2013 us=329168 OPTIONS IMPORT: route-related options modified
Wed Apr 24 11:17:48 2013 us=338169 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Apr 24 11:17:48 2013 us=338169 open_tun, tt->ipv6=0
Wed Apr 24 11:17:48 2013 us=340169 TAP-WIN32 device [EETap] opened: \\.\Global\{95DAF23C-C71B-4606-AEAA-A8F406D86F8E}.tap
Wed Apr 24 11:17:48 2013 us=340169 TAP-Windows Driver Version 9.9
Wed Apr 24 11:17:48 2013 us=340169 TAP-Windows MTU=1500
Wed Apr 24 11:17:48 2013 us=342169 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.69.150/255.255.255.0 on interface {95DAF23C-C71B-4606-AEAA-A8F406D86F8E} [DHCP-serv: 192.168.69.0, lease-time: 31536000]
Wed Apr 24 11:17:48 2013 us=342169 Successful ARP Flush on interface [25] {95DAF23C-C71B-4606-AEAA-A8F406D86F8E}
Wed Apr 24 11:17:53 2013 us=165445 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Apr 24 11:17:53 2013 us=165445 C:\Windows\system32\route.exe ADD 192.168.69.222 MASK 255.255.255.255 192.168.16.1
Wed Apr 24 11:17:53 2013 us=167445 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Wed Apr 24 11:17:53 2013 us=167445 Route addition via IPAPI succeeded [adaptive]
Wed Apr 24 11:17:53 2013 us=167445 Initialization Sequence Completed
And for what its worth, here is the log from the Private connection:
Code: Select all
Wed Apr 24 11:03:38 2013 us=609567 OpenVPN 2.3.0 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Feb 14 2013
Wed Apr 24 11:03:38 2013 us=609567 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Wed Apr 24 11:03:38 2013 us=919585 LZO compression initialized
Wed Apr 24 11:03:38 2013 us=919585 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Wed Apr 24 11:03:38 2013 us=928585 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Apr 24 11:03:38 2013 us=979588 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Apr 24 11:03:38 2013 us=979588 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Wed Apr 24 11:03:38 2013 us=979588 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Wed Apr 24 11:03:38 2013 us=979588 Local Options hash (VER=V4): '41690919'
Wed Apr 24 11:03:38 2013 us=979588 Expected Remote Options hash (VER=V4): '530fdded'
Wed Apr 24 11:03:38 2013 us=980588 UDPv4 link local: [undef]
Wed Apr 24 11:03:38 2013 us=980588 UDPv4 link remote: [AF_INET]64.237.37.124:9201
Wed Apr 24 11:03:38 2013 us=998589 TLS: Initial packet from [AF_INET]64.237.37.124:9201, sid=352af6f8 d8416b10
Wed Apr 24 11:03:38 2013 us=998589 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Apr 24 11:03:39 2013 us=111596 VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
Wed Apr 24 11:03:39 2013 us=111596 Validating certificate key usage
Wed Apr 24 11:03:39 2013 us=111596 ++ Certificate has key usage 00a0, expects 00a0
Wed Apr 24 11:03:39 2013 us=111596 VERIFY KU OK
Wed Apr 24 11:03:39 2013 us=111596 Validating certificate extended key usage
Wed Apr 24 11:03:39 2013 us=111596 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Apr 24 11:03:39 2013 us=111596 VERIFY EKU OK
Wed Apr 24 11:03:39 2013 us=111596 VERIFY OK: depth=0, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=server, emailAddress=secure@privateinternetaccess.com
Wed Apr 24 11:03:39 2013 us=180600 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Apr 24 11:03:39 2013 us=181600 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Apr 24 11:03:39 2013 us=181600 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Apr 24 11:03:39 2013 us=181600 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Apr 24 11:03:39 2013 us=181600 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Apr 24 11:03:39 2013 us=181600 [server] Peer Connection Initiated with [AF_INET]64.237.37.124:9201
Wed Apr 24 11:03:41 2013 us=703744 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Apr 24 11:03:41 2013 us=722745 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,ping 10,route 10.188.1.1,topology net30,ifconfig 10.188.1.10 10.188.1.9'
Wed Apr 24 11:03:41 2013 us=722745 OPTIONS IMPORT: timers and/or timeouts modified
Wed Apr 24 11:03:41 2013 us=722745 OPTIONS IMPORT: --ifconfig/up options modified
Wed Apr 24 11:03:41 2013 us=723745 OPTIONS IMPORT: route options modified
Wed Apr 24 11:03:41 2013 us=723745 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Apr 24 11:03:41 2013 us=748747 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Apr 24 11:03:41 2013 us=748747 open_tun, tt->ipv6=0
Wed Apr 24 11:03:41 2013 us=751747 TAP-WIN32 device [VPNTap] opened: \\.\Global\{988E57D2-9397-4045-98C4-8F39A770D738}.tap
Wed Apr 24 11:03:41 2013 us=751747 TAP-Windows Driver Version 9.9
Wed Apr 24 11:03:41 2013 us=751747 TAP-Windows MTU=1500
Wed Apr 24 11:03:41 2013 us=752747 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.188.1.10/255.255.255.252 on interface {988E57D2-9397-4045-98C4-8F39A770D738} [DHCP-serv: 10.188.1.9, lease-time: 31536000]
Wed Apr 24 11:03:41 2013 us=752747 DHCP option string: 06080808 08080808 0404
Wed Apr 24 11:03:41 2013 us=753747 Successful ARP Flush on interface [24] {988E57D2-9397-4045-98C4-8F39A770D738}
Wed Apr 24 11:03:47 2013 us=18048 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Wed Apr 24 11:03:47 2013 us=18048 C:\Windows\system32\route.exe ADD 64.237.37.124 MASK 255.255.255.255 192.168.16.1
Wed Apr 24 11:03:47 2013 us=20048 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Wed Apr 24 11:03:47 2013 us=20048 Route addition via IPAPI succeeded [adaptive]
Wed Apr 24 11:03:47 2013 us=20048 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.188.1.9
Wed Apr 24 11:03:47 2013 us=22048 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Apr 24 11:03:47 2013 us=22048 Route addition via IPAPI succeeded [adaptive]
Wed Apr 24 11:03:47 2013 us=22048 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.188.1.9
Wed Apr 24 11:03:47 2013 us=24048 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Apr 24 11:03:47 2013 us=24048 Route addition via IPAPI succeeded [adaptive]
Wed Apr 24 11:03:47 2013 us=24048 C:\Windows\system32\route.exe ADD 10.188.1.1 MASK 255.255.255.255 10.188.1.9
Wed Apr 24 11:03:47 2013 us=26048 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Apr 24 11:03:47 2013 us=26048 Route addition via IPAPI succeeded [adaptive]
Wed Apr 24 11:03:47 2013 us=26048 Initialization Sequence Completed
Thanks for looking at this...