Things look good but I can NOT reach the desired net 192.168.51.0/24 via the VPN
[root@Awyr openvpn]# ssh 192.168.51.2
ssh: connect to host 192.168.51.2 port 22: Connection timed out
ping doesn't work either

I CAN scp over the established vpn connection
[root@Awyr openvpn]# scp VPNClientStats rrc@10.34.0.1:

                       Bienvenido a Narciso.moov.com.mx
                        Welcome to Narciso.moov.com.mx
                    Soyez bienvenus a Narciso.moov.com.mx

                AVISO: Estamos supervisando su comportamiento
                 WARNING:  We are monitoring this connection
               AVERTISSEMENT : Nous controlons cette connexion

                        El abuso no va a ser tolerado
                         Abuse will NOT be tolerated
                          L'abus ne sera pas tolere

Password:
VPNClientStats 100% 7184 3.9MB/s 00:00

Here are data from the client

The ccd/rrc file:

[root@narciso openvpn]# cat ccd/rrc
#ifconfig-push 10.34.0.249 10.34.0.250
#ifconfig-push 10.34.0.249 255.255.255.0
#push "route 192.168.20.0 255.255.255.0"
push "route 192.168.51.0 255.255.255.0"
#push "route 10.30.40.0 255.255.255.0"

The ifconfig in many variations seemed to conflict so I eliminated it relying upon the server's server 10.34.0.0 255.255.255.0 to do the job and it seems to be working so only the push "route 192.168.51.0 255.255.255.0" is uncommented

[root@Awyr openvpn]# sysctl net.ipv4.ip_forward
net.ipv4.ip_forward = 1

NO Firewall on Client - totally open

[root@Awyr openvpn]# ip add sh
2: enp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether c0:18:50:96:63:38 brd ff:ff:ff:ff:ff:ff
    inet 187.251.133.221/30 brd 187.251.133.223 scope global enp3s0
       valid_lft forever preferred_lft forever
4: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500
    link/none
    inet 10.34.0.2/24 scope global tun0
       valid_lft forever preferred_lft forever

[root@Awyr openvpn]# ip route sh
10.34.0.0/24 dev tun0 proto kernel scope link src 10.34.0.2
187.251.133.220/30 dev enp3s0 proto kernel scope link src 187.251.133.221
192.168.51.0/24 via 10.34.0.1 dev tun0

[root@Awyr openvpn]# cat openvpn.log
2023-12-30 13:40:06 us=595665 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-12-30 13:40:06 us=596133 Current Parameter Settings:
2023-12-30 13:40:06 us=596154   config = 'rrc.ovpn'
2023-12-30 13:40:06 us=596171   mode = 0
2023-12-30 13:40:06 us=596187   persist_config = DISABLED
2023-12-30 13:40:06 us=596203   persist_mode = 1
2023-12-30 13:40:06 us=596219   show_ciphers = DISABLED
2023-12-30 13:40:06 us=596235   show_digests = DISABLED
2023-12-30 13:40:06 us=596251   show_engines = DISABLED
2023-12-30 13:40:06 us=596266   genkey = DISABLED
2023-12-30 13:40:06 us=596282   genkey_filename = '[UNDEF]'
2023-12-30 13:40:06 us=596297   key_pass_file = '[UNDEF]'
2023-12-30 13:40:06 us=596339   show_tls_ciphers = DISABLED
2023-12-30 13:40:06 us=596354   connect_retry_max = 0
2023-12-30 13:40:06 us=596370 Connection profiles [0]:
2023-12-30 13:40:06 us=596387   proto = udp
2023-12-30 13:40:06 us=596402   local = '[UNDEF]'
2023-12-30 13:40:06 us=596418   local_port = '1194'
2023-12-30 13:40:06 us=596434   remote = '187.251.133.222'
2023-12-30 13:40:06 us=596450   remote_port = '1194'
2023-12-30 13:40:06 us=596466   remote_float = DISABLED
2023-12-30 13:40:06 us=596481 NOTE: --mute triggered...
2023-12-30 13:40:06 us=596526 268 variation(s) on previous 20 message(s) suppressed by --mute 2023-12-30 13:40:06 us=596544 OpenVPN 2.5.0 x86_64-mageia-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 5 2022 2023-12-30 13:40:06 us=596579 library versions: OpenSSL 1.1.1v 1 Aug 2023, LZO 2.10 2023-12-30 13:40:06 us=599632 Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ] 2023-12-30 13:40:06 us=602363 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ] 2023-12-30 13:40:06 us=602392 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-12-30 13:40:06 us=602399 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-12-30 13:40:06 us=602410 TCP/UDP: Preserving recently used remote address: [AF_INET]187.251.133.222:1194 2023-12-30 13:40:06 us=602426 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-12-30 13:40:06 us=602437 UDP link local (bound): [AF_INET][undef]:1194
2023-12-30 13:40:06 us=602444 UDP link remote: [AF_INET]187.251.133.222:1194
2023-12-30 13:40:06 us=603948 TLS: Initial packet from [AF_INET]187.251.133.222:1194, sid=0acf94c4 ae972942 2023-12-30 13:40:06 us=610424 VERIFY OK: depth=1, C=MX, ST=Jalisco, L=Tlaquepaque, O=Vame Vehiculos, OU=My Organizational Unit, CN=narciso.moov.com.mx, emailAddress=salvador.ba...@moov.com.mx
2023-12-30 13:40:06 us=610699 VERIFY KU OK
2023-12-30 13:40:06 us=610720 Validating certificate extended key usage
2023-12-30 13:40:06 us=610739 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-12-30 13:40:06 us=610754 VERIFY EKU OK
2023-12-30 13:40:06 us=610770 VERIFY OK: depth=0, C=MX, ST=Jalisco, L=Tlaquepaque, O=Vame Vehiculos, OU=My Organizational Unit, CN=narciso.moov.com.mx, emailAddress=salvador.ba...@moov.com.mx 2023-12-30 13:40:06 us=616591 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1541', remote='link-mtu 1549' 2023-12-30 13:40:06 us=616637 WARNING: 'auth' is used inconsistently, local='auth SHA1', remote='auth [null-digest]' 2023-12-30 13:40:06 us=616660 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256' 2023-12-30 13:40:06 us=616741 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA 2023-12-30 13:40:06 us=616770 [narciso.moov.com.mx] Peer Connection Initiated with [AF_INET]187.251.133.222:1194 2023-12-30 13:40:06 us=639393 PUSH: Received control message: 'PUSH_REPLY,route 192.168.51.0 255.255.255.0,route-gateway 10.34.0.1,topology subnet,ping 10,ping-restart 120,route 192.168.51.0 255.255.255.0,ifconfig 10.34.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' 2023-12-30 13:40:06 us=639640 OPTIONS IMPORT: timers and/or timeouts modified
2023-12-30 13:40:06 us=639659 OPTIONS IMPORT: --ifconfig/up options modified
2023-12-30 13:40:06 us=639676 OPTIONS IMPORT: route options modified
2023-12-30 13:40:06 us=639690 OPTIONS IMPORT: route-related options modified
2023-12-30 13:40:06 us=639706 OPTIONS IMPORT: peer-id set
2023-12-30 13:40:06 us=639721 OPTIONS IMPORT: adjusting link_mtu to 1624
2023-12-30 13:40:06 us=639737 OPTIONS IMPORT: data channel crypto options modified 2023-12-30 13:40:06 us=639756 Data Channel: using negotiated cipher 'AES-256-GCM' 2023-12-30 13:40:06 us=639787 Data Channel MTU parms [ L:1552 D:1450 EF:52 EB:406 ET:0 EL:3 ] 2023-12-30 13:40:06 us=639932 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2023-12-30 13:40:06 us=639952 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2023-12-30 13:40:06 us=640005 net_route_v4_best_gw query: dst 0.0.0.0
2023-12-30 13:40:06 us=640152 net_route_v4_best_gw result: via 0.0.0.0 dev
2023-12-30 13:40:06 us=640216 ROUTE_GATEWAY 0.0.0.0
2023-12-30 13:40:06 us=647383 TUN/TAP device tun0 opened
2023-12-30 13:40:06 us=647435 do_ifconfig, ipv4=1, ipv6=0
2023-12-30 13:40:06 us=647526 net_iface_mtu_set: mtu 1500 for tun0
2023-12-30 13:40:06 us=647589 net_iface_up: set tun0 up
2023-12-30 13:40:06 us=647679 net_addr_v4_add: 10.34.0.2/24 dev tun0
2023-12-30 13:40:11 us=798441 net_route_v4_add: 192.168.51.0/24 via 10.34.0.1 dev [NULL] table 0 metric -1 2023-12-30 13:40:11 us=798687 net_route_v4_add: 192.168.51.0/24 via 10.34.0.1 dev [NULL] table 0 metric -1 2023-12-30 13:40:11 us=798778 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-12-30 13:40:11 us=798801 Initialization Sequence Completed


[root@Awyr openvpn]# cat rrc.ovpn
client
dev tun
proto udp
remote 187.251.133.222 1194
persist-key
persist-tun
route-delay 5
ping-restart 10
ping 60
persist-tun
verb 4
ca ca.crt
cert rrc.crt
key rrc.key
remote-cert-tls server
data-ciphers AES-256-GCM
#data-ciphers-fallback AES-128-GCM
status openvpn-status.log
log         openvpn.log
log-append  openvpn.log
mute 20
#script-security 2
#auth-user-pass

Here are Data from the server

[root@narciso openvpn]# sysctl net.ipv4.ip_forward
net.ipv4.ip_forward = 1

NO Firewall on Server - totally open

[root@narciso openvpn]# ip add sh

6: ens2f3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
    link/ether 7c:c2:55:64:0f:87 brd ff:ff:ff:ff:ff:ff
    altname enp81s0f3
    inet 192.168.51.100/24 brd 192.168.51.255 scope global ens2f3
       valid_lft forever preferred_lft forever
inet6 2806:103e:19:5fda:7ec2:55ff:fe64:f87/64 scope global dynamic mngtmpaddr
       valid_lft 2591784sec preferred_lft 2591784sec
    inet6 fe80::7ec2:55ff:fe64:f87/64 scope link
       valid_lft forever preferred_lft forever
7: eno1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
    link/ether 7c:c2:55:27:9e:2c brd ff:ff:ff:ff:ff:ff
    altname enp1s0f0
    inet 187.251.133.222/30 brd 187.251.133.223 scope global eno1
       valid_lft forever preferred_lft forever
    inet6 fe80::7ec2:55ff:fe27:9e2c/64 scope link
       valid_lft forever preferred_lft forever
9: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500
    link/none
    inet 10.34.0.1/24 scope global tun0
       valid_lft forever preferred_lft forever
    inet6 fe80::6b2e:f0a1:97a7:d887/64 scope link stable-privacy
       valid_lft forever preferred_lft forever

IS tun0: <POINTOPOINT correct even thoug I have topo set to subnet?

[root@narciso openvpn]# ip route sh
default via 187.251.133.221 dev eno1 metric 10
10.34.0.0/24 dev tun0 proto kernel scope link src 10.34.0.1
187.251.133.220/30 dev eno1 proto kernel scope link src 187.251.133.222
192.168.51.0/24 dev ens2f3 proto kernel scope link src 192.168.51.100

[root@narciso openvpn]# cat openvpn.log
2023-12-30 13:35:36 OpenVPN 2.5.9 x86_64-mageia-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 21 2023
2023-12-30 13:35:36 library versions: OpenSSL 3.0.12 24 Oct 2023, LZO 2.10
2023-12-30 13:35:36 CRL: loaded 1 CRLs from file crl.pem
2023-12-30 13:35:36 TUN/TAP device tun0 opened
2023-12-30 13:35:36 net_iface_mtu_set: mtu 1500 for tun0
2023-12-30 13:35:36 net_iface_up: set tun0 up
2023-12-30 13:35:36 net_addr_v4_add: 10.34.0.1/24 dev tun0
2023-12-30 13:35:36 Could not determine IPv4/IPv6 protocol. Using AF_INET
2023-12-30 13:35:36 UDPv4 link local (bound): [AF_INET]187.251.133.222:1194
2023-12-30 13:35:36 UDPv4 link remote: [AF_UNSPEC]
2023-12-30 13:35:36 GID set to openvpn
2023-12-30 13:35:36 UID set to openvpn
2023-12-30 13:35:36 Initialization Sequence Completed
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_VER=2.5.0
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_PLAT=linux
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_PROTO=6
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_CIPHERS=AES-256-GCM
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_LZ4=1
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_LZ4v2=1
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_LZO=1
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_COMP_STUB=1
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_COMP_STUBv2=1
2023-12-30 13:40:11 187.251.133.221:1194 peer info: IV_TCPNL=1
2023-12-30 13:40:11 187.251.133.221:1194 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1541' 2023-12-30 13:40:11 187.251.133.221:1194 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1' 2023-12-30 13:40:11 187.251.133.221:1194 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' 2023-12-30 13:40:11 187.251.133.221:1194 [rrc] Peer Connection Initiated with [AF_INET]187.251.133.221:1194 2023-12-30 13:40:11 rrc/187.251.133.221:1194 MULTI_sva: pool returned IPv4=10.34.0.2, IPv6=(Not enabled)

[root@narciso openvpn]# cat server.conf
local 187.251.133.222
port 1194
proto udp
dev tun
ca ca.crt
cert narciso.moov.com.mx.crt
key narciso.moov.com.mx.key  # This file should be kept secret
crl-verify crl.pem
dh dh2048.pem
server 10.34.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
client-config-dir /etc/openvpn/ccd
topology subnet
keepalive 10 120
max-clients 50
user openvpn
group openvpn
persist-key
persist-tun
status openvpn-status.log
log         openvpn.log
log-append  openvpn.log
mute 20
#data-ciphers AES-256-GCM
data-ciphers-fallback AES-256-GCM
explicit-exit-notify 1
push "route 192.168.51.0 255.255.255.0"

#script-security 2
#comp-lzo
#data-ciphers AES_256_GCM:CHACHA20_POLY1305:AES_128_GCM:AES_128_CCM
#data-ciphers-fallback AES-128-GCM
#route 10.30.40.0 255.255.255.0
#route 192.168.101.0 255.255.255.0
#route 192.168.99.0 255.255.255.0
#route 10.30.50.0 255.255.255.0
#route 192.168.1.0 255.255.255.0
#client-to-client
# plugin /usr/lib/openvpn/openvpn-auth-pam.so "login login USERNAME password PASSWORD"
# plugin /usr/lib/openvpn/openvpn-auth-pam.so system-auth
# plugin /usr/lib64/openvpn/plugins/openvpn-plugin-auth-pam.so "login login USERNAME password PASSWORD"
#plugin /usr/lib64/openvpn/plugins/openvpn-plugin-auth-pam.so openvpn

Thanks



Richard



On 12/30/23 05:30, Gert Doering wrote:
Hi,

On Sat, Dec 30, 2023 at 05:26:55AM -0600, Richard Couture wrote:
ifconfig-push 10.34.0.249 10.34.0.250

this is p2p style, it needs to be "something with a netmask" as 2nd
argument - "ifconfig-push 10.34.0.249 255.255.255.0" or such.

gert


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to