Severe problem when using OpenVPN 2.3.2

Business solution to host your own OpenVPN server with web management interface and bundled clients.
Post Reply
slayvus
OpenVpn Newbie
Posts: 1
Joined: Fri Jun 14, 2013 3:26 am

Severe problem when using OpenVPN 2.3.2

Post by slayvus » Fri Jun 14, 2013 3:35 am

I am using OpenVPN 2.3.2 GUI as an administrator

This is a run down of the problem.

1) Connects successfully to the VPN server, as far as I can tell.
2) PC keeps trying to identify new network connection, no internet access
3) Disconnect from OpenVPN UDP connection
4) PC says WiFi still has internet access, can't access internet at all
5) Can connect successfully to VPN L2TP connection even though I can't access internet
6) Still unable to access internet after connection to VPN L2TP
7) Unplugging and replugging in WiFi adapter does not allow for reconnection to WiFi network
8) Logging off User account in Windows and logging back in does not fix WiFi problem
9) Restarting PC is the only way to fix the issue

Code: Select all

Thu Jun 13 23:04:44 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Jun  3 2013
Thu Jun 13 23:04:44 2013 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Thu Jun 13 23:04:44 2013 Need hold release from management interface, waiting...
Thu Jun 13 23:04:44 2013 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Thu Jun 13 23:04:44 2013 MANAGEMENT: CMD 'state on'
Thu Jun 13 23:04:44 2013 MANAGEMENT: CMD 'log all on'
Thu Jun 13 23:04:44 2013 MANAGEMENT: CMD 'hold off'
Thu Jun 13 23:04:44 2013 MANAGEMENT: CMD 'hold release'
Thu Jun 13 23:04:44 2013 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
Thu Jun 13 23:04:44 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 13 23:04:44 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 13 23:04:44 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Jun 13 23:04:44 2013 MANAGEMENT: >STATE:1371179084,RESOLVE,,,
Thu Jun 13 23:04:46 2013 UDPv4 link local: [undef]
Thu Jun 13 23:04:46 2013 UDPv4 link remote: [AF_INET]108.170.58.66:1443
Thu Jun 13 23:04:46 2013 MANAGEMENT: >STATE:1371179086,WAIT,,,
Thu Jun 13 23:04:46 2013 MANAGEMENT: >STATE:1371179086,AUTH,,,
Thu Jun 13 23:04:46 2013 TLS: Initial packet from [AF_INET]108.170.58.66:1443, sid=ee868a62 1d7346db
Thu Jun 13 23:04:46 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Jun 13 23:04:46 2013 VERIFY OK: depth=1, C=US, ST=FL, L=Delray Beach, O=HostVPN.com, OU=HostVPN-CA, CN=HostVPN.com, name=HostVPN, emailAddress=mail@hostvpn.com
Thu Jun 13 23:04:46 2013 Validating certificate key usage
Thu Jun 13 23:04:46 2013 ++ Certificate has key usage  00a0, expects 00a0
Thu Jun 13 23:04:46 2013 VERIFY KU OK
Thu Jun 13 23:04:46 2013 Validating certificate extended key usage
Thu Jun 13 23:04:46 2013 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Jun 13 23:04:46 2013 VERIFY EKU OK
Thu Jun 13 23:04:46 2013 VERIFY OK: depth=0, C=US, ST=FL, L=Delray Beach, O=HostVPN.com, OU=HostVPN-CA, CN=exodus.hostvpn.com, name=HostVPN, emailAddress=mail@hostvpn.com
Thu Jun 13 23:04:47 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Jun 13 23:04:47 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 13 23:04:47 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Jun 13 23:04:47 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 13 23:04:47 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jun 13 23:04:47 2013 [exodus.hostvpn.com] Peer Connection Initiated with [AF_INET]108.170.58.66:1443
Thu Jun 13 23:04:48 2013 MANAGEMENT: >STATE:1371179088,GET_CONFIG,,,
Thu Jun 13 23:04:49 2013 SENT CONTROL [exodus.hostvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Jun 13 23:04:49 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.46 10.8.0.45'
Thu Jun 13 23:04:49 2013 OPTIONS IMPORT: timers and/or timeouts modified
Thu Jun 13 23:04:49 2013 OPTIONS IMPORT: --ifconfig/up options modified
Thu Jun 13 23:04:49 2013 OPTIONS IMPORT: route options modified
Thu Jun 13 23:04:49 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Jun 13 23:04:49 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Thu Jun 13 23:04:49 2013 MANAGEMENT: >STATE:1371179089,ASSIGN_IP,,10.8.0.46,
Thu Jun 13 23:04:49 2013 open_tun, tt->ipv6=0
Thu Jun 13 23:04:49 2013 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{56F745B7-1365-40A5-A6C9-4BA6A7956E2C}.tap
Thu Jun 13 23:04:49 2013 TAP-Windows Driver Version 9.9 
Thu Jun 13 23:04:49 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.46/255.255.255.252 on interface {56F745B7-1365-40A5-A6C9-4BA6A7956E2C} [DHCP-serv: 10.8.0.45, lease-time: 31536000]
Thu Jun 13 23:04:49 2013 Successful ARP Flush on interface [29] {56F745B7-1365-40A5-A6C9-4BA6A7956E2C}
Thu Jun 13 23:04:54 2013 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Thu Jun 13 23:04:54 2013 C:\Windows\system32\route.exe ADD 108.170.58.66 MASK 255.255.255.255 192.168.0.50
Thu Jun 13 23:04:54 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Thu Jun 13 23:04:54 2013 Route addition via IPAPI succeeded [adaptive]
Thu Jun 13 23:04:54 2013 C:\Windows\system32\route.exe ADD 192.168.0.50 MASK 255.255.255.255 192.168.0.50 IF 19
Thu Jun 13 23:04:54 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Thu Jun 13 23:04:54 2013 Route addition via IPAPI succeeded [adaptive]
Thu Jun 13 23:04:54 2013 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.45
Thu Jun 13 23:04:54 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Thu Jun 13 23:04:54 2013 Route addition via IPAPI succeeded [adaptive]
Thu Jun 13 23:04:54 2013 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.45
Thu Jun 13 23:04:54 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Thu Jun 13 23:04:54 2013 Route addition via IPAPI succeeded [adaptive]
Thu Jun 13 23:04:54 2013 MANAGEMENT: >STATE:1371179094,ADD_ROUTES,,,
Thu Jun 13 23:04:54 2013 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.45
Thu Jun 13 23:04:54 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Thu Jun 13 23:04:54 2013 Route addition via IPAPI succeeded [adaptive]
Thu Jun 13 23:04:54 2013 Initialization Sequence Completed
Thu Jun 13 23:04:54 2013 MANAGEMENT: >STATE:1371179094,CONNECTED,SUCCESS,10.8.0.46,108.170.58.66

Post Reply