Still showing my IP Address.
Posted: Sun Jun 11, 2023 2:20 am
Just trying to setup OpenVPN on my dream machine pro, I have been following a few guides on youtube etc. my windows client is saying it's connected but when I "what my ip" it's still showing my original IP. It's probably something Im doing but I can't figure out what it is.
Please help and thank you.
[olog]Sun Jun 11 11:23:38 2023 NOTE: --user option is not implemented on Windows
Sun Jun 11 11:23:38 2023 NOTE: --group option is not implemented on Windows
Sun Jun 11 11:23:38 2023 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
Sun Jun 11 11:23:38 2023 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305). OpenVPN ignores --cipher for cipher negotiations.
Sun Jun 11 11:23:38 2023 Note: '--allow-compression' is not set to 'no', disabling data channel offload.
Sun Jun 11 11:23:38 2023 OpenVPN 2.6.4 [git:v2.6.4/b4f749f14a8edc75] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on May 11 2023
Sun Jun 11 11:23:38 2023 Windows version 10.0 (Windows 10 or greater), amd64 executable
Sun Jun 11 11:23:38 2023 library versions: OpenSSL 3.1.0 14 Mar 2023, LZO 2.10
Sun Jun 11 11:23:38 2023 DCO version: v0
Sun Jun 11 11:23:38 2023 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25342
Sun Jun 11 11:23:38 2023 Need hold release from management interface, waiting...
Sun Jun 11 11:23:38 2023 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:59257
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'state on'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'log on all'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'echo on all'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'bytecount 5'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'state'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'hold off'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'hold release'
Sun Jun 11 11:23:42 2023 MANAGEMENT: CMD 'username "Auth" "AdamS"'
Sun Jun 11 11:23:42 2023 MANAGEMENT: CMD 'password [...]'
Sun Jun 11 11:23:42 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Jun 11 11:23:42 2023 Attempting to establish TCP connection with [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 MANAGEMENT: >STATE:1686448422,TCP_CONNECT,,,,,,
Sun Jun 11 11:23:42 2023 TCP connection established with [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 TCPv4_CLIENT link local: (not bound)
Sun Jun 11 11:23:42 2023 TCPv4_CLIENT link remote: [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 MANAGEMENT: >STATE:1686448422,WAIT,,,,,,
Sun Jun 11 11:23:42 2023 MANAGEMENT: >STATE:1686448422,AUTH,,,,,,
Sun Jun 11 11:23:42 2023 TLS: Initial packet from [AF_INET]10.1.1.154:1194, sid=c69391bc 563ea3b4
Sun Jun 11 11:23:42 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Jun 11 11:23:42 2023 VERIFY OK: depth=1, C=US, ST=New York, L=New York, O=Ubiquiti Inc., OU=UniFi_OpenVPN_CA, CN=UniFi_OpenVPN_CA
Sun Jun 11 11:23:42 2023 VERIFY KU OK
Sun Jun 11 11:23:42 2023 Validating certificate extended key usage
Sun Jun 11 11:23:42 2023 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Jun 11 11:23:42 2023 VERIFY EKU OK
Sun Jun 11 11:23:42 2023 VERIFY OK: depth=0, C=US, ST=New York, L=New York, O=Ubiquiti Inc., OU=UniFi_OpenVPN_Server, CN=UniFi_OpenVPN_Server
Sun Jun 11 11:23:42 2023 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sun Jun 11 11:23:42 2023 [UniFi_OpenVPN_Server] Peer Connection Initiated with [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Sun Jun 11 11:23:42 2023 TLS: tls_multi_process: initial untrusted session promoted to trusted
Sun Jun 11 11:23:42 2023 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,route 192.168.1.0 255.255.255.0,route 8.8.8.8 255.255.255.255,route-gateway 192.168.2.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.2.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Sun Jun 11 11:23:42 2023 OPTIONS IMPORT: --ifconfig/up options modified
Sun Jun 11 11:23:42 2023 OPTIONS IMPORT: route options modified
Sun Jun 11 11:23:42 2023 OPTIONS IMPORT: route-related options modified
Sun Jun 11 11:23:42 2023 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Jun 11 11:23:42 2023 interactive service msg_channel=632
Sun Jun 11 11:23:42 2023 open_tun
Sun Jun 11 11:23:42 2023 tap-windows6 device [OpenVPN TAP-Windows6] opened
Sun Jun 11 11:23:42 2023 TAP-Windows Driver Version 9.26
Sun Jun 11 11:23:42 2023 Set TAP-Windows TUN subnet mode network/local/netmask = 192.168.2.0/192.168.2.2/255.255.255.0 [SUCCEEDED]
Sun Jun 11 11:23:42 2023 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.2.2/255.255.255.0 on interface {F38C6C05-5ABF-46DF-967C-38F8818B0C7B} [DHCP-serv: 192.168.2.0, lease-time: 31536000]
Sun Jun 11 11:23:42 2023 Successful ARP Flush on interface [19] {F38C6C05-5ABF-46DF-967C-38F8818B0C7B}
Sun Jun 11 11:23:42 2023 MANAGEMENT: >STATE:1686448422,ASSIGN_IP,,192.168.2.2,,,,
Sun Jun 11 11:23:42 2023 IPv4 MTU set to 1500 on interface 19 using service
Sun Jun 11 11:23:42 2023 Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'lzo'
Sun Jun 11 11:23:42 2023 Timers: ping 10, ping-restart 60
Sun Jun 11 11:23:47 2023 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 10.1.1.154 MASK 255.255.255.255 192.168.1.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.2.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.2.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 MANAGEMENT: >STATE:1686448427,ADD_ROUTES,,,,,,
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 192.168.2.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 8.8.8.8 MASK 255.255.255.255 192.168.2.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 Initialization Sequence Completed
Sun Jun 11 11:23:47 2023 MANAGEMENT: >STATE:1686448427,CONNECTED,SUCCESS,192.168.2.2,10.1.1.154,1194,192.168.1.86,59259
[/olog]
Please help and thank you.
[olog]Sun Jun 11 11:23:38 2023 NOTE: --user option is not implemented on Windows
Sun Jun 11 11:23:38 2023 NOTE: --group option is not implemented on Windows
Sun Jun 11 11:23:38 2023 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
Sun Jun 11 11:23:38 2023 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305). OpenVPN ignores --cipher for cipher negotiations.
Sun Jun 11 11:23:38 2023 Note: '--allow-compression' is not set to 'no', disabling data channel offload.
Sun Jun 11 11:23:38 2023 OpenVPN 2.6.4 [git:v2.6.4/b4f749f14a8edc75] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on May 11 2023
Sun Jun 11 11:23:38 2023 Windows version 10.0 (Windows 10 or greater), amd64 executable
Sun Jun 11 11:23:38 2023 library versions: OpenSSL 3.1.0 14 Mar 2023, LZO 2.10
Sun Jun 11 11:23:38 2023 DCO version: v0
Sun Jun 11 11:23:38 2023 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25342
Sun Jun 11 11:23:38 2023 Need hold release from management interface, waiting...
Sun Jun 11 11:23:38 2023 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:59257
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'state on'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'log on all'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'echo on all'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'bytecount 5'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'state'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'hold off'
Sun Jun 11 11:23:38 2023 MANAGEMENT: CMD 'hold release'
Sun Jun 11 11:23:42 2023 MANAGEMENT: CMD 'username "Auth" "AdamS"'
Sun Jun 11 11:23:42 2023 MANAGEMENT: CMD 'password [...]'
Sun Jun 11 11:23:42 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Jun 11 11:23:42 2023 Attempting to establish TCP connection with [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 MANAGEMENT: >STATE:1686448422,TCP_CONNECT,,,,,,
Sun Jun 11 11:23:42 2023 TCP connection established with [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 TCPv4_CLIENT link local: (not bound)
Sun Jun 11 11:23:42 2023 TCPv4_CLIENT link remote: [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 MANAGEMENT: >STATE:1686448422,WAIT,,,,,,
Sun Jun 11 11:23:42 2023 MANAGEMENT: >STATE:1686448422,AUTH,,,,,,
Sun Jun 11 11:23:42 2023 TLS: Initial packet from [AF_INET]10.1.1.154:1194, sid=c69391bc 563ea3b4
Sun Jun 11 11:23:42 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Jun 11 11:23:42 2023 VERIFY OK: depth=1, C=US, ST=New York, L=New York, O=Ubiquiti Inc., OU=UniFi_OpenVPN_CA, CN=UniFi_OpenVPN_CA
Sun Jun 11 11:23:42 2023 VERIFY KU OK
Sun Jun 11 11:23:42 2023 Validating certificate extended key usage
Sun Jun 11 11:23:42 2023 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Jun 11 11:23:42 2023 VERIFY EKU OK
Sun Jun 11 11:23:42 2023 VERIFY OK: depth=0, C=US, ST=New York, L=New York, O=Ubiquiti Inc., OU=UniFi_OpenVPN_Server, CN=UniFi_OpenVPN_Server
Sun Jun 11 11:23:42 2023 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sun Jun 11 11:23:42 2023 [UniFi_OpenVPN_Server] Peer Connection Initiated with [AF_INET]10.1.1.154:1194
Sun Jun 11 11:23:42 2023 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Sun Jun 11 11:23:42 2023 TLS: tls_multi_process: initial untrusted session promoted to trusted
Sun Jun 11 11:23:42 2023 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,route 192.168.1.0 255.255.255.0,route 8.8.8.8 255.255.255.255,route-gateway 192.168.2.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.2.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Sun Jun 11 11:23:42 2023 OPTIONS IMPORT: --ifconfig/up options modified
Sun Jun 11 11:23:42 2023 OPTIONS IMPORT: route options modified
Sun Jun 11 11:23:42 2023 OPTIONS IMPORT: route-related options modified
Sun Jun 11 11:23:42 2023 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Jun 11 11:23:42 2023 interactive service msg_channel=632
Sun Jun 11 11:23:42 2023 open_tun
Sun Jun 11 11:23:42 2023 tap-windows6 device [OpenVPN TAP-Windows6] opened
Sun Jun 11 11:23:42 2023 TAP-Windows Driver Version 9.26
Sun Jun 11 11:23:42 2023 Set TAP-Windows TUN subnet mode network/local/netmask = 192.168.2.0/192.168.2.2/255.255.255.0 [SUCCEEDED]
Sun Jun 11 11:23:42 2023 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.2.2/255.255.255.0 on interface {F38C6C05-5ABF-46DF-967C-38F8818B0C7B} [DHCP-serv: 192.168.2.0, lease-time: 31536000]
Sun Jun 11 11:23:42 2023 Successful ARP Flush on interface [19] {F38C6C05-5ABF-46DF-967C-38F8818B0C7B}
Sun Jun 11 11:23:42 2023 MANAGEMENT: >STATE:1686448422,ASSIGN_IP,,192.168.2.2,,,,
Sun Jun 11 11:23:42 2023 IPv4 MTU set to 1500 on interface 19 using service
Sun Jun 11 11:23:42 2023 Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'lzo'
Sun Jun 11 11:23:42 2023 Timers: ping 10, ping-restart 60
Sun Jun 11 11:23:47 2023 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 10.1.1.154 MASK 255.255.255.255 192.168.1.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.2.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.2.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 MANAGEMENT: >STATE:1686448427,ADD_ROUTES,,,,,,
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 192.168.2.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 C:\WINDOWS\system32\route.exe ADD 8.8.8.8 MASK 255.255.255.255 192.168.2.1
Sun Jun 11 11:23:47 2023 Route addition via service succeeded
Sun Jun 11 11:23:47 2023 Initialization Sequence Completed
Sun Jun 11 11:23:47 2023 MANAGEMENT: >STATE:1686448427,CONNECTED,SUCCESS,192.168.2.2,10.1.1.154,1194,192.168.1.86,59259
[/olog]