zmodyfikowałem lekko konfigurację:
port 1194
proto udp
dev tap0
keepalive 10 120
status /tmp/openvpn-status.log
verb 3
tls-server
ca /etc/openvpn/ca.crt
cert /etc/openvpn/server.crt
key /etc/openvpn/server.key
dh /etc/openvpn/dh.pem
log-append /tmp/openvpn-log.log
server-bridge
push "dhcp-option DNS 192.168.1.1"
push "route-gateway 192.168.1.1"
push "redirect-gateway def1"
comp-lzo adaptive
nie pojawią się już błędy związane z TLS Error ale nadal tylko jeden klient może się połączyć prawidłowo.
Logi:
Thu Jan 28 14:56:13 2016 Diffie-Hellman initialized with 2048 bit key
Thu Jan 28 14:56:13 2016 WARNING: file '/etc/openvpn/server.key' is group or others accessible
Thu Jan 28 14:56:13 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Thu Jan 28 14:56:13 2016 TUN/TAP device tap0 opened
Thu Jan 28 14:56:13 2016 TUN/TAP TX queue length set to 100
Thu Jan 28 14:56:13 2016 UDPv4 link local (bound): [undef]
Thu Jan 28 14:56:13 2016 UDPv4 link remote: [undef]
Thu Jan 28 14:56:13 2016 MULTI: multi_init called, r=256 v=256
Thu Jan 28 14:56:13 2016 Initialization Sequence Completed
Thu Jan 28 14:57:44 2016 185.24.26.12:58588 TLS: Initial packet from [AF_INET]185.24.26.12:58588, sid=5961fcd9 0a243126
Thu Jan 28 14:57:45 2016 185.24.26.12:58588 VERIFY OK: depth=1, C=PL, ST=lubuskie, L=ZielonaGora, O=VPN OPENWRT, OU=MyOrganizationalUnit, CN=VPN OPENWRT CA, name=EasyRSA, emailAddress=xxx@gmail.com
Thu Jan 28 14:57:45 2016 185.24.26.12:58588 VERIFY OK: depth=0, C=PL, ST=lubuskie, L=ZielonaGora, O=VPN OPENWRT, OU=MyOrganizationalUnit, CN=windows_klient1_password, name=EasyRSA, emailAddress=xxx@gmail.com
Thu Jan 28 14:57:45 2016 185.24.26.12:58588 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Jan 28 14:57:45 2016 185.24.26.12:58588 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 28 14:57:45 2016 185.24.26.12:58588 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Jan 28 14:57:45 2016 185.24.26.12:58588 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 28 14:57:45 2016 185.24.26.12:58588 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Thu Jan 28 14:57:45 2016 185.24.26.12:58588 [windows_klient1_password] Peer Connection Initiated with [AF_INET]185.24.26.12:58588
Thu Jan 28 14:57:45 2016 windows_klient1_password/185.24.26.12:58588 MULTI: no dynamic or static remote --ifconfig address is available for windows_klient1_password/185.24.26.12:58588
Thu Jan 28 14:57:48 2016 windows_klient1_password/185.24.26.12:58588 PUSH: Received control message: 'PUSH_REQUEST'
Thu Jan 28 14:57:48 2016 windows_klient1_password/185.24.26.12:58588 send_push_reply(): safe_cap=940
Thu Jan 28 14:57:48 2016 windows_klient1_password/185.24.26.12:58588 SENT CONTROL [windows_klient1_password]: 'PUSH_REPLY,dhcp-option DNS 192.168.1.1,route-gateway 192.168.1.1,redirect-gateway def1,route-gateway dhcp,ping 10,ping-restart 120' (status=1)
Thu Jan 28 14:57:48 2016 windows_klient1_password/185.24.26.12:58588 MULTI: Learn: 00:ff:ce:64:4c:9a -> windows_klient1_password/185.24.26.12:58588
Thu Jan 28 14:59:45 2016 185.24.26.12:61172 TLS: Initial packet from [AF_INET]185.24.26.12:61172, sid=34c9c235 8511bdd8
Thu Jan 28 14:59:46 2016 185.24.26.12:61172 VERIFY OK: depth=1, C=PL, ST=lubuskie, L=ZielonaGora, O=VPN OPENWRT, OU=MyOrganizationalUnit, CN=VPN OPENWRT CA, name=EasyRSA, emailAddress=xxx@gmail.com
Thu Jan 28 14:59:46 2016 185.24.26.12:61172 VERIFY OK: depth=0, C=PL, ST=lubuskie, L=ZielonaGora, O=VPN OPENWRT, OU=MyOrganizationalUnit, CN=tz, name=EasyRSA, emailAddress=xxx@gmail.com
Thu Jan 28 14:59:47 2016 185.24.26.12:61172 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Jan 28 14:59:47 2016 185.24.26.12:61172 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 28 14:59:47 2016 185.24.26.12:61172 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Jan 28 14:59:47 2016 185.24.26.12:61172 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 28 14:59:47 2016 185.24.26.12:61172 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Thu Jan 28 14:59:47 2016 185.24.26.12:61172 [tz] Peer Connection Initiated with [AF_INET]185.24.26.12:61172
Thu Jan 28 14:59:47 2016 tz/185.24.26.12:61172 MULTI: no dynamic or static remote --ifconfig address is available for tz/185.24.26.12:61172
Thu Jan 28 14:59:49 2016 tz/185.24.26.12:61172 PUSH: Received control message: 'PUSH_REQUEST'
Thu Jan 28 14:59:49 2016 tz/185.24.26.12:61172 send_push_reply(): safe_cap=940
Thu Jan 28 14:59:49 2016 tz/185.24.26.12:61172 SENT CONTROL [tz]: 'PUSH_REPLY,dhcp-option DNS 192.168.1.1,route-gateway 192.168.1.1,redirect-gateway def1,route-gateway dhcp,ping 10,ping-restart 120' (status=1)
Cezary pomożesz coś może w temacie?