Bebop, that tutorial was excellent. I just wish it resolved the problem. I turned the code into a shell script, and executed it. Below is what shows with iptables -L
___________________________________
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT udp -- anywhere anywhere udp dpt:openvpn
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT all -- 10.9.0.0/24 anywhere
REJECT all -- anywhere anywhere reject-with icmp-port-unreachable
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
___________________________________
From my openvpn client
___________________________________
Thu Mar 03 18:14:48 2011 OpenVPN 2.2-beta5 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Nov 30 2010
Thu Mar 03 18:14:56 2011 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Mar 03 18:14:56 2011 LZO compression initialized
Thu Mar 03 18:14:56 2011 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Thu Mar 03 18:14:56 2011 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Mar 03 18:14:56 2011 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Mar 03 18:14:56 2011 Local Options hash (VER=V4): '41690919'
Thu Mar 03 18:14:56 2011 Expected Remote Options hash (VER=V4): '530fdded'
Thu Mar 03 18:14:56 2011 UDPv4 link local: [undef]
Thu Mar 03 18:14:56 2011 UDPv4 link remote: {vps ip address}:1194
Thu Mar 03 18:14:56 2011 TLS: Initial packet from {vps ip address}:1194, sid=6a82dccb 0fea6eda
Thu Mar 03 18:14:57 2011 VERIFY OK: depth=1, /C=KG/ST=NA/L=BISHKEK/O=OpenVPN-TEST/emailAddress=
me@myhost.mydomain
Thu Mar 03 18:14:57 2011 VERIFY OK: nsCertType=SERVER
Thu Mar 03 18:14:57 2011 VERIFY OK: depth=0, /C=KG/ST=NA/O=OpenVPN-TEST/CN=Test-Server/emailAddress=
me@myhost.mydomain
Thu Mar 03 18:14:57 2011 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Mar 03 18:14:57 2011 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Mar 03 18:14:57 2011 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Mar 03 18:14:57 2011 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Mar 03 18:14:57 2011 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Mar 03 18:14:57 2011 [Test-Server] Peer Connection Initiated with {vps ip address}:1194
Thu Mar 03 18:15:00 2011 SENT CONTROL [Test-Server]: 'PUSH_REQUEST' (status=1)
Thu Mar 03 18:15:00 2011 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway local def1 bypass-dhcp,route 10.9.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.9.0.6 10.9.0.5'
Thu Mar 03 18:15:00 2011 OPTIONS IMPORT: timers and/or timeouts modified
Thu Mar 03 18:15:00 2011 OPTIONS IMPORT: --ifconfig/up options modified
Thu Mar 03 18:15:00 2011 OPTIONS IMPORT: route options modified
Thu Mar 03 18:15:00 2011 ROUTE default_gateway=192.168.0.1
Thu Mar 03 18:15:00 2011 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{7A91B7B4-7D17-45A4-934F-8AEC114E39E4}.tap
Thu Mar 03 18:15:00 2011 TAP-Win32 Driver Version 9.7
Thu Mar 03 18:15:00 2011 TAP-Win32 MTU=1500
Thu Mar 03 18:15:00 2011 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.9.0.6/255.255.255.252 on interface {7A91B7B4-7D17-45A4-934F-8AEC114E39E4} [DHCP-serv: 10.9.0.5, lease-time: 31536000]
Thu Mar 03 18:15:00 2011 Successful ARP Flush on interface [19] {7A91B7B4-7D17-45A4-934F-8AEC114E39E4}
Thu Mar 03 18:15:06 2011 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Thu Mar 03 18:15:06 2011 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.0.5
Thu Mar 03 18:15:06 2011 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Thu Mar 03 18:15:06 2011 Route addition via IPAPI succeeded [adaptive]
Thu Mar 03 18:15:06 2011 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.0.5
Thu Mar 03 18:15:06 2011 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Thu Mar 03 18:15:06 2011 Route addition via IPAPI succeeded [adaptive]
Thu Mar 03 18:15:06 2011 C:\WINDOWS\system32\route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.5
Thu Mar 03 18:15:06 2011 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Thu Mar 03 18:15:06 2011 Route addition via IPAPI succeeded [adaptive]
Thu Mar 03 18:15:06 2011 Initialization Sequence Completed
____________________________________
So to me it looks like openvpn is behaving both on the server end, and on the client end. Any further ideas you can contribute I'd very much appreciate.
-S