201

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

OK, bede kombinować.
dzieki!

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

202

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Więc tak smile Podmontowałem zasoby z NAS`a przez NFS do TP-linka i ustawiłem ścieżkę dostępu do /mnt/nas Zapisuje, ale tylko gdy łączę się przez OpenVPN, czyli przez adres: ftp://192.168.1.1 Gdy próbuje przez adres dyndns niestety jest brak strony. Mam zaznaczone oczywiście 'zezwalaj na dostęp WAN'
Nie mogę pokazac firewalla, gdyż jest:

root@Gargoyle:~$ /etc/config/firewall
-ash: /etc/config/firewall: Permission denied
root@Gargoyle:~$ /etc/firewall.user
-ash: /etc/firewall.user: Permission denied
TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

203

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

cat /etc/config/firewall
lub uci show firewall

Pokaż to i jeszcze wynik ifconfig

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

204

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

OK, więc tak:
ipconfig:

root@Gargoyle:~$ ifconfig
br-lan    Link encap:Ethernet  HWaddr B0:48:7A:BE:D6:64
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:33067 errors:0 dropped:0 overruns:0 frame:0
          TX packets:38366 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:9097910 (8.6 MiB)  TX bytes:23895349 (22.7 MiB)

eth0      Link encap:Ethernet  HWaddr B0:48:7A:BE:D6:64
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:87846 errors:0 dropped:0 overruns:185198 frame:0
          TX packets:72360 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:35051147 (33.4 MiB)  TX bytes:33901299 (32.3 MiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr B0:48:7A:BE:D6:64
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:33067 errors:0 dropped:0 overruns:0 frame:0
          TX packets:38366 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:9230198 (8.8 MiB)  TX bytes:24048813 (22.9 MiB)

eth0.2    Link encap:Ethernet  HWaddr B0:48:7A:BE:D6:64
          inet addr:93.175.80.238  Bcast:255.255.255.255  Mask:255.255.248.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:52983 errors:0 dropped:0 overruns:0 frame:0
          TX packets:33992 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:24419609 (23.2 MiB)  TX bytes:9851401 (9.3 MiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:24 errors:0 dropped:0 overruns:0 frame:0
          TX packets:24 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:1854 (1.8 KiB)  TX bytes:1854 (1.8 KiB)

mon.wlan0 Link encap:UNSPEC  HWaddr B0-48-7A-BE-D6-64-00-00-00-00-00-00-00-00-00-00
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:5926 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:32
          RX bytes:778469 (760.2 KiB)  TX bytes:0 (0.0 B)

tun0      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          inet addr:10.8.0.1  P-t-P:10.8.0.1  Mask:255.255.255.0
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

wlan0     Link encap:Ethernet  HWaddr B0:48:7A:BE:D6:64
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:75 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:32
          RX bytes:0 (0.0 B)  TX bytes:28542 (27.8 KiB)

root@Gargoyle:~$

I /etc/config/firewall Nie mieścił mi się cały w PuTTY, więc wklejam zawartość z WinSCP:

config 'defaults'
    option 'syn_flood' '1'
    option 'input' 'ACCEPT'
    option 'output' 'ACCEPT'
    option 'forward' 'REJECT'

config 'zone'
    option 'name' 'lan'
    option 'network' 'lan'
    option 'input' 'ACCEPT'
    option 'output' 'ACCEPT'
    option 'forward' 'REJECT'

config 'zone'
    option 'name' 'wan'
    option 'network' 'wan'
    option 'input' 'REJECT'
    option 'output' 'ACCEPT'
    option 'forward' 'REJECT'
    option 'masq' '1'
    option 'mtu_fix' '1'

config 'forwarding'
    option 'src' 'lan'
    option 'dest' 'wan'

config 'rule'
    option 'name' 'Allow-DHCP-Renew'
    option 'src' 'wan'
    option 'proto' 'udp'
    option 'dest_port' '68'
    option 'target' 'ACCEPT'
    option 'family' 'ipv4'

config 'rule'
    option 'name' 'Allow-Ping'
    option 'src' 'wan'
    option 'proto' 'icmp'
    option 'icmp_type' 'echo-request'
    option 'family' 'ipv4'
    option 'target' 'ACCEPT'

config 'rule'
    option 'name' 'Allow-DHCPv6'
    option 'src' 'wan'
    option 'proto' 'udp'
    option 'src_ip' 'fe80::/10'
    option 'src_port' '547'
    option 'dest_ip' 'fe80::/10'
    option 'dest_port' '546'
    option 'family' 'ipv6'
    option 'target' 'ACCEPT'

config 'rule'
    option 'name' 'Allow-ICMPv6-Input'
    option 'src' 'wan'
    option 'proto' 'icmp'
    list 'icmp_type' 'echo-request'
    list 'icmp_type' 'destination-unreachable'
    list 'icmp_type' 'packet-too-big'
    list 'icmp_type' 'time-exceeded'
    list 'icmp_type' 'bad-header'
    list 'icmp_type' 'unknown-header-type'
    list 'icmp_type' 'router-solicitation'
    list 'icmp_type' 'neighbour-solicitation'
    list 'icmp_type' 'router-advertisement'
    list 'icmp_type' 'neighbour-advertisement'
    option 'limit' '1000/sec'
    option 'family' 'ipv6'
    option 'target' 'ACCEPT'

config 'rule'
    option 'name' 'Allow-ICMPv6-Forward'
    option 'src' 'wan'
    option 'dest' '*'
    option 'proto' 'icmp'
    list 'icmp_type' 'echo-request'
    list 'icmp_type' 'destination-unreachable'
    list 'icmp_type' 'packet-too-big'
    list 'icmp_type' 'time-exceeded'
    list 'icmp_type' 'bad-header'
    list 'icmp_type' 'unknown-header-type'
    option 'limit' '1000/sec'
    option 'family' 'ipv6'
    option 'target' 'ACCEPT'

config 'include'
    option 'path' '/etc/firewall.user'

config 'include'
    option 'path' '/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall'

config 'rule'
    option '_name' 'transmission'
    option 'src' 'wan'
    option 'target' 'ACCEPT'
    option 'proto' 'tcp'
    option 'dest_port' '51413'

config 'rule'
    option '_name' 'transmission_wan'
    option 'src' 'wan'
    option 'target' 'ACCEPT'
    option 'proto' 'tcp'
    option 'dest_port' '9091'

config 'rule'
    option 'target' 'ACCEPT'
    option '_name' 'transmissionsynology'
    option 'src' 'wan'
    option 'proto' 'tcp'
    option 'dest_port' '9091'

config 'redirect' 'redirect_enabled_number_0'
    option 'name' 'xbox'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'tcp'
    option 'src_dport' '3074'
    option 'dest_ip' '192.168.1.102'
    option 'dest_port' '3074'

config 'redirect' 'redirect_enabled_number_1'
    option 'name' 'xbox'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'udp'
    option 'src_dport' '3074'
    option 'dest_ip' '192.168.1.102'
    option 'dest_port' '3074'

config 'redirect' 'redirect_enabled_number_2'
    option 'name' 'laptop'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'tcp'
    option 'src_dport' '14856'
    option 'dest_ip' '192.168.1.103'
    option 'dest_port' '14856'

config 'redirect' 'redirect_enabled_number_3'
    option 'name' 'laptop'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'udp'
    option 'src_dport' '14856'
    option 'dest_ip' '192.168.1.103'
    option 'dest_port' '14856'

config 'redirect' 'redirect_enabled_number_4'
    option 'name' 'torrent'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'tcp'
    option 'src_dport' '14857'
    option 'dest_ip' '192.168.1.101'
    option 'dest_port' '14857'

config 'redirect' 'redirect_enabled_number_5'
    option 'name' 'torrent'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'udp'
    option 'src_dport' '14857'
    option 'dest_ip' '192.168.1.101'
    option 'dest_port' '14857'

config 'redirect' 'redirect_enabled_number_6'
    option 'name' 'utorrent_nas'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'tcp'
    option 'src_dport' '51413'
    option 'dest_ip' '192.168.1.172'
    option 'dest_port' '51413'

config 'redirect' 'redirect_enabled_number_7'
    option 'name' 'utorrent_nas'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'udp'
    option 'src_dport' '51413'
    option 'dest_ip' '192.168.1.172'
    option 'dest_port' '51413'

config 'redirect' 'redirect_enabled_number_8'
    option 'name' 'nsa310-cifs'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'tcp'
    option 'src_dport' '445'
    option 'dest_ip' '192.168.1.172'
    option 'dest_port' '445'

config 'redirect' 'redirect_enabled_number_9'
    option 'name' 'nsa310-cifs'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'udp'
    option 'src_dport' '445'
    option 'dest_ip' '192.168.1.172'
    option 'dest_port' '445'

config 'redirect' 'redirect_enabled_number_10'
    option 'name' 'nsa_hhtp'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'tcp'
    option 'src_dport' '88'
    option 'dest_ip' '192.168.1.172'
    option 'dest_port' '88'

config 'redirect' 'redirect_enabled_number_11'
    option 'name' 'nsa_hhtp'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'udp'
    option 'src_dport' '88'
    option 'dest_ip' '192.168.1.172'
    option 'dest_port' '88'

config 'redirect' 'redirect_enabled_number_12'
    option 'name' 'nsa_ftp'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'tcp'
    option 'src_dport' '21'
    option 'dest_ip' '192.168.1.172'
    option 'dest_port' '21'

config 'redirect' 'redirect_enabled_number_13'
    option 'name' 'nsa_ftp'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'udp'
    option 'src_dport' '21'
    option 'dest_ip' '192.168.1.172'
    option 'dest_port' '21'

config 'redirect' 'redirect_enabled_number_14'
    option 'name' 'torrentNSA'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'tcp'
    option 'src_dport' '9091-9091'
    option 'dest_port' '9091-9091'
    option 'dest_ip' '192.168.1.172'

config 'redirect' 'redirect_enabled_number_15'
    option 'name' 'torrentNSA'
    option 'src' 'wan'
    option 'dest' 'lan'
    option 'proto' 'udp'
    option 'src_dport' '9091-9091'
    option 'dest_port' '9091-9091'
    option 'dest_ip' '192.168.1.172'

config 'remote_accept' 'ra_443_443'
    option 'local_port' '443'
    option 'remote_port' '443'
    option 'proto' 'tcp'
    option 'zone' 'wan'

config 'remote_accept' 'ra_80_80'
    option 'local_port' '80'
    option 'remote_port' '80'
    option 'proto' 'tcp'
    option 'zone' 'wan'

config 'remote_accept' 'ra_22_22'
    option 'local_port' '22'
    option 'remote_port' '22'
    option 'proto' 'tcp'
    option 'zone' 'wan'

config 'zone' 'vpn_zone'
    option 'name' 'vpn'
    option 'network' 'vpn'
    option 'input' 'ACCEPT'
    option 'output' 'ACCEPT'
    option 'forward' 'ACCEPT'
    option 'mtu_fix' '1'
    option 'masq' '1'

config 'forwarding' 'vpn_lan_forwarding'
    option 'src' 'lan'
    option 'dest' 'vpn'

config 'remote_accept' 'ra_openvpn'
    option 'zone' 'wan'
    option 'local_port' '1194'
    option 'remote_port' '1194'
    option 'proto' 'udp'

config 'forwarding' 'vpn_wan_forwarding'
    option 'src' 'vpn'
    option 'dest' 'wan'

config 'rule'
    option '_name' 'openvpn'
    option 'src' 'wan'
    option 'target' 'ACCEPT'
    option 'proto' 'udp'
    option 'dest_port' '1194'

config 'rule' 'ftp_wan'
    option 'src' 'wan'
    option 'target' 'ACCEPT'
    option 'proto' 'tcp'
    option 'dest_port' '21'

Dzieki smile

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

205

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

A ftp://93.175.80.238 możesz się dostać? Zresztą tak samo jak do ssh czy panelu gargoyle czy transmission.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

206

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Nie mam publicznego IP, więc korzystam z dyndns. Przez dydns mogę się dostać do SSH, panelu gargoyle oraz transmission. WinSCP sobie jedynie jeszcze nie ustawiłem. Jedynie FTP nie działa.

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

207

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

To tu też musisz.

zrób ps i zobacz czy proces vsftpd jest uruchomiony. Pokaż też wynik iptables -v -L

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

208

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

ps

root@Gargoyle:~$ ps
  PID USER       VSZ STAT COMMAND
    1 root      1384 S    init
    2 root         0 SW   [kthreadd]
    3 root         0 SW   [ksoftirqd/0]
    4 root         0 SW   [events/0]
    5 root         0 SW   [khelper]
    8 root         0 SW   [async/mgr]
   41 root         0 SW   [sync_supers]
   43 root         0 SW   [bdi-default]
   45 root         0 SW   [kblockd/0]
   71 root         0 SW   [kswapd0]
   72 root         0 SW   [aio/0]
   73 root         0 SW   [crypto/0]
   85 root         0 SW   [mtdblockd]
   91 root         0 SW   [ar71xx-spi]
  223 root         0 SW   [ipolldevd]
  276 root         0 SWN  [jffs2_gcd_mtd3]
  292 root      1384 S    init
  306 root      1388 S    syslogd -C16
  308 root      1372 S    klogd
  322 root       836 S    /sbin/hotplug2 --override --persistent --set-worker /
  518 root         0 SW   [events_nrt]
  561 root         0 SW   [cfg80211]
  692 root         0 SW   [khubd]
  744 root         0 SW   [phy0]
  764 root         0 SW   [rpciod/0]
  788 root         0 SW   [nfsiod]
 1664 root      1472 S    hostapd -P /var/run/wifi-phy0.pid -B /var/run/hostapd
 2110 root      1380 S    /usr/sbin/ntpd -n -p 0.pool.ntp.org -p 1.pool.ntp.org
 2390 root      1132 S    /usr/sbin/dropbear -P /var/run/dropbear.1.pid -p 22
 2399 root       752 S    /usr/sbin/p9100d -b -f /dev/lp0 0
 2500 root      1052 S    /usr/sbin/vsftpd /tmp/vsftpd/vsftpd.conf
 2515 root      1344 S    httpd_gargoyle -c cgi-bin/**|**.sh|**.cgi|**.csv -d /
 2893 nobody     916 S    /usr/sbin/dnsmasq -K -D -y -Z -b -E -s lan -S /lan/ -
 3095 root      1444 S    /usr/bin/ddns_gargoyle -P /etc/ddns_providers.conf -C
 3133 root      1400 S    crond -c /etc/crontabs -l 9
 3144 root      3196 S    /usr/sbin/openvpn --syslog openvpn(custom_config) --w
 3149 root      1380 S    watchdog -t 5 /dev/watchdog
 3301 root      1388 S    udhcpc -t 0 -i eth0.2 -b -p /var/run/dhcp-eth0.2.pid
 3371 root      1204 S    /usr/sbin/dropbear -P /var/run/dropbear.1.pid -p 22
 3376 root      1388 S    -ash
 3681 root      1204 S    /usr/sbin/dropbear -P /var/run/dropbear.1.pid -p 22
 3706 root      1388 S    -ash
 3711 root      1376 R    ps

i iptables -v -l

2       tcp dpt:3074
    0     0 ACCEPT     udp  --  any    any     anywhere             192.168.1.102       udp dpt:3074
    0     0 ACCEPT     tcp  --  any    any     anywhere             TV                  tcp dpt:14856
    0     0 ACCEPT     udp  --  any    any     anywhere             TV                  udp dpt:14856
    0     0 ACCEPT     tcp  --  any    any     anywhere             user-stacjonarny    tcp dpt:14857
    0     0 ACCEPT     udp  --  any    any     anywhere             user-stacjonarny    udp dpt:14857
    0     0 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:51413
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:51413
    0     0 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:microsoft-ds
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:microsoft-ds
    0     0 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:kerberos
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:kerberos
    0     0 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:ftp
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:21
    0     0 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:9091
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:9091

Chain reject (7 references)
 pkts bytes target     prot opt in     out     source               destination 
    3   140 REJECT     tcp  --  any    any     anywhere             anywhere            reject-with tcp-reset
 1329  151K REJECT     all  --  any    any     anywhere             anywhere            reject-with icmp-port-unreachable

Chain syn_flood (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   89  4424 RETURN     tcp  --  any    any     anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50
    0     0 DROP       all  --  any    any     anywhere             anywhere    

Chain zone_lan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
   66  6955 input_lan  all  --  any    any     anywhere             anywhere    
   66  6955 zone_lan_ACCEPT  all  --  any    any     anywhere             anywhere

Chain zone_lan_ACCEPT (2 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     all  --  any    br-lan  anywhere             anywhere    
   66  6955 ACCEPT     all  --  br-lan any     anywhere             anywhere    

Chain zone_lan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  any    br-lan  anywhere             anywhere    
    0     0 DROP       all  --  br-lan any     anywhere             anywhere    

Chain zone_lan_REJECT (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  any    br-lan  anywhere             anywhere    
    0     0 reject     all  --  br-lan any     anywhere             anywhere    

Chain zone_lan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
 4014  291K pf_loopback_B  all  --  any    any     anywhere             anywhere
    0     0 ACCEPT     all  --  br-lan br-lan  anywhere             anywhere    
 4014  291K zone_vpn_ACCEPT  all  --  any    any     anywhere             anywhere
 4014  291K zone_wan_ACCEPT  all  --  any    any     anywhere             anywhere
    0     0 forwarding_lan  all  --  any    any     anywhere             anywhere
    0     0 zone_lan_REJECT  all  --  any    any     anywhere             anywhere

Chain zone_vpn (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    2    96 input_vpn  all  --  any    any     anywhere             anywhere    
    2    96 zone_vpn_ACCEPT  all  --  any    any     anywhere             anywhere

Chain zone_vpn_ACCEPT (4 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     all  --  any    tun0    anywhere             anywhere    
    2    96 ACCEPT     all  --  tun0   any     anywhere             anywhere    

Chain zone_vpn_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  any    tun0    anywhere             anywhere    
    0     0 DROP       all  --  tun0   any     anywhere             anywhere    

Chain zone_vpn_REJECT (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  any    tun0    anywhere             anywhere    
    0     0 reject     all  --  tun0   any     anywhere             anywhere    

Chain zone_vpn_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  444 21312 zone_wan_ACCEPT  all  --  any    any     anywhere             anywhere
    0     0 forwarding_vpn  all  --  any    any     anywhere             anywhere
    0     0 zone_vpn_ACCEPT  all  --  any    any     anywhere             anywhere

Chain zone_wan (1 references)
 pkts bytes target     prot opt in     out     source               destination 
  848  303K ACCEPT     udp  --  any    any     anywhere             anywhere            udp dpt:bootpc
    5   300 ACCEPT     icmp --  any    any     anywhere             anywhere            icmp echo-request
   52  2220 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp dpt:51413
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp dpt:9091
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp dpt:9091
    1    42 ACCEPT     udp  --  any    any     anywhere             anywhere            udp dpt:openvpn
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere            tcp dpt:ftp
 1381  153K input_wan  all  --  any    any     anywhere             anywhere    
 1332  151K zone_wan_REJECT  all  --  any    any     anywhere             anywhere

Chain zone_wan_ACCEPT (3 references)
 pkts bytes target     prot opt in     out     source               destination 
 4872  342K ACCEPT     all  --  any    eth0.2  anywhere             anywhere    
    0     0 ACCEPT     all  --  eth0.2 any     anywhere             anywhere    

Chain zone_wan_DROP (0 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 DROP       all  --  any    eth0.2  anywhere             anywhere    
    0     0 DROP       all  --  eth0.2 any     anywhere             anywhere    

Chain zone_wan_REJECT (2 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 reject     all  --  any    eth0.2  anywhere             anywhere    
 1332  151K reject     all  --  eth0.2 any     anywhere             anywhere    

Chain zone_wan_forward (1 references)
 pkts bytes target     prot opt in     out     source               destination 
    0     0 ACCEPT     tcp  --  any    any     anywhere             192.168.1.102       tcp dpt:3074
    0     0 ACCEPT     udp  --  any    any     anywhere             192.168.1.102       udp dpt:3074
    0     0 ACCEPT     tcp  --  any    any     anywhere             TV                  tcp dpt:14856
    0     0 ACCEPT     udp  --  any    any     anywhere             TV                  udp dpt:14856
    0     0 ACCEPT     tcp  --  any    any     anywhere             user-stacjonarny    tcp dpt:14857
    0     0 ACCEPT     udp  --  any    any     anywhere             user-stacjonarny    udp dpt:14857
 8014  420K ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:51413
59291 6926K ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:51413
    0     0 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:microsoft-ds
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:microsoft-ds
    0     0 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:kerberos
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:kerberos
   15   728 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:ftp
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:21
    1    48 ACCEPT     tcp  --  any    any     anywhere             nsa310              tcp dpt:9091
    0     0 ACCEPT     udp  --  any    any     anywhere             nsa310              udp dpt:9091
    0     0 forwarding_wan  all  --  any    any     anywhere             anywhere
    0     0 zone_wan_REJECT  all  --  any    any     anywhere             anywhere
root@Gargoyle:~$

Nie jest całe, da sie w PuTTY zobaczyć brakującą cześć? Obecnie łączę się przez dyndns. OpenVPN, który działa super, narazie jest wyłączony.

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

209

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Po prostu przewiń ekran.

Zauważyłeś że masz i otwarty port dla ftp i jednocześnie przekierowany z wan port 21 na nsa310              ? Tak się nie da, albo to albo to.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

210

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Fakt, wyłączyłem tę wartość i działa smile Dziwne, bo nie dodawałem jej. Jest to możliwe, że w NAS, sam dodał port 21 do przekierowania? Postaram się pokombinować z montowaniem zasobów przez NFS lub CIFS do routera i to udostepnić przez FTP
Co do OpenVPN - świetne, naprawne świetne narzędzie. Dzieki za pomoc.
pozdrawiam

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

211

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Nazewnictwo reguły jednak sugeruje że zrobiłeś to samodzielnie z gui. Jedyną ew. możliwością przekierowania portu przez nas było by UPNP, ale tego w regułach byś nie miał.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

212

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Nie mogę sie z tym nie zgodzić smile Pewnie przez przypadek to zrobiłem. Ale w każdym bądź razie jest to logiczne dla mnie, że nie działało. Jeśli mógłbym prosić o wytłumaczenie jednej rzeczy. Próbowałem udostępnić zasoby NAS`a przez NFS, ale oprogramowanie ZyXELL`a pozwala tylko i wyłącznie tworzyć nowe udziały, a nie udostępniać istniejące. Używam w NAS FFP sticka, ale chyba tam nie ma możliwości wgrania innego NFS. Zdecydowałem się na CIFS. Zaisntalowałem na TP-Linku odpowiednie pakiety i generalnie działa. Ale generalnie. Gdy przez GUI ustawię ściężkę do podmontowanego zasobu tj.: /mnt/nas i dam dostęp anonimowy bez zapisu, to mogę przeglądać i kopiować dane. Natomiast gdy zaznaczę zapis na anonimowym, lub stworzę nowego usera z zapisem, to niestety nie mogę nic zapisać. Stworzyłem nowego usera, o nazwie jakiej używam w Sambie NAS`a i takim samym hasłem, ale to też nic nie dało. Rozumiem, że hasła i userzy z Samby to co innego niż w Linuxie? Gdy na TP-linku daje start i stop usługi ftp jest:

root@Gargoyle:~$ /etc/init.d/vsftpd stop
Terminated
root@Gargoyle:~$ /etc/init.d/vsftpd start
Changing password for admin
New password:
Retype password:
Password for admin changed by root

Moje pytanie, czy jest możliwość zapisywania przez FTP na ZyXELL`a korzystając z zamontowanego zasobu przez CIFS? smile Dziwne to pytanie, ale mam nadzieje, że sensowne.
dzieki

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

213

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Ale - mówisz o jednej rzeczy a piszesz o drugiej. W tej chwili wypisałeś o trzech usługach na openwrt które nie są tym samym -  nfs, ftp i samba (cifs). I jeszcze zyxela do tego dokładasz smile. GUI z gargoyle nie zawiera opcji montowania zasobów przez nfs czy cfis tylko udostępniania zasobów lokalnych.

Więc co chcesz i gdzie chcesz udostępnić? smile

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

214 (edytowany przez dorado 2012-08-25 14:20:39)

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Masło maślane, fakt, sorry smile Więc tak, chcę udostępnić istniejący na ZyXELL`u katalog przez CIFS do TP-Linka, aby tego udostępnić z zapisywaniem przez FTP. Mniej więcej tak smile Oryginalny firmware ZyXELL`a niestety nie umożliwia udostępniania istniejących folderów przez NFS, tylko nowo powstałe. Więc zostaje mi tylko CIFS, tak?  smile
Obecnie podmontowałem ZyXELL`a przez CIFS do TP-Linka. Jest to zamontowane z /mnt/zyxel Ale nie mam możliwości zapisu przez FTP

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

215

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Wejdź do routera, wejdź do katalogu /mnt/zyxel i zrób touch test.txt. Utworzył się? Jak nie to masz problem z udostępnienien zasobów na zyxelu.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

216

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Zrobiłem jak mówiłeś i utworzył się.

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

217

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

No to teraz tylko chmod 777 /mnt/zyxel i uruchom ftp na nim.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

218

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Zrobiłem tak i nie mogę przez FTP nic zapisać smile Przez PuTTY jak najbardziej.
Oto log z mount

//192.168.1.172/public on /mnt/zyxel type cifs (rw,mand,relatime,unc=\\192.168.1.172\public,username=root,uid=0,noforceuid,gid=0,noforcegid,addr=192.168.1.172,file_mode=0755,dir_mode=0755,serverino,rsize=16384,wsize=57344)

Zamontowałem poleceniem:
root@Gargoyle:~$ mount.cifs \\\\192.168.1.172\\public /mnt/zyxel -o user=user

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

219

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

ls -al /mnt/zyxel pokaż

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

220 (edytowany przez dorado 2012-08-26 16:28:06)

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Jakieś pierdoły po nagrywałem

root@Gargoyle:~$ ls -al /mnt/zyxel
drwxr-xr-x    1 root     root            0 Aug 25 18:58 .
drwxrwxrwx    4 root     root            0 Aug 25 18:45 ..
-rwxr-xr-x    1 root     root       873251 Aug 19 17:17 GT_Racing_Motor_Academy_PL.jar
-rwxr-xr-x    1 root     root      1143813 Aug 21 09:04 MiploSyncSetup-release-1901.exe
-rwxr-xr-x    1 root     root       169789 Jul 26  2009 Supreme_Com_320x240.jar
-rwxr-xr-x    1 root     root            0 Aug 25 18:47 test.txt
-rwxr-xr-x    1 root     root            0 Aug 25 18:47 test2.txt
-rwxr-xr-x    1 root     root            0 Aug 25 18:47 test3.txt

Pliki test tworzyłem przez PuTTy. Pojawiały się również na ZyXELL`u

I dmesg | tail

CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: cifs_mount failed w/return code = -13
 CIFS VFS: Autodisabling the use of server inode numbers on \\192.168.1.172\publ                                ic. This server doesn't seem to support them properly. Hardlinks will not be rec                                ognized on this mount. Consider mounting with the "noserverino" option to silenc                                e this message.

Mam zainstalowane pakiety:
cifsmount - 1.5-2
kmod-fs-cifs - 2.6.32.27-1cj



EDIT: Zrobiłem. Dodałem przy montowaniu zasobów przez cifs, coś takiego:
mount.cifs \\\ipserwera\\zasob /mnt/zyxel -o user=admin,iocharset=utf8,file_mode=0777,dir_mode=0777

Zapytał o hasło i działa, mogę zapisywać. Poszukam na forum, bo było jak dodać do autostartu te montowanie.
dzieki i pozdrawiam

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

221

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Witam
Uruchomiłem dziś Aero2. Ale niestety nie mogę się połączyć przez OpenVPN z internetem. Bez niego wszystko działa OK. Oto log z logread:

Jan  2 21:40:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2500 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:40:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2500 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:40:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2500 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: MULTI: multi_create_instance called
Jan  2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Re-using SSL/TLS context
Jan  2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 LZO compression initialized
Jan  2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Jan  2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Jan  2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 TLS: Initial packet from 78.30.106.27:2672, sid=4c91a95b cb40db57
Jan  2 21:41:18 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 VERIFY OK: depth=1, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Jan  2 21:41:18 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 VERIFY OK: depth=0, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=client1/name=client1/emailAddress=client1@.com
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 [client1] Peer Connection Initiated with 78.30.106.27:2672
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificat
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/client1
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: MULTI: Learn: 10.8.0.2 -> client1/78.30.106.27:2672
Jan  2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: MULTI: primary virtual IP for client1/78.30.106.27:2672: 10.8.0.2
Jan  2 21:41:26 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 PUSH: Received control message: 'PUSH_REQUEST'
Jan  2 21:41:26 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 SENT CONTROL [client1]: 'PUSH_REPLY,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.1.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.0'
Jan  2 21:41:36 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:36 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:37 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:40 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:43 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:44 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:54 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:41:56 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:05 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:08 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:11 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:13 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:13 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:15 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:21 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:23 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:25 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:33 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:33 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:34 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:35 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:35 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:35 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:41 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:41 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:43 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:44 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:45 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:48 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:50 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:50 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 Replay-window backtrack occurred [7]
Jan  2 21:42:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:54 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:54 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:54 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:56 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:56 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:56 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:57 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan  2 21:42:57 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Success

I w kliencie OpenVPN na kompie

Wed Jan 02 21:42:34 2013 us=812000 Replay-window backtrack occurred [2]

Dodać jeszcze jakieś logi?

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

222

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Tzn masz serwer openvpn na aero2? Zapomnij, porty wejściowe są blokowane, jak u każdego operatora komórkowego.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

223

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Nie, nie. Źle się wyraziłem. Serwer OpenVPN jest bez zmian na Tp-linku. Natomiast laptop łączę obecnie przez Aero2 z siecią OpenVPN która kiedyś działała, ale na publicznych pkt dostępowych.

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

224 (edytowany przez dorado 2013-01-11 12:21:56)

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Wracając do tematu. Oto mój log:

Fri Jan 11 11:20:43 2013 us=125000 Current Parameter Settings:
Fri Jan 11 11:20:43 2013 us=125000   config = 'client1.ovpn'
Fri Jan 11 11:20:43 2013 us=125000   mode = 0
Fri Jan 11 11:20:43 2013 us=125000   show_ciphers = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   show_digests = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   show_engines = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   genkey = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   key_pass_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   show_tls_ciphers = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 Connection profiles [default]:
Fri Jan 11 11:20:43 2013 us=125000   proto = udp
Fri Jan 11 11:20:43 2013 us=125000   local = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   local_port = 0
Fri Jan 11 11:20:43 2013 us=125000   remote = 'publiczny dndns .org'
Fri Jan 11 11:20:43 2013 us=125000   remote_port = 1194
Fri Jan 11 11:20:43 2013 us=125000   remote_float = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   bind_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   bind_local = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   connect_retry_seconds = 5
Fri Jan 11 11:20:43 2013 us=125000   connect_timeout = 10
Fri Jan 11 11:20:43 2013 us=125000   connect_retry_max = 0
Fri Jan 11 11:20:43 2013 us=125000   socks_proxy_server = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   socks_proxy_port = 0
Fri Jan 11 11:20:43 2013 us=125000   socks_proxy_retry = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 Connection profiles END
Fri Jan 11 11:20:43 2013 us=125000   remote_random = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   ipchange = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   dev = 'tun'
Fri Jan 11 11:20:43 2013 us=125000   dev_type = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   dev_node = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   lladdr = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   topology = 3
Fri Jan 11 11:20:43 2013 us=125000   tun_ipv6 = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   ifconfig_local = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   ifconfig_remote_netmask = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   ifconfig_noexec = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   ifconfig_nowarn = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   shaper = 0
Fri Jan 11 11:20:43 2013 us=125000   tun_mtu = 1500
Fri Jan 11 11:20:43 2013 us=125000   tun_mtu_defined = ENABLED
Fri Jan 11 11:20:43 2013 us=125000   link_mtu = 1500
Fri Jan 11 11:20:43 2013 us=125000   link_mtu_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   tun_mtu_extra = 0
Fri Jan 11 11:20:43 2013 us=125000   tun_mtu_extra_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   fragment = 0
Fri Jan 11 11:20:43 2013 us=125000   mtu_discover_type = -1
Fri Jan 11 11:20:43 2013 us=125000   mtu_test = 0
Fri Jan 11 11:20:43 2013 us=125000   mlock = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   keepalive_ping = 0
Fri Jan 11 11:20:43 2013 us=125000   keepalive_timeout = 0
Fri Jan 11 11:20:43 2013 us=125000   inactivity_timeout = 0
Fri Jan 11 11:20:43 2013 us=125000   ping_send_timeout = 0
Fri Jan 11 11:20:43 2013 us=125000   ping_rec_timeout = 0
Fri Jan 11 11:20:43 2013 us=125000   ping_rec_timeout_action = 0
Fri Jan 11 11:20:43 2013 us=125000   ping_timer_remote = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   remap_sigusr1 = 0
Fri Jan 11 11:20:43 2013 us=125000   explicit_exit_notification = 0
Fri Jan 11 11:20:43 2013 us=125000   persist_tun = ENABLED
Fri Jan 11 11:20:43 2013 us=125000   persist_local_ip = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   persist_remote_ip = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   persist_key = ENABLED
Fri Jan 11 11:20:43 2013 us=125000   mssfix = 1450
Fri Jan 11 11:20:43 2013 us=125000   resolve_retry_seconds = 1000000000
Fri Jan 11 11:20:43 2013 us=125000   username = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   groupname = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   chroot_dir = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   cd_dir = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   writepid = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   up_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   down_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000   down_pre = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   up_restart = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   up_delay = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   daemon = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   inetd = 0
Fri Jan 11 11:20:43 2013 us=125000   log = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   suppress_timestamps = DISABLED
Fri Jan 11 11:20:43 2013 us=125000   nice = 0
Fri Jan 11 11:20:43 2013 us=125000   verbosity = 5
Fri Jan 11 11:20:43 2013 us=125000   mute = 0
Fri Jan 11 11:20:43 2013 us=125000   gremlin = 0
Fri Jan 11 11:20:43 2013 us=125000   status_file = 'current_status'
Fri Jan 11 11:20:43 2013 us=125000   status_file_version = 1
Fri Jan 11 11:20:43 2013 us=125000   status_file_update_freq = 60
Fri Jan 11 11:20:43 2013 us=125000   occ = ENABLED
Fri Jan 11 11:20:43 2013 us=125000   rcvbuf = 0
Fri Jan 11 11:20:43 2013 us=125000   sndbuf = 0
Fri Jan 11 11:20:43 2013 us=125000   sockflags = 0
Fri Jan 11 11:20:43 2013 us=140000   fast_io = DISABLED
Fri Jan 11 11:20:43 2013 us=140000   lzo = 7
Fri Jan 11 11:20:43 2013 us=140000   route_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=140000   route_default_gateway = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=140000   route_default_metric = 0
Fri Jan 11 11:20:43 2013 us=140000   route_noexec = DISABLED
Fri Jan 11 11:20:43 2013 us=140000   route_delay = 5
Fri Jan 11 11:20:43 2013 us=140000   route_delay_window = 30
Fri Jan 11 11:20:43 2013 us=140000   route_delay_defined = ENABLED
Fri Jan 11 11:20:43 2013 us=140000   route_nopull = DISABLED
Fri Jan 11 11:20:43 2013 us=140000   route_gateway_via_dhcp = DISABLED
Fri Jan 11 11:20:43 2013 us=140000   max_routes = 100
Fri Jan 11 11:20:43 2013 us=140000   allow_pull_fqdn = DISABLED
Fri Jan 11 11:20:43 2013 us=140000   management_addr = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=140000   management_port = 0
Fri Jan 11 11:20:43 2013 us=140000   management_user_pass = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000   management_log_history_cache = 250
Fri Jan 11 11:20:43 2013 us=171000   management_echo_buffer_size = 100
Fri Jan 11 11:20:43 2013 us=171000   management_write_peer_info_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000   management_client_user = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000   management_client_group = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000   management_flags = 0
Fri Jan 11 11:20:43 2013 us=171000   shared_secret_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000   key_direction = 0
Fri Jan 11 11:20:43 2013 us=171000   ciphername_defined = ENABLED
Fri Jan 11 11:20:43 2013 us=171000   ciphername = 'BF-CBC'
Fri Jan 11 11:20:43 2013 us=171000   authname_defined = ENABLED
Fri Jan 11 11:20:43 2013 us=171000   authname = 'SHA1'
Fri Jan 11 11:20:43 2013 us=171000   prng_hash = 'SHA1'
Fri Jan 11 11:20:43 2013 us=171000   prng_nonce_secret_len = 16
Fri Jan 11 11:20:43 2013 us=171000   keysize = 16
Fri Jan 11 11:20:43 2013 us=203000   engine = DISABLED
Fri Jan 11 11:20:43 2013 us=203000   replay = ENABLED
Fri Jan 11 11:20:43 2013 us=203000   mute_replay_warnings = DISABLED
Fri Jan 11 11:20:43 2013 us=203000   replay_window = 64
Fri Jan 11 11:20:43 2013 us=203000   replay_time = 15
Fri Jan 11 11:20:43 2013 us=203000   packet_id_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   use_iv = ENABLED
Fri Jan 11 11:20:43 2013 us=203000   test_crypto = DISABLED
Fri Jan 11 11:20:43 2013 us=203000   tls_server = DISABLED
Fri Jan 11 11:20:43 2013 us=203000   tls_client = ENABLED
Fri Jan 11 11:20:43 2013 us=203000   key_method = 2
Fri Jan 11 11:20:43 2013 us=203000   ca_file = 'ca.crt'
Fri Jan 11 11:20:43 2013 us=203000   ca_path = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   dh_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   cert_file = 'client1.crt'
Fri Jan 11 11:20:43 2013 us=203000   priv_key_file = 'client1.key'
Fri Jan 11 11:20:43 2013 us=203000   pkcs12_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   cryptoapi_cert = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   cipher_list = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   tls_verify = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   tls_export_cert = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   tls_remote = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   crl_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000   ns_cert_type = 64
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000   remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000   remote_cert_eku = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=234000   tls_timeout = 2
Fri Jan 11 11:20:43 2013 us=234000   renegotiate_bytes = 0
Fri Jan 11 11:20:43 2013 us=234000   renegotiate_packets = 0
Fri Jan 11 11:20:43 2013 us=234000   renegotiate_seconds = 3600
Fri Jan 11 11:20:43 2013 us=234000   handshake_window = 60
Fri Jan 11 11:20:43 2013 us=234000   transition_window = 3600
Fri Jan 11 11:20:43 2013 us=234000   single_session = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   push_peer_info = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   tls_exit = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   tls_auth_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_pin_cache_period = -1
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_id = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=281000   pkcs11_id_management = DISABLED
Fri Jan 11 11:20:43 2013 us=281000   server_network = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=281000   server_netmask = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=281000   server_bridge_ip = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   server_bridge_netmask = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   server_bridge_pool_start = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   server_bridge_pool_end = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   ifconfig_pool_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=296000   ifconfig_pool_start = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   ifconfig_pool_end = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   ifconfig_pool_netmask = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   ifconfig_pool_persist_filename = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000   ifconfig_pool_persist_refresh_freq = 600
Fri Jan 11 11:20:43 2013 us=296000   n_bcast_buf = 256
Fri Jan 11 11:20:43 2013 us=296000   tcp_queue_limit = 64
Fri Jan 11 11:20:43 2013 us=296000   real_hash_size = 256
Fri Jan 11 11:20:43 2013 us=296000   virtual_hash_size = 256
Fri Jan 11 11:20:43 2013 us=296000   client_connect_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000   learn_address_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000   client_disconnect_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000   client_config_dir = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000   ccd_exclusive = DISABLED
Fri Jan 11 11:20:43 2013 us=296000   tmp_dir = 'C:\DOCUME~1\UYTKOW~1\USTAWI~1\Temp\'
Fri Jan 11 11:20:43 2013 us=296000   push_ifconfig_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=296000   push_ifconfig_local = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   push_ifconfig_remote_netmask = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000   enable_c2c = DISABLED
Fri Jan 11 11:20:43 2013 us=296000   duplicate_cn = DISABLED
Fri Jan 11 11:20:43 2013 us=296000   cf_max = 0
Fri Jan 11 11:20:43 2013 us=296000   cf_per = 0
Fri Jan 11 11:20:43 2013 us=296000   max_clients = 1024
Fri Jan 11 11:20:43 2013 us=296000   max_routes_per_client = 256
Fri Jan 11 11:20:43 2013 us=312000   auth_user_pass_verify_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=312000   auth_user_pass_verify_script_via_file = DISABLED
Fri Jan 11 11:20:43 2013 us=312000   ssl_flags = 0
Fri Jan 11 11:20:43 2013 us=312000   client = ENABLED
Fri Jan 11 11:20:43 2013 us=312000   pull = ENABLED
Fri Jan 11 11:20:43 2013 us=312000   auth_user_pass_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=312000   show_net_up = DISABLED
Fri Jan 11 11:20:43 2013 us=312000   route_method = 0
Fri Jan 11 11:20:43 2013 us=312000   ip_win32_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=312000   ip_win32_type = 3
Fri Jan 11 11:20:43 2013 us=312000   dhcp_masq_offset = 0
Fri Jan 11 11:20:43 2013 us=312000   dhcp_lease_time = 31536000
Fri Jan 11 11:20:43 2013 us=312000   tap_sleep = 0
Fri Jan 11 11:20:43 2013 us=312000   dhcp_options = DISABLED
Fri Jan 11 11:20:43 2013 us=312000   dhcp_renew = DISABLED
Fri Jan 11 11:20:43 2013 us=312000   dhcp_pre_release = DISABLED
Fri Jan 11 11:20:43 2013 us=343000   dhcp_release = DISABLED
Fri Jan 11 11:20:43 2013 us=343000   domain = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=343000   netbios_scope = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=343000   netbios_node_type = 0
Fri Jan 11 11:20:43 2013 us=343000   disable_nbt = DISABLED
Fri Jan 11 11:20:43 2013 us=343000 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Fri Jan 11 11:20:43 2013 us=343000 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Fri Jan 11 11:20:43 2013 us=500000 LZO compression initialized
Fri Jan 11 11:20:43 2013 us=500000 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jan 11 11:20:43 2013 us=515000 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Jan 11 11:20:43 2013 us=515000 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jan 11 11:20:43 2013 us=515000 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jan 11 11:20:43 2013 us=515000 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jan 11 11:20:43 2013 us=515000 Local Options hash (VER=V4): '41690919'
Fri Jan 11 11:20:43 2013 us=515000 Expected Remote Options hash (VER=V4): '530fdded'
Fri Jan 11 11:20:43 2013 us=531000 UDPv4 link local: [undef]
Fri Jan 11 11:20:43 2013 us=531000 UDPv4 link remote: xxx.xxx.xxx.xxx.:1194
Fri Jan 11 11:20:43 2013 us=640000 TLS: Initial packet from xxx.xxx.xxx.xxx:1194, sid=0c353331 9b885437
Fri Jan 11 11:20:44 2013 us=468000 VERIFY OK: depth=1, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Fri Jan 11 11:20:44 2013 us=484000 VERIFY OK: nsCertType=SERVER
Fri Jan 11 11:20:44 2013 us=484000 VERIFY OK: depth=0, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Fri Jan 11 11:20:45 2013 us=843000 NOTE: Options consistency check may be skewed by version differences
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'version' is used inconsistently, local='version V4', remote='version V0 UNDEF'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'dev-type' is present in local config but missing in remote config, local='dev-type tun'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'link-mtu' is present in local config but missing in remote config, local='link-mtu 1542'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'tun-mtu' is present in local config but missing in remote config, local='tun-mtu 1500'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'proto' is present in local config but missing in remote config, local='proto UDPv4'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'cipher' is present in local config but missing in remote config, local='cipher BF-CBC'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'auth' is present in local config but missing in remote config, local='auth SHA1'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'keysize' is present in local config but missing in remote config, local='keysize 128'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'key-method' is present in local config but missing in remote config, local='key-method 2'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'tls-server' is present in local config but missing in remote config, local='tls-server'
Fri Jan 11 11:20:45 2013 us=843000 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Jan 11 11:20:45 2013 us=843000 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jan 11 11:20:45 2013 us=843000 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Jan 11 11:20:45 2013 us=843000 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jan 11 11:20:45 2013 us=843000 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Fri Jan 11 11:20:45 2013 us=843000 [mfnlhglfmebsrho] Peer Connection Initiated with xxx.xxx.xxx.xxx:1194
Fri Jan 11 11:20:48 2013 us=109000 SENT CONTROL [mfnlhglfmebsrho]: 'PUSH_REQUEST' (status=1)
Fri Jan 11 11:20:48 2013 us=296000 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.1.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.0'
Fri Jan 11 11:20:48 2013 us=296000 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jan 11 11:20:48 2013 us=296000 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jan 11 11:20:48 2013 us=296000 OPTIONS IMPORT: route options modified
Fri Jan 11 11:20:48 2013 us=296000 OPTIONS IMPORT: route-related options modified
Fri Jan 11 11:20:48 2013 us=359000 ROUTE default_gateway=78.30.101.206
Fri Jan 11 11:20:48 2013 us=390000 TAP-WIN32 device [Połączenie lokalne OpenVPN] opened: \\.\Global\{9EF02630-0B5D-4705-8C0E-36B4A3DE8962}.tap
Fri Jan 11 11:20:48 2013 us=390000 TAP-Win32 Driver Version 9.9 
Fri Jan 11 11:20:48 2013 us=390000 TAP-Win32 MTU=1500
Fri Jan 11 11:20:48 2013 us=406000 Set TAP-Win32 TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Fri Jan 11 11:20:48 2013 us=406000 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {9EF02630-0B5D-4705-8C0E-36B4A3DE8962} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Fri Jan 11 11:20:48 2013 us=406000 Successful ARP Flush on interface [3] {9EF02630-0B5D-4705-8C0E-36B4A3DE8962}
Fri Jan 11 11:20:53 2013 us=546000 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Fri Jan 11 11:20:53 2013 us=546000 C:\WINDOWS\system32\route.exe ADD xxx.xxx.xxx.xxx MASK 255.255.255.255 78.30.101.206
Fri Jan 11 11:20:53 2013 us=546000 Route addition via IPAPI succeeded [adaptive]
Fri Jan 11 11:20:53 2013 us=546000 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Fri Jan 11 11:20:53 2013 us=546000 Route addition via IPAPI succeeded [adaptive]
Fri Jan 11 11:20:53 2013 us=546000 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Fri Jan 11 11:20:53 2013 us=562000 Route addition via IPAPI succeeded [adaptive]
Fri Jan 11 11:20:53 2013 us=562000 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.8.0.1
Fri Jan 11 11:20:53 2013 us=562000 Route addition via IPAPI succeeded [adaptive]
Fri Jan 11 11:20:53 2013 us=562000 Initialization Sequence Completed
Fri Jan 11 11:33:00 2013 us=328000 Replay-window backtrack occurred [1]
Fri Jan 11 11:33:00 2013 us=796000 Replay-window backtrack occurred [3]

I log z gargoyle:

Jan 11 09:50:42 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/151.248.33.83:1171 MULTI: bad source address from client [151.248.33.83], packet dropped
Jan 11 09:52:01 Gargoyle cron.err crond[19557]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:52:03 Gargoyle cron.err crond[19608]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:52:11 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
Jan 11 09:52:12 Gargoyle user.info firewall: adding wan (eth0.2) to zone wan
Jan 11 09:52:16 Gargoyle cron.err crond[20252]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:52:21 Gargoyle cron.err crond[20893]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:19 Gargoyle cron.err crond[21158]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:20 Gargoyle cron.err crond[21209]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:28 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
Jan 11 09:54:28 Gargoyle user.info firewall: adding wan (eth0.2) to zone wan
Jan 11 09:54:31 Gargoyle user.info firewall: adding vpn (tun0) to zone vpn
Jan 11 09:54:34 Gargoyle cron.err crond[21897]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:38 Gargoyle cron.err crond[22538]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:38 Gargoyle daemon.err openvpn(custom_config)[1870]: event_wait : Interrupted system call (code=4)
Jan 11 09:54:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: TCP/UDP: Closing socket
Jan 11 09:54:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: Closing TUN/TAP interface
Jan 11 09:54:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: /sbin/ifconfig tun0 0.0.0.0
Jan 11 09:54:39 Gargoyle daemon.notice openvpn(custom_config)[1870]: SIGTERM[hard,] received, process exiting
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: OpenVPN 2.2.2 mips-openwrt-linux [SSL] [LZO2] [EPOLL] built on Jul  6 2012
Jan 11 09:54:40 Gargoyle daemon.warn openvpn(custom_config)[22575]: NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: Diffie-Hellman initialized with 1024 bit key
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: Socket Buffers: R=[114688->131072] S=[114688->131072]
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: TUN/TAP device tun0 opened
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: TUN/TAP TX queue length set to 100
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: /sbin/ifconfig tun0 10.8.0.1 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: UDPv4 link local (bound): [undef]:1194
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: UDPv4 link remote: [undef]
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: MULTI: multi_init called, r=256 v=256
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: Initialization Sequence Completed
Jan 11 09:54:41 Gargoyle user.notice ifup: Enabling Router Solicitations on vpn (tun0)
Jan 11 09:54:41 Gargoyle user.info firewall: removing vpn (tun0) from zone vpn
Jan 11 09:54:42 Gargoyle user.info firewall: adding vpn (tun0) to zone vpn
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: MULTI: multi_create_instance called
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Re-using SSL/TLS context
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 LZO compression initialized
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 TLS: Initial packet from 151.248.33.83:1407, sid=ff51f33d dc81fc68
Jan 11 09:56:26 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 VERIFY OK: depth=1, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Jan 11 09:56:26 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 VERIFY OK: depth=0, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=client1/name=client1/emailAddress=client1@.com
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 [client1] Peer Connection Initiated with 151.248.33.83:1407
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/client1
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 MULTI: Learn: 10.8.0.2 -> client1/151.248.33.83:1407
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 MULTI: primary virtual IP for client1/151.248.33.83:1407: 10.8.0.2
Jan 11 09:56:29 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 PUSH: Received control message: 'PUSH_REQUEST'
Jan 11 09:56:29 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 SENT CONTROL [client1]: 'PUSH_REPLY,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.1.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.
Jan 11 09:56:53 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 Replay-window backtrack occurred [1]
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     service provider=dyndns.com
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     domain=publiczny.org
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:         Successfully retrieved local ip from url: http://checkip.org
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     local IP  = xxx.xxx.xxx.xxx
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     remote IP = xxx.xxx.xxx.xxx
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     Update not needed, IPs match
Jan 11 10:06:42 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 [client1] Inactivity timeout (--ping-restart), restarting
Jan 11 10:06:42 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 SIGUSR1[soft,ping-restart] received, client-instance restarting
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:     service provider=dyndns.com
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:     domain=publiczny.org
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:         Successfully retrieved local ip from url: http://automation.whatismyip.com/n09230945.asp
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:     local IP  = xxx.xxx.xxx.xxx
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:     remote IP = xxx.xxx.xxx.xxx
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:     Update not needed, IPs match
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:     service provider=dyndns.com
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:     domain=publiczny.org
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:         Could not determine local ip from url: http://myip.dk
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:         Successfully retrieved local ip from url: http://www.ip-address.org
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:     local IP  = xxx.xxx.xxx.xxx
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:     remote IP = xxx.xxx.xxx.xxx
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:     Update not needed, IPs match
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]:     service provider=dyndns.com
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]:     domain=publiczny.org
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]:         Successfully retrieved local ip from url: http://my-ip-address.com
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]:     local IP  = xxx.xxx.xxx.xxx
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]:     remote IP = xxx.xxx.xxx.xxx
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]:     Update not needed, IPs match
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     service provider=dyndns.com
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     domain=publiczny.org
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:         Successfully retrieved local ip from url: http://www.selfseo.com/what_is_my_ip.php
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     local IP  = xxx.xxx.xxx.xxx
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     remote IP = xxx.xxx.xxx.xxx
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]:     Update not needed, IPs match
Jan 11 11:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 11:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:     service provider=dyndns.com
Jan 11 11:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:     domain=publiczny.org
Jan 11 11:18:38 Gargoyle daemon.info ddns_gargoyle[1835]:         Could not determine local ip from url: http://aruljohn.com
Jan 11 11:18:39 Gargoyle daemon.info ddns_gargoyle[1835]:         Successfully retrieved local ip from url: http://www.lawrencegoetz.com/programs/ipinfo/
Jan 11 11:18:39 Gargoyle daemon.info ddns_gargoyle[1835]:     local IP  = xxx.xxx.xxx.xxx
Jan 11 11:18:39 Gargoyle daemon.info ddns_gargoyle[1835]:     remote IP = xxx.xxx.xxx.xxx
Jan 11 11:18:39 Gargoyle daemon.info ddns_gargoyle[1835]:     Update not needed, IPs match
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: MULTI: multi_create_instance called
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Re-using SSL/TLS context
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 LZO compression initialized
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 TLS: Initial packet from 78.30.101.205:1047, sid=d942d7a5 fc470baa
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 VERIFY OK: depth=1, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 VERIFY OK: depth=0, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=client1/name=client1/emailAddress=client1@.com
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 [client1] Peer Connection Initiated with 78.30.101.205:1047
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/client1
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 MULTI: Learn: 10.8.0.2 -> client1/78.30.101.205:1047
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 MULTI: primary virtual IP for client1/78.30.101.205:1047: 10.8.0.2
Jan 11 11:20:37 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 PUSH: Received control message: 'PUSH_REQUEST'
Jan 11 11:20:37 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 SENT CONTROL [client1]: 'PUSH_REPLY,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.1.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.
Jan 11 11:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 11:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:     service provider=dyndns.com
Jan 11 11:33:38 Gargoyle daemon.info ddns_gargoyle[1835]:     domain=publiczny.org
Jan 11 11:33:39 Gargoyle daemon.info ddns_gargoyle[1835]:         Successfully retrieved local ip from url: http://myipinfo.net
Jan 11 11:33:39 Gargoyle daemon.info ddns_gargoyle[1835]:     local IP  = xxx.xxx.xxx.xxx
Jan 11 11:33:39 Gargoyle daemon.info ddns_gargoyle[1835]:     remote IP = xxx.xxx.xxx.xxx
Jan 11 11:33:39 Gargoyle daemon.info ddns_gargoyle[1835]:     Update not needed, IPs match
Jan 11 11:34:05 Gargoyle daemon.info hostapd: wlan0: STA 00:13:e8:73:d2:29 IEEE 802.11: authenticated
Jan 11 11:34:05 Gargoyle daemon.info hostapd: wlan0: STA 00:13:e8:73:d2:29 IEEE 802.11: associated (aid 1)
Jan 11 11:34:06 Gargoyle daemon.info hostapd: wlan0: STA 00:13:e8:73:d2:29 WPA: pairwise key handshake completed (RSN)
Jan 11 11:34:07 Gargoyle daemon.info dnsmasq-dhcp[25312]: DHCPREQUEST(br-lan) 192.168.1.102 00:13:e8:73:d2:29 
Jan 11 11:34:07 Gargoyle daemon.info dnsmasq-dhcp[25312]: DHCPACK(br-lan) 192.168.1.102 00:13:e8:73:d2:29 Laptop-44af739d4f
Jan 11 11:38:51 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 [client1] Inactivity timeout (--ping-restart), restarting
Jan 11 11:38:51 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 SIGUSR1[soft,ping-restart] received, client-instance restarting
Success

Niestety dalej nie działa OpenVPN. Zastanawiam się nie zaktualizować firmware. Jak coś, to wgrac ten?
http://ecco.selfip.net/gargoyle-pl/back … pgrade.bin


Wydaje mi sie, że zrobiłem. W ustawieniach połączenia Aero2, w zakładce zaawansowane, musiałem zaznaczyć na zezwolenie do łączenia się OpenVPN i jak narazie chodzi. Sprawdzę jeszcze później.

TL-WR1043ND Gargoyle:
1.6.2.2 (r42647),  by obsy oraz NAS z MiniDLNA i Transmission

wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent

225

Odp: Gargoyle 1.5.5, nowy plugin OpenVPN

Próbuję skonfigurować klienta Cyberghost na openvpn. Router domowy to Fritz!Box z VDSL na oryginalnym sofcie. Do niego podłączony jest routerek na Gargoyle jako klient WiFi a do portu LAN laptop, którym wprowadzam ustawienia VPN i który po podłączeniu do Fritza ma działać normalnie a po podłączeniu do Gargoyla przez VPN Cybergosta.

Generalnie uzyskuję połączenie i w OpenVPN pokazuje się na zielono przez chwilę, że klient jest podłączony, ale nie udaje mi się uzyskać żadnego połączenia a po chwili w logach systemowych znajduję komunikaty typu:

Gargoyle daemon.err openvpn(custom_config)[7973]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: No route to host (code=148)

Gargoyle daemon.err openvpn(custom_config)[9683]: read UDPv4 [EHOSTUNREACH]: No route to host (code=148)

Podejrzewam jakiś problem z routingiem/firewallem, ale nie mam niestety wystarczającego doświadczenia, żeby rozwiązać powyższy problem. Stąd prośba o pomoc.