MULTI: bad source address from client[::], packetd dropped
Posted: Sun Jan 17, 2016 9:56 am
Been banging my head for 2 days now with this error.
server.conf
local <external ip>
port 443
proto tcp
dev tun
ca /root/vpn/ca.crt
cert /root/vpn/srv.crt
key /root/vpn/srv.key
dh /root/vpn/dh.pem
server 10.77.198.0 255.255.255.0
ifconfig-pool-persist ipp.txt
client-config-dir cust-client-cfg
#need to access 169.254.0.0 subnet
push "route 169.254.0.0 255.255.0.0"
#redirect traffic
push "redirect-gateway def1"
#set DNS
push "dhcp-options DNS 10.77.198.2"
#don't enbable unless u want clients to see each other
#client-to-client
keepalive 10 120
tls-auth /root/vpn/hmac.key 0
comp-lzo
max-clients 10
plugin /usr/lib64/openvpn/openvpn-plugin-auth-pam.so openvpn login USERNAME password PASSWORD
cipher AES-256-CBC
auth SHA512
keysize 256
user nobody
group nobody
persist-key
persist-tun
status /var/log/openvpn-status.log
log /var/log/openvpn.log
log-append /var/log/openvpn.log
verb 4
################
client.ovpn (connection via OpenVPN GUI on Windows)
setenv FORWARD_COMPATIBLE 1
client
proto tcp
remote <server ip>
port 443
dev tun
dev-type tun
ns-cert-type server
reneg-sec 604800
sndbuf 100000
rcvbuf 100000
auth-user-pass
comp-lzo
verb 3
setenv PUSH_PEER_INFO
cipher AES-256-CBC
auth SHA512
keysize 256
<ca>
-----BEGIN CERTIFICATE-----
***
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
***
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
***
-----END PRIVATE KEY-----
</key>
key-direction 1
<tls-auth>
#
# 2048 bit OpenVPN static key (Server Agent)
#
-----BEGIN OpenVPN Static key V1-----
***
-----END OpenVPN Static key V1-----
</tls-auth>
ifconfig output
eno1 is external ip
eno2: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 169.254.55.223 netmask 255.255.0.0 broadcast 169.254.255.255
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet 10.77.198.1 netmask 255.255.255.255 destination 10.77.198.2
iptables -L -t nat -v
Chain PREROUTING (policy ACCEPT 27 packets, 5234 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 27 packets, 5234 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 14 packets, 942 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 14 packets, 942 bytes)
pkts bytes target prot opt in out source destination
log output
Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
<remote ip>:54549 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
<remote ip>:54549 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
<remote ip>:54549 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
<remote ip>:54549 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
<remote ip>:54549 [master] Peer Connection Initiated with [AF_INET]<remote ip>:54549
master/<remote ip>:54549 OPTIONS IMPORT: reading client specific options from: cust-client-cfg/master
master/<remote ip>:54549 MULTI: Learn: 10.77.198.10 -> master/<remote ip>:54549
master/<remote ip>:54549 MULTI: primary virtual IP for master/<remote ip>:54549: 10.77.198.10
master/<remote ip>:54549 PUSH: Received control message: 'PUSH_REQUEST'
master/<remote ip>:54549 send_push_reply(): safe_cap=940
master/<remote ip>:54549 SENT CONTROL [master]: 'PUSH_REPLY,route 169.254.0.0 255.255.0.0,redirect-gateway def1,dhcp-options DNS 10.77.198.2,route 10.77.198.1,topology net30,ping 10,ping-restart 120,ifconfig 10.77.198.10 10.77.198.9' (status=1)
master/<remote ip>:54549 MULTI: bad source address from client [::], packet dropped
I seem to able to connect, auth is passed... ip is assigned on client side, but i can't seem to be able to route traffic through the vpn.
Can someone post a set of iptables rules that properly route packets between my interfaces?
server.conf
local <external ip>
port 443
proto tcp
dev tun
ca /root/vpn/ca.crt
cert /root/vpn/srv.crt
key /root/vpn/srv.key
dh /root/vpn/dh.pem
server 10.77.198.0 255.255.255.0
ifconfig-pool-persist ipp.txt
client-config-dir cust-client-cfg
#need to access 169.254.0.0 subnet
push "route 169.254.0.0 255.255.0.0"
#redirect traffic
push "redirect-gateway def1"
#set DNS
push "dhcp-options DNS 10.77.198.2"
#don't enbable unless u want clients to see each other
#client-to-client
keepalive 10 120
tls-auth /root/vpn/hmac.key 0
comp-lzo
max-clients 10
plugin /usr/lib64/openvpn/openvpn-plugin-auth-pam.so openvpn login USERNAME password PASSWORD
cipher AES-256-CBC
auth SHA512
keysize 256
user nobody
group nobody
persist-key
persist-tun
status /var/log/openvpn-status.log
log /var/log/openvpn.log
log-append /var/log/openvpn.log
verb 4
################
client.ovpn (connection via OpenVPN GUI on Windows)
setenv FORWARD_COMPATIBLE 1
client
proto tcp
remote <server ip>
port 443
dev tun
dev-type tun
ns-cert-type server
reneg-sec 604800
sndbuf 100000
rcvbuf 100000
auth-user-pass
comp-lzo
verb 3
setenv PUSH_PEER_INFO
cipher AES-256-CBC
auth SHA512
keysize 256
<ca>
-----BEGIN CERTIFICATE-----
***
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
***
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
***
-----END PRIVATE KEY-----
</key>
key-direction 1
<tls-auth>
#
# 2048 bit OpenVPN static key (Server Agent)
#
-----BEGIN OpenVPN Static key V1-----
***
-----END OpenVPN Static key V1-----
</tls-auth>
ifconfig output
eno1 is external ip
eno2: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 169.254.55.223 netmask 255.255.0.0 broadcast 169.254.255.255
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet 10.77.198.1 netmask 255.255.255.255 destination 10.77.198.2
iptables -L -t nat -v
Chain PREROUTING (policy ACCEPT 27 packets, 5234 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 27 packets, 5234 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 14 packets, 942 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 14 packets, 942 bytes)
pkts bytes target prot opt in out source destination
log output
Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
<remote ip>:54549 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
<remote ip>:54549 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
<remote ip>:54549 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
<remote ip>:54549 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
<remote ip>:54549 [master] Peer Connection Initiated with [AF_INET]<remote ip>:54549
master/<remote ip>:54549 OPTIONS IMPORT: reading client specific options from: cust-client-cfg/master
master/<remote ip>:54549 MULTI: Learn: 10.77.198.10 -> master/<remote ip>:54549
master/<remote ip>:54549 MULTI: primary virtual IP for master/<remote ip>:54549: 10.77.198.10
master/<remote ip>:54549 PUSH: Received control message: 'PUSH_REQUEST'
master/<remote ip>:54549 send_push_reply(): safe_cap=940
master/<remote ip>:54549 SENT CONTROL [master]: 'PUSH_REPLY,route 169.254.0.0 255.255.0.0,redirect-gateway def1,dhcp-options DNS 10.77.198.2,route 10.77.198.1,topology net30,ping 10,ping-restart 120,ifconfig 10.77.198.10 10.77.198.9' (status=1)
master/<remote ip>:54549 MULTI: bad source address from client [::], packet dropped
I seem to able to connect, auth is passed... ip is assigned on client side, but i can't seem to be able to route traffic through the vpn.
Can someone post a set of iptables rules that properly route packets between my interfaces?