Page 1 of 1

fritz!wlan repeater 1750e

Posted: Mon Apr 27, 2020 11:56 am
by Philipp12345
Dear All,

I have a very strange problem and no clue how to solve it.

I am using an Open VPN Server on my Synology NAS and it acutally works flawless when I connect with my android mobile "app OpenVPN connect" when I am connected to the internet via my LTE. When I am connected with the same mobile phone to my lan through my fritz wlan repeater 2400 (5 GHz, bridge Mode,FRITZ!OS: 07.12) it works perfect as well, same like with LTE.

However when I am connected to the same LAN with the same phone through my fritz!wlan repeater 1750e (5 GHZz, bridge Mode, FRITZ!OS: 07.12) it gives me following error:

Code: Select all

13:45:11.879 -- Server poll timeout, trying next remote entry...
13:45:11.880 -- EVENT: RECONNECTING
13:45:11.888 -- EVENT: RESOLVE
The 1750e is reachable through another PC on the same LAN. When I am connected with my Phone to this Access point I have internet etc.

In total I have 4 Access Points in my LAN and all but the 1750e work fine.

My config:
Client config

dev tun
tls-client
remote XXX 1194
float
redirect-gateway def1
dhcp-option DNS 192.168.0.1
pull
proto udp
script-security 2
comp-lzo
reneg-sec 0
cipher AES-256-CBC
auth SHA512
auth-user-pass
<ca>
-----BEGIN CERTIFICATE-----
XXX
-----END CERTIFICATE-----
</ca>

Has anyone an idea?

Re: fritz!wlan repeater 1750e

Posted: Mon Apr 27, 2020 12:02 pm
by TinCanTech
You have probably setup your Access point incorrectly.

Re: fritz!wlan repeater 1750e

Posted: Mon Apr 27, 2020 12:10 pm
by Philipp12345
That is what I thought too but it is exactly the same config as the fritz wlan repeater 2400. I went though every page. And again, when I am connectet to the 1750e internet, lan access to nas works fine. Just not the VPN...

Re: fritz!wlan repeater 1750e

Posted: Mon Apr 27, 2020 12:18 pm
by TinCanTech
Firewall maybe ... ?

Otherwise, complete logs as per: viewtopic.php?f=30&t=22603#p68963

Re: fritz!wlan repeater 1750e

Posted: Fri May 01, 2020 7:17 am
by Philipp12345
It took me a while to figure out how to get and to post the requested info. As a summary it seems that when I am connected via the repeater it doesn't pass through UDP, when I ping the IP address I get an answer. I start to believe that it is a bug...

server config

push "route 192.168.0.0 255.255.255.0"
push "route 10.8.0.0 255.255.255.0"
dev tun
management xxx.x.x.x 1195
server 10.8.0.0 255.255.255.0
dh /var/packages/VPNCenter/target/etc/openvpn/keys/dh3072.pem
ca /var/packages/VPNCenter/target/etc/openvpn/keys/ca.crt
cert /var/packages/VPNCenter/target/etc/openvpn/keys/server.crt
key /var/packages/VPNCenter/target/etc/openvpn/keys/server.key
max-clients 5
comp-lzo
persist-tun
persist-key
verb 4
log-append /volume1/backup/log/openvpn.log
keepalive 10 60
reneg-sec 0
plugin /var/packages/VPNCenter/target/lib/radiusplugin.so /var/packages/VPNCenter/target/etc/openvpn/radiusplugin.cnf
client-cert-not-required
username-as-common-name
duplicate-cn
status /tmp/ovpn_status_2_result 30
status-version 2
proto udp6
port 1194
cipher AES-256-CBC
auth SHA512



Serverlog

Tue Apr 28 15:33:24 2020 us=988066 Current Parameter Settings:
Tue Apr 28 15:33:24 2020 us=988317 config = 'openvpn.conf'
Tue Apr 28 15:33:24 2020 us=988352 mode = 1
Tue Apr 28 15:33:24 2020 us=988382 persist_config = DISABLED
Tue Apr 28 15:33:24 2020 us=988411 persist_mode = 1
Tue Apr 28 15:33:24 2020 us=988440 show_ciphers = DISABLED
Tue Apr 28 15:33:24 2020 us=988469 show_digests = DISABLED
Tue Apr 28 15:33:24 2020 us=988498 show_engines = DISABLED
Tue Apr 28 15:33:24 2020 us=988526 genkey = DISABLED
Tue Apr 28 15:33:24 2020 us=988554 key_pass_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=988584 show_tls_ciphers = DISABLED
Tue Apr 28 15:33:24 2020 us=988614 Connection profiles [default]:
Tue Apr 28 15:33:24 2020 us=988643 proto = udp6
Tue Apr 28 15:33:24 2020 us=988671 local = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=988701 local_port = 1194
Tue Apr 28 15:33:24 2020 us=988730 remote = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=988759 remote_port = 1194
Tue Apr 28 15:33:24 2020 us=988787 remote_float = DISABLED
Tue Apr 28 15:33:24 2020 us=988815 bind_defined = DISABLED
Tue Apr 28 15:33:24 2020 us=988843 bind_local = ENABLED
Tue Apr 28 15:33:24 2020 us=988871 connect_retry_seconds = 5
Tue Apr 28 15:33:24 2020 us=988898 connect_timeout = 10
Tue Apr 28 15:33:24 2020 us=988927 connect_retry_max = 0
Tue Apr 28 15:33:24 2020 us=988955 socks_proxy_server = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=988982 socks_proxy_port = 0
Tue Apr 28 15:33:24 2020 us=989010 socks_proxy_retry = DISABLED
Tue Apr 28 15:33:24 2020 us=989037 tun_mtu = 1500
Tue Apr 28 15:33:24 2020 us=989065 tun_mtu_defined = ENABLED
Tue Apr 28 15:33:24 2020 us=989093 link_mtu = 1500
Tue Apr 28 15:33:24 2020 us=989120 link_mtu_defined = DISABLED
Tue Apr 28 15:33:24 2020 us=989148 tun_mtu_extra = 0
Tue Apr 28 15:33:24 2020 us=989175 tun_mtu_extra_defined = DISABLED
Tue Apr 28 15:33:24 2020 us=989202 mtu_discover_type = -1
Tue Apr 28 15:33:24 2020 us=989230 fragment = 0
Tue Apr 28 15:33:24 2020 us=989257 mssfix = 1450
Tue Apr 28 15:33:24 2020 us=989285 explicit_exit_notification = 0
Tue Apr 28 15:33:24 2020 us=989314 Connection profiles END
Tue Apr 28 15:33:24 2020 us=989341 remote_random = DISABLED
Tue Apr 28 15:33:24 2020 us=989369 ipchange = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=989396 dev = 'tun'
Tue Apr 28 15:33:24 2020 us=989424 dev_type = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=989451 dev_node = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=989479 lladdr = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=989507 topology = 1
Tue Apr 28 15:33:24 2020 us=989535 tun_ipv6 = DISABLED
Tue Apr 28 15:33:24 2020 us=989563 ifconfig_local = '10.8.0.1'
Tue Apr 28 15:33:24 2020 us=989592 ifconfig_remote_netmask = '10.8.0.2'
Tue Apr 28 15:33:24 2020 us=989620 ifconfig_noexec = DISABLED
Tue Apr 28 15:33:24 2020 us=989648 ifconfig_nowarn = DISABLED
Tue Apr 28 15:33:24 2020 us=989676 ifconfig_ipv6_local = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=989704 ifconfig_ipv6_netbits = 0
Tue Apr 28 15:33:24 2020 us=989732 ifconfig_ipv6_remote = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=989760 shaper = 0
Tue Apr 28 15:33:24 2020 us=989789 mtu_test = 0
Tue Apr 28 15:33:24 2020 us=989817 mlock = DISABLED
Tue Apr 28 15:33:24 2020 us=989845 keepalive_ping = 10
Tue Apr 28 15:33:24 2020 us=989873 keepalive_timeout = 60
Tue Apr 28 15:33:24 2020 us=989901 inactivity_timeout = 0
Tue Apr 28 15:33:24 2020 us=989929 ping_send_timeout = 10
Tue Apr 28 15:33:24 2020 us=989956 ping_rec_timeout = 120
Tue Apr 28 15:33:24 2020 us=989984 ping_rec_timeout_action = 2
Tue Apr 28 15:33:24 2020 us=990012 ping_timer_remote = DISABLED
Tue Apr 28 15:33:24 2020 us=990039 remap_sigusr1 = 0
Tue Apr 28 15:33:24 2020 us=990066 persist_tun = ENABLED
Tue Apr 28 15:33:24 2020 us=990095 persist_local_ip = DISABLED
Tue Apr 28 15:33:24 2020 us=990122 persist_remote_ip = DISABLED
Tue Apr 28 15:33:24 2020 us=990150 persist_key = ENABLED
Tue Apr 28 15:33:24 2020 us=990177 passtos = DISABLED
Tue Apr 28 15:33:24 2020 us=990205 resolve_retry_seconds = 1000000000
Tue Apr 28 15:33:24 2020 us=990253 username = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=990282 groupname = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=990310 chroot_dir = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=990338 cd_dir = '/usr/syno/etc/packages/VPNCenter/openvpn'
Tue Apr 28 15:33:24 2020 us=990366 writepid = '/var/run/ovpn_server.pid'
Tue Apr 28 15:33:24 2020 us=990394 up_script = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=990421 down_script = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=990449 down_pre = DISABLED
Tue Apr 28 15:33:24 2020 us=990476 up_restart = DISABLED
Tue Apr 28 15:33:24 2020 us=990503 up_delay = DISABLED
Tue Apr 28 15:33:24 2020 us=990531 daemon = ENABLED
Tue Apr 28 15:33:24 2020 us=990558 inetd = 0
Tue Apr 28 15:33:24 2020 us=990585 log = ENABLED
Tue Apr 28 15:33:24 2020 us=990613 suppress_timestamps = DISABLED
Tue Apr 28 15:33:24 2020 us=990640 nice = 0
Tue Apr 28 15:33:24 2020 us=990668 verbosity = 4
Tue Apr 28 15:33:24 2020 us=990695 mute = 0
Tue Apr 28 15:33:24 2020 us=990722 gremlin = 0
Tue Apr 28 15:33:24 2020 us=990750 status_file = '/tmp/ovpn_status_2_result'
Tue Apr 28 15:33:24 2020 us=990777 status_file_version = 2
Tue Apr 28 15:33:24 2020 us=990805 status_file_update_freq = 30
Tue Apr 28 15:33:24 2020 us=990832 occ = ENABLED
Tue Apr 28 15:33:24 2020 us=990859 rcvbuf = 0
Tue Apr 28 15:33:24 2020 us=990886 sndbuf = 0
Tue Apr 28 15:33:24 2020 us=990914 mark = 0
Tue Apr 28 15:33:24 2020 us=990941 sockflags = 0
Tue Apr 28 15:33:24 2020 us=990968 fast_io = DISABLED
Tue Apr 28 15:33:24 2020 us=990996 lzo = 7
Tue Apr 28 15:33:24 2020 us=991024 route_script = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=991051 route_default_gateway = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=991079 route_default_metric = 0
Tue Apr 28 15:33:24 2020 us=991108 route_noexec = DISABLED
Tue Apr 28 15:33:24 2020 us=991135 route_delay = 0
Tue Apr 28 15:33:24 2020 us=991163 route_delay_window = 30
Tue Apr 28 15:33:24 2020 us=991190 route_delay_defined = DISABLED
Tue Apr 28 15:33:24 2020 us=991218 route_nopull = DISABLED
Tue Apr 28 15:33:24 2020 us=991245 route_gateway_via_dhcp = DISABLED
Tue Apr 28 15:33:24 2020 us=991273 max_routes = 100
Tue Apr 28 15:33:24 2020 us=991300 allow_pull_fqdn = DISABLED
Tue Apr 28 15:33:24 2020 us=991329 route 10.8.0.0/255.255.255.0/nil/nil
Tue Apr 28 15:33:24 2020 us=991357 management_addr = '127.0.0.1'
Tue Apr 28 15:33:24 2020 us=991385 management_port = 1195
Tue Apr 28 15:33:24 2020 us=991412 management_user_pass = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=991440 management_log_history_cache = 250
Tue Apr 28 15:33:24 2020 us=991468 management_echo_buffer_size = 100
Tue Apr 28 15:33:24 2020 us=991495 management_write_peer_info_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=991527 management_client_user = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=991556 management_client_group = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=991583 management_flags = 0
Tue Apr 28 15:33:24 2020 us=991617 plugin[0] /var/packages/VPNCenter/target/lib/radiusplugin.so '[/var/packages/VPNCenter/target/lib/radiusplugin.so] [/var/packages/VPNCenter/target/etc/openvpn/radiusplugin.cnf]'
Tue Apr 28 15:33:24 2020 us=991647 shared_secret_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=991675 key_direction = 0
Tue Apr 28 15:33:24 2020 us=991703 ciphername_defined = ENABLED
Tue Apr 28 15:33:24 2020 us=991731 ciphername = 'AES-256-CBC'
Tue Apr 28 15:33:24 2020 us=991758 authname_defined = ENABLED
Tue Apr 28 15:33:24 2020 us=991787 authname = 'SHA512'
Tue Apr 28 15:33:24 2020 us=991814 prng_hash = 'SHA1'
Tue Apr 28 15:33:24 2020 us=991842 prng_nonce_secret_len = 16
Tue Apr 28 15:33:24 2020 us=991871 keysize = 0
Tue Apr 28 15:33:24 2020 us=991898 engine = DISABLED
Tue Apr 28 15:33:24 2020 us=991926 replay = ENABLED
Tue Apr 28 15:33:24 2020 us=991953 mute_replay_warnings = DISABLED
Tue Apr 28 15:33:24 2020 us=991981 replay_window = 64
Tue Apr 28 15:33:24 2020 us=992009 replay_time = 15
Tue Apr 28 15:33:24 2020 us=992036 packet_id_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992075 use_iv = ENABLED
Tue Apr 28 15:33:24 2020 us=992104 test_crypto = DISABLED
Tue Apr 28 15:33:24 2020 us=992132 tls_server = ENABLED
Tue Apr 28 15:33:24 2020 us=992160 tls_client = DISABLED
Tue Apr 28 15:33:24 2020 us=992188 key_method = 2
Tue Apr 28 15:33:24 2020 us=992216 ca_file = '/var/packages/VPNCenter/target/etc/openvpn/keys/ca.crt'
Tue Apr 28 15:33:24 2020 us=992244 ca_path = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992273 dh_file = '/var/packages/VPNCenter/target/etc/openvpn/keys/dh3072.pem'
Tue Apr 28 15:33:24 2020 us=992301 cert_file = '/var/packages/VPNCenter/target/etc/openvpn/keys/server.crt'
Tue Apr 28 15:33:24 2020 us=992329 extra_certs_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992357 priv_key_file = '/var/packages/VPNCenter/target/etc/openvpn/keys/server.key'
Tue Apr 28 15:33:24 2020 us=992385 pkcs12_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992412 cipher_list = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992440 tls_verify = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992468 tls_export_cert = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992495 verify_x509_type = 0
Tue Apr 28 15:33:24 2020 us=992522 verify_x509_name = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992549 crl_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=992577 ns_cert_type = 0
Tue Apr 28 15:33:24 2020 us=992605 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992633 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992660 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992687 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992714 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992742 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992770 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992798 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992826 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992854 remote_cert_ku = 0
Tue Apr 28 15:33:24 2020 us=992882 remote_cert_ku[i] = 0
Tue Apr 28 15:33:24 2020 us=992910 remote_cert_ku[i] = 0
Tue Apr 28 15:33:24 2020 us=992938 remote_cert_ku[i] = 0
Tue Apr 28 15:33:24 2020 us=992966 remote_cert_ku[i] = 0
Tue Apr 28 15:33:24 2020 us=992993 remote_cert_ku[i] = 0
Tue Apr 28 15:33:24 2020 us=993021 remote_cert_ku[i] = 0
Tue Apr 28 15:33:24 2020 us=993049 remote_cert_eku = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=993078 ssl_flags = 3
Tue Apr 28 15:33:24 2020 us=993106 tls_timeout = 2
Tue Apr 28 15:33:24 2020 us=993134 renegotiate_bytes = 0
Tue Apr 28 15:33:24 2020 us=993162 renegotiate_packets = 0
Tue Apr 28 15:33:24 2020 us=993189 renegotiate_seconds = 0
Tue Apr 28 15:33:24 2020 us=993217 handshake_window = 60
Tue Apr 28 15:33:24 2020 us=993245 transition_window = 3600
Tue Apr 28 15:33:24 2020 us=993273 single_session = DISABLED
Tue Apr 28 15:33:24 2020 us=993301 push_peer_info = DISABLED
Tue Apr 28 15:33:24 2020 us=993328 tls_exit = DISABLED
Tue Apr 28 15:33:24 2020 us=993357 tls_auth_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=993387 server_network = 10.8.0.0
Tue Apr 28 15:33:24 2020 us=993419 server_netmask = 255.255.255.0
Tue Apr 28 15:33:24 2020 us=993464 server_network_ipv6 = ::
Tue Apr 28 15:33:24 2020 us=993493 server_netbits_ipv6 = 0
Tue Apr 28 15:33:24 2020 us=993524 server_bridge_ip = 0.0.0.0
Tue Apr 28 15:33:24 2020 us=993555 server_bridge_netmask = 0.0.0.0
Tue Apr 28 15:33:24 2020 us=993586 server_bridge_pool_start = 0.0.0.0
Tue Apr 28 15:33:24 2020 us=993616 server_bridge_pool_end = 0.0.0.0
Tue Apr 28 15:33:24 2020 us=993645 push_entry = 'route 192.168.0.0 255.255.255.0'
Tue Apr 28 15:33:24 2020 us=993673 push_entry = 'route 10.8.0.0 255.255.255.0'
Tue Apr 28 15:33:24 2020 us=993701 push_entry = 'route 10.8.0.1'
Tue Apr 28 15:33:24 2020 us=993729 push_entry = 'topology net30'
Tue Apr 28 15:33:24 2020 us=993757 push_entry = 'ping 10'
Tue Apr 28 15:33:24 2020 us=993785 push_entry = 'ping-restart 60'
Tue Apr 28 15:33:24 2020 us=993813 ifconfig_pool_defined = ENABLED
Tue Apr 28 15:33:24 2020 us=993844 ifconfig_pool_start = 10.8.0.4
Tue Apr 28 15:33:24 2020 us=993884 ifconfig_pool_end = 10.8.0.251
Tue Apr 28 15:33:24 2020 us=993916 ifconfig_pool_netmask = 0.0.0.0
Tue Apr 28 15:33:24 2020 us=993944 ifconfig_pool_persist_filename = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=993972 ifconfig_pool_persist_refresh_freq = 600
Tue Apr 28 15:33:24 2020 us=994000 ifconfig_ipv6_pool_defined = DISABLED
Tue Apr 28 15:33:24 2020 us=994029 ifconfig_ipv6_pool_base = ::
Tue Apr 28 15:33:24 2020 us=994056 ifconfig_ipv6_pool_netbits = 0
Tue Apr 28 15:33:24 2020 us=994084 n_bcast_buf = 256
Tue Apr 28 15:33:24 2020 us=994112 tcp_queue_limit = 64
Tue Apr 28 15:33:24 2020 us=994139 real_hash_size = 256
Tue Apr 28 15:33:24 2020 us=994167 virtual_hash_size = 256
Tue Apr 28 15:33:24 2020 us=994194 client_connect_script = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=994221 learn_address_script = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=994248 client_disconnect_script = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=994275 client_config_dir = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=994303 ccd_exclusive = DISABLED
Tue Apr 28 15:33:24 2020 us=994330 tmp_dir = '/tmp'
Tue Apr 28 15:33:24 2020 us=994357 push_ifconfig_defined = DISABLED
Tue Apr 28 15:33:24 2020 us=994387 push_ifconfig_local = 0.0.0.0
Tue Apr 28 15:33:24 2020 us=994416 push_ifconfig_remote_netmask = 0.0.0.0
Tue Apr 28 15:33:24 2020 us=994444 push_ifconfig_ipv6_defined = DISABLED
Tue Apr 28 15:33:24 2020 us=994473 push_ifconfig_ipv6_local = ::/0
Tue Apr 28 15:33:24 2020 us=994503 push_ifconfig_ipv6_remote = ::
Tue Apr 28 15:33:24 2020 us=994530 enable_c2c = DISABLED
Tue Apr 28 15:33:24 2020 us=994558 duplicate_cn = ENABLED
Tue Apr 28 15:33:24 2020 us=994585 cf_max = 0
Tue Apr 28 15:33:24 2020 us=994612 cf_per = 0
Tue Apr 28 15:33:24 2020 us=994640 max_clients = 5
Tue Apr 28 15:33:24 2020 us=994668 max_routes_per_client = 256
Tue Apr 28 15:33:24 2020 us=994695 auth_user_pass_verify_script = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=994723 auth_user_pass_verify_script_via_file = DISABLED
Tue Apr 28 15:33:24 2020 us=994751 port_share_host = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=994779 port_share_port = 0
Tue Apr 28 15:33:24 2020 us=994806 client = DISABLED
Tue Apr 28 15:33:24 2020 us=994834 pull = DISABLED
Tue Apr 28 15:33:24 2020 us=994862 auth_user_pass_file = '[UNDEF]'
Tue Apr 28 15:33:24 2020 us=994893 OpenVPN 2.3.11 aarch64-unknown-linux-gnueabi [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jul 2 2018
Tue Apr 28 15:33:24 2020 us=994941 library versions: OpenSSL 1.0.2r-fips 26 Feb 2019, LZO 2.09
Tue Apr 28 15:33:24 2020 us=995868 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:1195
Tue Apr 28 15:33:24 2020 us=996236 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Tue Apr 28 15:33:24 2020 RADIUS-PLUGIN: Configfile name: /var/packages/VPNCenter/target/etc/openvpn/radiusplugin.cnf.
Tue Apr 28 15:33:24 2020 us=998811 PLUGIN_INIT: POST /var/packages/VPNCenter/target/lib/radiusplugin.so '[/var/packages/VPNCenter/target/lib/radiusplugin.so] [/var/packages/VPNCenter/target/etc/openvpn/radiusplugin.cnf]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY|PLUGIN_CLIENT_CONNECT|PLUGIN_CLIENT_DISCONNECT
Tue Apr 28 15:33:24 2020 us=999813 Diffie-Hellman initialized with 3072 bit key
Tue Apr 28 15:33:24 2020 us=999901 WARNING: POTENTIALLY DANGEROUS OPTION --client-cert-not-required may accept clients which do not present a certificate
Tue Apr 28 15:33:25 2020 us=1193 TLS-Auth MTU parms [ L:1602 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Tue Apr 28 15:33:25 2020 us=1305 Socket Buffers: R=[229376->229376] S=[229376->229376]
Tue Apr 28 15:33:25 2020 us=1616 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=00:11:32:88:50:44
Tue Apr 28 15:33:25 2020 us=2531 TUN/TAP device tun0 opened
Tue Apr 28 15:33:25 2020 us=2616 TUN/TAP TX queue length set to 100
Tue Apr 28 15:33:25 2020 us=2667 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Apr 28 15:33:25 2020 us=2795 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Tue Apr 28 15:33:25 2020 us=8801 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Tue Apr 28 15:33:25 2020 us=12196 Data Channel MTU parms [ L:1602 D:1450 EF:102 EB:143 ET:0 EL:3 AF:3/1 ]
Tue Apr 28 15:33:25 2020 us=12329 UDPv6 link local (bound): [undef]
Tue Apr 28 15:33:25 2020 us=12364 UDPv6 link remote: [undef]
Tue Apr 28 15:33:25 2020 us=12404 MULTI: multi_init called, r=256 v=256
Tue Apr 28 15:33:25 2020 us=12504 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Tue Apr 28 15:33:25 2020 us=12587 Initialization Sequence Completed
Tue Apr 28 15:33:49 2020 us=53899 MULTI: multi_create_instance called
Tue Apr 28 15:33:49 2020 us=54076 ::ffff:192.168.0.250(42465) Re-using SSL/TLS context
Tue Apr 28 15:33:49 2020 us=54162 ::ffff:192.168.0.250(42465) LZO compression initialized
Tue Apr 28 15:33:49 2020 us=54382 ::ffff:192.168.0.250(42465) Control Channel MTU parms [ L:1602 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Tue Apr 28 15:33:49 2020 us=54423 ::ffff:192.168.0.250(42465) Data Channel MTU parms [ L:1602 D:1450 EF:102 EB:143 ET:0 EL:3 AF:3/1 ]
Tue Apr 28 15:33:49 2020 us=54509 ::ffff:192.168.0.250(42465) Local Options String: 'V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Tue Apr 28 15:33:49 2020 us=54541 ::ffff:192.168.0.250(42465) Expected Remote Options String: 'V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Tue Apr 28 15:33:49 2020 us=54595 ::ffff:192.168.0.250(42465) Local Options hash (VER=V4): 'aaa173e3'
Tue Apr 28 15:33:49 2020 us=54642 ::ffff:192.168.0.250(42465) Expected Remote Options hash (VER=V4): '9c102b00'
Tue Apr 28 15:33:49 2020 us=54738 ::ffff:192.168.0.250(42465) TLS: Initial packet from [AF_INET6]::ffff:192.168.0.250:42465, sid=a2e97b5b 2ec3830e
Tue Apr 28 15:33:49 2020 RADIUS-PLUGIN: FOREGROUND THREAD: Auth_user_pass_verify thread started.
Tue Apr 28 15:33:49 2020 RADIUS-PLUGIN: FOREGROUND THREAD: New user.
Tue Apr 28 15:33:49 2020 RADIUS-PLUGIN: No attributes Acct Interim Interval or bad length.
Tue Apr 28 15:33:49 2020 RADIUS-PLUGIN: Client config file was not written, overwriteccfiles is false
.Tue Apr 28 15:33:49 2020 RADIUS-PLUGIN: FOREGROUND THREAD: Add user to map.
Tue Apr 28 15:33:49 2020 us=913821 ::ffff:192.168.0.250(42465) PLUGIN_CALL: POST /var/packages/VPNCenter/target/lib/radiusplugin.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
Tue Apr 28 15:33:49 2020 us=913924 ::ffff:192.168.0.250(42465) TLS: Username/Password authentication succeeded for username 'Administrator' [CN SET]
Tue Apr 28 15:33:49 2020 us=914259 ::ffff:192.168.0.250(42465) Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Tue Apr 28 15:33:49 2020 us=914308 ::ffff:192.168.0.250(42465) Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Apr 28 15:33:49 2020 us=914344 ::ffff:192.168.0.250(42465) Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Tue Apr 28 15:33:49 2020 us=914382 ::ffff:192.168.0.250(42465) Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Apr 28 15:33:49 2020 us=969873 ::ffff:192.168.0.250(42465) Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384
Tue Apr 28 15:33:49 2020 us=970016 ::ffff:192.168.0.250(42465) [Administrator] Peer Connection Initiated with [AF_INET6]::ffff:192.168.0.250:42465
Tue Apr 28 15:33:49 2020 us=970098 Administrator/::ffff:192.168.0.250(42465) MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
Tue Apr 28 15:33:49 2020 us=973695 Administrator/::ffff:192.168.0.250(42465) PLUGIN_CALL: POST /var/packages/VPNCenter/target/lib/radiusplugin.so/PLUGIN_CLIENT_CONNECT status=0
Tue Apr 28 15:33:49 2020 us=973811 Administrator/::ffff:192.168.0.250(42465) OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_587894f76ff6d6cb575176dcd849f9e1.tmp
Tue Apr 28 15:33:49 2020 us=973985 Administrator/::ffff:192.168.0.250(42465) MULTI: Learn: 10.8.0.6 -> Administrator/::ffff:192.168.0.250(42465)
Tue Apr 28 15:33:49 2020 us=974053 Administrator/::ffff:192.168.0.250(42465) MULTI: primary virtual IP for Administrator/::ffff:192.168.0.250(42465): 10.8.0.6
Tue Apr 28 15:33:49 2020 us=974353 Administrator/::ffff:192.168.0.250(42465) PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 28 15:33:49 2020 us=974390 Administrator/::ffff:192.168.0.250(42465) send_push_reply(): safe_cap=940
Tue Apr 28 15:33:49 2020 us=974448 Administrator/::ffff:192.168.0.250(42465) SENT CONTROL [Administrator]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.8.0.0 255.255.255.0,route 10.8.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5' (status=1)
Tue Apr 28 15:33:53 2020 us=994023 Administrator/::ffff:192.168.0.250(42465) SIGTERM[soft,remote-exit] received, client-instance exiting
Tue Apr 28 15:33:53 2020 RADIUS-PLUGIN: BACKGROUND ACCT: No accounting data was found for Administrator,::ffff:192.168.0.250:42465.
Tue Apr 28 15:33:53 2020 us=997208 PLUGIN_CALL: POST /var/packages/VPNCenter/target/lib/radiusplugin.so/PLUGIN_CLIENT_DISCONNECT status=0


Client config

dev tun
tls-client
remote xxx 1194
float
redirect-gateway def1
dhcp-option DNS 192.168.0.1
pull
proto udp
script-security 2
verb 4
#log-append /volume1/backup/log/openvpn.log
comp-lzo
reneg-sec 0
cipher AES-256-CBC
auth SHA512
auth-user-pass
<ca>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</ca>


Clientlog

19:41:38.897 -- ----- OpenVPN Start -----
19:41:38.897 -- EVENT: CORE_THREAD_ACTIVE
19:41:38.900 -- OpenVPN core 3.git::f225fcd0:Release android arm64 64-bit PT_PROXY built on Mar 3 2020 21:07:24
19:41:38.965 -- Frame=512/2048/512 mssfix-ctrl=1250
19:41:38.965 -- UNUSED OPTIONS
1 [tls-client]
6 [pull]
7 [verb] [4]
8 [log-append] [/storage/emulated/0/Download/openvpn/openvpn.log]
9 [script-security] [2]
19:41:38.965 -- EVENT: RESOLVE
19:41:39.039 -- Contacting XX.XXX.XXX.XXX:1194 via UDP
19:41:39.039 -- EVENT: WAIT
19:41:39.041 -- Connecting to [dyndns.XXX.es]:1194 (XX.XXX.XXX.XXX) via UDPv4
19:41:48.967 -- Server poll timeout, trying next remote entry...
19:41:48.968 -- EVENT: RECONNECTING
19:41:48.972 -- EVENT: RESOLVE
19:41:48.981 -- Contacting XX.XXX.XXX.XXX:1194 via UDP
19:41:48.982 -- EVENT: WAIT
19:41:48.989 -- Connecting to [dyndns.XXX.es]:1194 (XX.XXX.XXX.XXX) via UDPv4
19:41:58.969 -- Server poll timeout, trying next remote entry...
19:41:58.970 -- EVENT: RECONNECTING
19:41:58.975 -- EVENT: RESOLVE
19:41:58.989 -- Contacting XX.XXX.XXX.XXX:1194 via UDP
19:41:58.990 -- EVENT: WAIT
19:41:58.997 -- Connecting to [dyndns.XXX.es]:1194 (XX.XXX.XXX.XXX) via UDPv4
19:42:03.747 -- EVENT: DISCONNECTED
19:42:03.748 -- Tunnel bytes per CPU second: 0
19:42:03.748 -- ----- OpenVPN Stop -----

Re: fritz!wlan repeater 1750e

Posted: Mon May 25, 2020 1:10 pm
by Philipp12345
Just in case anyone has the same problem:
It was a firmware problem of the 1750e as I expected. With the official 7.12 Firmware there was no chance of connecting to the OPEN VPN Server. After manually upgrading to a beta firmware (07.19-77562 BETA) everything worked flawless. Shame on you AVM :-) Took me a couple of hours of my life...