1 (edytowany przez tomi513 2013-02-01 22:02:31)

Temat: openvpn klient - server mikrotik

Witam.
Próbuje połączyć 1043 ND - jako klient openvpn , z serwerem mikrotik, ale dostaje taki log:

Feb  1 21:56:23 gento daemon.warn openvpn(custom_config)[13665]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Feb  1 21:56:23 gento daemon.warn openvpn(custom_config)[13665]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb  1 21:56:23 gento daemon.notice openvpn(custom_config)[13665]: Re-using SSL/TLS context
Feb  1 21:56:23 gento daemon.notice openvpn(custom_config)[13665]: Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
Feb  1 21:56:23 gento daemon.notice openvpn(custom_config)[13665]: Socket Buffers: R=[87380->131072] S=[16384->131072]
Feb  1 21:56:23 gento daemon.notice openvpn(custom_config)[13665]: Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
Feb  1 21:56:23 gento daemon.notice openvpn(custom_config)[13665]: Attempting to establish TCP connection with 192.168.178.11:1194 [nonblock]
Feb  1 21:56:24 gento daemon.notice openvpn(custom_config)[13665]: TCP connection established with 192.168.178.11:1194
Feb  1 21:56:24 gento daemon.notice openvpn(custom_config)[13665]: TCPv4_CLIENT link local: [undef]
Feb  1 21:56:24 gento daemon.notice openvpn(custom_config)[13665]: TCPv4_CLIENT link remote: 192.168.178.11:1194
Feb  1 21:56:24 gento daemon.notice openvpn(custom_config)[13665]: TLS: Initial packet from 192.168.178.11:1194, sid=7de792d2 26bf4725
Feb  1 21:56:25 gento daemon.notice openvpn(custom_config)[13665]: VERIFY OK: depth=1, /C=PL/ST=CA/L=Warsaw/O=Tomi/OU=tomi/CN=tomi/name=tomi/emailAddress=admin@xxx.no-ip.org
Feb  1 21:56:25 gento daemon.notice openvpn(custom_config)[13665]: VERIFY OK: depth=0, /C=PL/ST=CA/L=Warsaw/O=Tomi/OU=tomi/CN=tomi/name=tomi/emailAddress=admin@xxx.no-ip.org
Feb  1 21:56:27 gento daemon.err openvpn(custom_config)[13665]: Connection reset, restarting [0]
Feb  1 21:56:27 gento daemon.notice openvpn(custom_config)[13665]: TCP/UDP: Closing socket
Feb  1 21:56:27 gento daemon.notice openvpn(custom_config)[13665]: SIGUSR1[soft,connection-reset] received, process restarting
Feb  1 21:56:27 gento daemon.notice openvpn(custom_config)[13665]: Restart pause, 5 second(s)

moja konfiguracja 1043

dev tun
proto tcp-client
remote 192.168.178.11 1194
ca /etc/openvpn/ca.crt
cert /etc/openvpn/client2.crt
key /etc/openvpn/client2.key
#ns-cert-type server
tls-client
port 1194
persist-tun
persist-key
verb 3
#auth SHA1
pull
#auth-nocache
auth-user-pass userpass.txt

Na windowsie klient bez problemów się łączy i po tun i po tap

2

Odp: openvpn klient - server mikrotik

Mikrotik odrzucił Ci połączenie...

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

3

Odp: openvpn klient - server mikrotik

to jest w logach 1043, może przez sekcję auth-user-pass, ale ja ją muszę mieć żeby połączyć się z openvpn
na mikrotik

22:18:08 ovpn,info <ovpn-0>: dialing... 
22:18:12 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
22:18:12 ovpn,info <ovpn-0>: disconnected 
22:18:17 ovpn,info TCP connection established from 192.168.178.10 
22:18:17 ovpn,info <ovpn-0>: dialing... 
22:18:19 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
22:18:19 ovpn,info <ovpn-0>: disconnected 
22:18:24 ovpn,info TCP connection established from 192.168.178.10 
22:18:24 ovpn,info <ovpn-0>: dialing... 
22:18:28 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
22:18:28 ovpn,info <ovpn-0>: disconnected 
22:18:33 ovpn,info TCP connection established from 192.168.178.10 
22:18:33 ovpn,info <ovpn-0>: dialing... 
22:18:37 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
22:18:37 ovpn,info <ovpn-0>: disconnected 
22:18:42 ovpn,info TCP connection established from 192.168.178.10 
22:18:42 ovpn,info <ovpn-0>: dialing... 
22:18:46 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
22:18:46 ovpn,info <ovpn-0>: disconnected 

4

Odp: openvpn klient - server mikrotik

Ustaw inną konfigurację. Tu się rzuca że algorytmów nie zna.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

5

Odp: openvpn klient - server mikrotik

na mikrotik czy 1043?

6

Odp: openvpn klient - server mikrotik

1043. W mikrotiku pewnie nie jesteś w stanie tego zmienić.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

7

Odp: openvpn klient - server mikrotik

szkoda że Gargoyle nie wspomaga tap, trochę nie dopracowane jest to na mikrtoiku, ale za to wspomaga tun/tap

8

Odp: openvpn klient - server mikrotik

Gui nie wspiera. Co nie oznacza że nie możesz sobie sam konfiga zrobić i uruchomić.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

9

Odp: openvpn klient - server mikrotik

Cezary chyba znalazłem problem
Goście na forum MT piszą że na openWRT jest nowsza wersja openSSL.

The problem is caused by the openssl library, that is too new and isn't supported by openvpn mikrotik server.
MT OpenVpn Server (like written in the WiKi) support OpenSSL ver 0.9.8 with Cipher BF algorithm inside.
Openwrt backfire 10.03.1 doesn't has inside the right version, and with no Cipher BF algorithm compiled inside.
So the problem is solved installing Kamikaze old version i successfull use 8.09.2, r18961, or you find the way to compile openssl from source enabling Cipher BF.

Czy można wgrać starszą wersję openSSL?

10

Odp: openvpn klient - server mikrotik

to jeszcze zapytam przy okazji w temacie, podłączyłem tl-wr1043nd jako bridge z mifi, i w tl-wr1043nd ustawiłem openvpn jako klienta,, na serverze openvpn mam cały ruch przekierowywany, więc jak się klient łączy z openvpn to dostaje ip serwera, ale w tym przypadku niestety dostaje ip(publiczne) z mifi, a nie z routera, na którym jest postawiony serwer openvpn.

11

Odp: openvpn klient - server mikrotik

Cezary czy można cię prosić o skompilowanie openssl z włączoną Cipher BF?

12

Odp: openvpn klient - server mikrotik

openssl jest kompilowany z tym:

root@OpenWrt:~# openssl enc help
unknown option 'help'
options are
-in <file>     input file
-out <file>    output file
-pass <arg>    pass phrase source
-e             encrypt
-d             decrypt
-a/-base64     base64 encode/decode, depending on encryption flag
-k             passphrase is the next argument
-kfile         passphrase is the first line of the file argument
-md            the next argument is the md to use to create a key
                 from a passphrase.  One of md2, md5, sha or sha1
-S             salt in hex is the next argument
-K/-iv         key/iv in hex is the next argument
-[pP]          print the iv/key (then exit if -P)
-bufsize <n>   buffer size
-nopad         disable standard block padding
-engine e      use engine e, possibly a hardware device.
Cipher Types
-aes-128-cbc               -aes-128-cfb               -aes-128-cfb1             
-aes-128-cfb8              -aes-128-ctr               -aes-128-ecb              
-aes-128-gcm               -aes-128-ofb               -aes-128-xts              
-aes-192-cbc               -aes-192-cfb               -aes-192-cfb1             
-aes-192-cfb8              -aes-192-ctr               -aes-192-ecb              
-aes-192-gcm               -aes-192-ofb               -aes-256-cbc              
-aes-256-cfb               -aes-256-cfb1              -aes-256-cfb8             
-aes-256-ctr               -aes-256-ecb               -aes-256-gcm              
-aes-256-ofb               -aes-256-xts               -aes128                   
-aes192                    -aes256                    -bf                       
-bf-cbc                    -bf-cfb                    -bf-ecb                   
-bf-ofb                    -blowfish                  -cast                     
-cast-cbc                  -cast5-cbc                 -cast5-cfb                
-cast5-ecb                 -cast5-ofb                 -des                      
-des-cbc                   -des-cfb                   -des-cfb1                 
-des-cfb8                  -des-ecb                   -des-ede                  
-des-ede-cbc               -des-ede-cfb               -des-ede-ofb              
-des-ede3                  -des-ede3-cbc              -des-ede3-cfb             
-des-ede3-cfb1             -des-ede3-cfb8             -des-ede3-ofb             
-des-ofb                   -des3                      -desx                     
-desx-cbc                  -id-aes128-GCM             -id-aes192-GCM            
-id-aes256-GCM             -rc2                       -rc2-40-cbc               
-rc2-64-cbc                -rc2-cbc                   -rc2-cfb                  
-rc2-ecb                   -rc2-ofb                   -rc4                      
-rc4-40                    -rc4-hmac-md5              -seed                     
-seed-cbc                  -seed-cfb                  -seed-ecb                 
-seed-ofb    
Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

13

Odp: openvpn klient - server mikrotik

Czy wogóle w openssl ma funkcje Cipher BF?

14

Odp: openvpn klient - server mikrotik

Tak...

-bf                       
-bf-cbc                    -bf-cfb                    -bf-ecb                   
-bf-ofb

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

15

Odp: openvpn klient - server mikrotik

czyli na chwile obecną nic nie mogę zrobić żeby się dogadały?

16

Odp: openvpn klient - server mikrotik

Czyli zmień cipfher na np. BF-CBC i zobacz czy się dogada.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

17

Odp: openvpn klient - server mikrotik

żadne z powyższych -bf  -bf-cbc    -bf-cfb    -bf-ecb  -bf-ofb nie działają.
Na MT mam dostępne cipher: aes 128, aes 192, aes 256, blowfish 128.

Masz jakiś pomysł? Może być niezgodność między wersjami openssl?

18

Odp: openvpn klient - server mikrotik

Ustaw aesa i tyle skoro blowfish nie chce działać.  I mam nadzieję ze nie wpisujesz tego jako -bf-cbc.....

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

19

Odp: openvpn klient - server mikrotik

wpisywałem tak
cipher BF-CBC i tak dalej
Na widnows łączy mi się za pomocą AES-256-CBC/SHA1
o to mój config na Gargoyle

dev tap
proto tcp-client
remote 192.168.178.11 1194
ca /etc/openvpn/ca.crt
cert /etc/openvpn/client2.crt
key /etc/openvpn/client2.key
#ns-cert-type server
tls-client
port 1194
persist-tun
persist-key
verb 3
auth SHA1
#cipher AES-128-CBC
cipher AES128
pull
#remap-usr1 SIGTERM
#auth-nocache
auth-user-pass userpass.txt
#ifconfig 10.8.8.9 10.8.8.10

20

Odp: openvpn klient - server mikrotik

Więc daj identyczny konfig jaki na windowsie zrobiłeś.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

21

Odp: openvpn klient - server mikrotik

daje taki i dalej nic z tego

dev tap
proto tcp-client
remote 192.168.178.11 1194
ca ca.crt
cert client1.crt
key client1.key
ns-cert-type server
tls-client
port 1194
persist-tun
persist-key
verb 3
auth SHA1
pull
cipher AES-256-CBC
#auth-nocache
auth-user-pass userpass.txt

22

Odp: openvpn klient - server mikrotik

Cezary co mam napisać do suportu MT? z prośbą o aktualizację openSSL do wersji min. 1.x ?

23

Odp: openvpn klient - server mikrotik

No czekaj skoro ci na windows taki chodzi to tu też musi przecież. Obejrzyj logi z połączenia w jednym i drugim.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

24

Odp: openvpn klient - server mikrotik

konfiguracja clienta openVPN - windows 7

dev tap
proto tcp-client
remote 192.168.178.11 1194
ca ca.crt
cert client1.crt
key client1.key
ns-cert-type server
tls-client
port 1194
persist-tun
persist-key
verb 3
auth SHA1
pull
cipher AES-256-CBC
#auth-nocache
auth-user-pass userpass.txt

logi openvpn - klienta windows 7

Sat Feb 02 19:55:07 2013 OpenVPN 2.3.0 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Jan  8 2013
Enter Management Password:
Sat Feb 02 19:55:07 2013 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sat Feb 02 19:55:07 2013 Need hold release from management interface, waiting...
Sat Feb 02 19:55:07 2013 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sat Feb 02 19:55:07 2013 MANAGEMENT: CMD 'state on'
Sat Feb 02 19:55:07 2013 MANAGEMENT: CMD 'log all on'
Sat Feb 02 19:55:08 2013 MANAGEMENT: CMD 'hold off'
Sat Feb 02 19:55:08 2013 MANAGEMENT: CMD 'hold release'
Sat Feb 02 19:55:08 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Sat Feb 02 19:55:08 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Feb 02 19:55:08 2013 Attempting to establish TCP connection with [AF_INET]192.168.178.11:1194
Sat Feb 02 19:55:08 2013 MANAGEMENT: >STATE:1359831308,TCP_CONNECT,,,
Sat Feb 02 19:55:08 2013 TCP connection established with [AF_INET]192.168.178.11:1194
Sat Feb 02 19:55:08 2013 TCPv4_CLIENT link local: [undef]
Sat Feb 02 19:55:08 2013 TCPv4_CLIENT link remote: [AF_INET]192.168.178.11:1194
Sat Feb 02 19:55:08 2013 MANAGEMENT: >STATE:1359831308,WAIT,,,
Sat Feb 02 19:55:08 2013 MANAGEMENT: >STATE:1359831308,AUTH,,,
Sat Feb 02 19:55:08 2013 TLS: Initial packet from [AF_INET]192.168.178.11:1194, sid=c7582d22 92e6c8f2
Sat Feb 02 19:55:08 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Feb 02 19:55:08 2013 VERIFY OK: depth=1, C=PL, ST=CA, L=Warsaw, O=Tomi, OU=tomi, CN=tomi, name=tomi, emailAddress=admin@xxx.no-ip.org
Sat Feb 02 19:55:08 2013 VERIFY OK: nsCertType=SERVER
Sat Feb 02 19:55:08 2013 VERIFY OK: depth=0, C=PL, ST=CA, L=Warsaw, O=Tomi, OU=tomi, CN=tomi, name=tomi, emailAddress=admin@xxx.no-ip.org
Sat Feb 02 19:55:09 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Feb 02 19:55:09 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 02 19:55:09 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Feb 02 19:55:09 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 02 19:55:09 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sat Feb 02 19:55:09 2013 [tomi] Peer Connection Initiated with [AF_INET]192.168.178.11:1194
Sat Feb 02 19:55:10 2013 MANAGEMENT: >STATE:1359831310,GET_CONFIG,,,
Sat Feb 02 19:55:11 2013 SENT CONTROL [tomi]: 'PUSH_REQUEST' (status=1)
Sat Feb 02 19:55:17 2013 SENT CONTROL [tomi]: 'PUSH_REQUEST' (status=1)
Sat Feb 02 19:55:22 2013 SENT CONTROL [tomi]: 'PUSH_REQUEST' (status=1)
Sat Feb 02 19:55:22 2013 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.8.1,ifconfig 10.8.8.3 255.255.255.0'
Sat Feb 02 19:55:22 2013 OPTIONS IMPORT: --ifconfig/up options modified
Sat Feb 02 19:55:22 2013 OPTIONS IMPORT: route-related options modified
Sat Feb 02 19:55:22 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Feb 02 19:55:22 2013 MANAGEMENT: >STATE:1359831322,ASSIGN_IP,,10.8.8.3,
Sat Feb 02 19:55:22 2013 open_tun, tt->ipv6=0
Sat Feb 02 19:55:22 2013 TAP-WIN32 device [Połączenie lokalne 2] opened: \\.\Global\{162431C7-A79B-41CE-B6B6-F26A855025DE}.tap
Sat Feb 02 19:55:22 2013 TAP-Windows Driver Version 9.9 
Sat Feb 02 19:55:22 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.8.3/255.255.255.0 on interface {162431C7-A79B-41CE-B6B6-F26A855025DE} [DHCP-serv: 10.8.8.0, lease-time: 31536000]
Sat Feb 02 19:55:22 2013 Successful ARP Flush on interface [27] {162431C7-A79B-41CE-B6B6-F26A855025DE}
Sat Feb 02 19:55:27 2013 TEST ROUTES: 0/0 succeeded len=-1 ret=1 a=0 u/d=up
Sat Feb 02 19:55:27 2013 Initialization Sequence Completed
Sat Feb 02 19:55:27 2013 MANAGEMENT: >STATE:1359831327,CONNECTED,SUCCESS,10.8.8.3,192.168.178.11
Sat Feb 02 20:55:09 2013 TLS: soft reset sec=0 bytes=167274/0 pkts=850/0
Sat Feb 02 20:55:09 2013 VERIFY OK: depth=1, C=PL, ST=CA, L=Warsaw, O=Tomi, OU=tomi, CN=tomi, name=tomi, emailAddress=admin@xxx.no-ip.org
Sat Feb 02 20:55:09 2013 VERIFY OK: nsCertType=SERVER
Sat Feb 02 20:55:09 2013 VERIFY OK: depth=0, C=PL, ST=CA, L=Warsaw, O=Tomi, OU=tomi, CN=tomi, name=tomi, emailAddress=admin@xxxno-ip.org
Sat Feb 02 20:55:10 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Feb 02 20:55:10 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 02 20:55:10 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Feb 02 20:55:10 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 02 20:55:10 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

konfiguracja na Gargoyle

Feb  2 21:00:22 gento daemon.err openvpn(custom_config)[5598]: Connection reset, restarting [0]
Feb  2 21:00:22 gento daemon.notice openvpn(custom_config)[5598]: TCP/UDP: Closing socket
Feb  2 21:00:22 gento daemon.notice openvpn(custom_config)[5598]: SIGUSR1[soft,connection-reset] received, process restarting
Feb  2 21:00:22 gento daemon.notice openvpn(custom_config)[5598]: Restart pause, 5 second(s)
Feb  2 21:00:27 gento daemon.warn openvpn(custom_config)[5598]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Feb  2 21:00:27 gento daemon.warn openvpn(custom_config)[5598]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb  2 21:00:27 gento daemon.notice openvpn(custom_config)[5598]: Re-using SSL/TLS context
Feb  2 21:00:27 gento daemon.notice openvpn(custom_config)[5598]: Control Channel MTU parms [ L:1591 D:140 EF:40 EB:0 ET:0 EL:0 ]
Feb  2 21:00:27 gento daemon.notice openvpn(custom_config)[5598]: Socket Buffers: R=[87380->131072] S=[16384->131072]
Feb  2 21:00:27 gento daemon.notice openvpn(custom_config)[5598]: Data Channel MTU parms [ L:1591 D:1450 EF:59 EB:4 ET:32 EL:0 ]
Feb  2 21:00:27 gento daemon.notice openvpn(custom_config)[5598]: Attempting to establish TCP connection with 192.168.178.11:1194 [nonblock]
Feb  2 21:00:28 gento daemon.notice openvpn(custom_config)[5598]: TCP connection established with 192.168.178.11:1194
Feb  2 21:00:28 gento daemon.notice openvpn(custom_config)[5598]: TCPv4_CLIENT link local: [undef]
Feb  2 21:00:28 gento daemon.notice openvpn(custom_config)[5598]: TCPv4_CLIENT link remote: 192.168.178.11:1194
Feb  2 21:00:28 gento daemon.notice openvpn(custom_config)[5598]: TLS: Initial packet from 192.168.178.11:1194, sid=5aeb6c15 bd90740a
Feb  2 21:00:28 gento daemon.notice openvpn(custom_config)[5598]: VERIFY OK: depth=1, /C=PL/ST=CA/L=Warsaw/O=Tomi/OU=tomi/CN=tomi/name=tomi/emailAddress=admin@xxx.no-ip.org
Feb  2 21:00:28 gento daemon.notice openvpn(custom_config)[5598]: VERIFY OK: depth=0, /C=PL/ST=CA/L=Warsaw/O=Tomi/OU=tomi/CN=tomi/name=tomi/emailAddress=admin@xxx.no-ip.org
Feb  2 21:00:30 gento daemon.err openvpn(custom_config)[5598]: Connection reset, restarting [0]
Feb  2 21:00:30 gento daemon.notice openvpn(custom_config)[5598]: TCP/UDP: Closing socket
Feb  2 21:00:30 gento daemon.notice openvpn(custom_config)[5598]: SIGUSR1[soft,connection-reset] received, process restarting
Feb  2 21:00:30 gento daemon.notice openvpn(custom_config)[5598]: Restart pause, 5 second(s)
Feb  2 21:00:35 gento daemon.warn openvpn(custom_config)[5598]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Feb  2 21:00:35 gento daemon.warn openvpn(custom_config)[5598]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb  2 21:00:35 gento daemon.notice openvpn(custom_config)[5598]: Re-using SSL/TLS context
Feb  2 21:00:35 gento daemon.notice openvpn(custom_config)[5598]: Control Channel MTU parms [ L:1591 D:140 EF:40 EB:0 ET:0 EL:0 ]
Feb  2 21:00:35 gento daemon.notice openvpn(custom_config)[5598]: Socket Buffers: R=[87380->131072] S=[16384->131072]
Feb  2 21:00:35 gento daemon.notice openvpn(custom_config)[5598]: Data Channel MTU parms [ L:1591 D:1450 EF:59 EB:4 ET:32 EL:0 ]
Feb  2 21:00:35 gento daemon.notice openvpn(custom_config)[5598]: Attempting to establish TCP connection with 192.168.178.11:1194 [nonblock]
Feb  2 21:00:36 gento daemon.notice openvpn(custom_config)[5598]: TCP connection established with 192.168.178.11:1194
Feb  2 21:00:36 gento daemon.notice openvpn(custom_config)[5598]: TCPv4_CLIENT link local: [undef]
Feb  2 21:00:36 gento daemon.notice openvpn(custom_config)[5598]: TCPv4_CLIENT link remote: 192.168.178.11:1194
Feb  2 21:00:36 gento daemon.notice openvpn(custom_config)[5598]: TLS: Initial packet from 192.168.178.11:1194, sid=eaf360cf 7d79626e
Feb  2 21:00:37 gento daemon.notice openvpn(custom_config)[5598]: VERIFY OK: depth=1, /C=PL/ST=CA/L=Warsaw/O=Tomi/OU=tomi/CN=tomi/name=tomi/emailAddress=admin@xxx.no-ip.org
Feb  2 21:00:37 gento daemon.notice openvpn(custom_config)[5598]: VERIFY OK: depth=0, /C=PL/ST=CA/L=Warsaw/O=Tomi/OU=tomi/CN=tomi/name=tomi/emailAddress=admin@xxx.no-ip.org
Feb  2 21:00:39 gento daemon.err openvpn(custom_config)[5598]: Connection reset, restarting [0]
Feb  2 21:00:39 gento daemon.notice openvpn(custom_config)[5598]: TCP/UDP: Closing socket
Feb  2 21:00:39 gento daemon.notice openvpn(custom_config)[5598]: SIGUSR1[soft,connection-reset] received, process restarting
Feb  2 21:00:39 gento daemon.notice openvpn(custom_config)[5598]: Restart pause, 5 second(s)

logi z Gargoyle

root@gento:/etc/openvpn# cat my-vpn.conf
dev tap
proto tcp-client
remote 192.168.178.11 1194
ca /etc/openvpn/ca.crt
cert /etc/openvpn/client2.crt
key /etc/openvpn/client2.key
#ns-cert-type server
tls-client
port 1194
persist-tun
persist-key
verb 3
auth SHA1
#cipher AES-128-CBC
#cipher AES128
cipher AES-256-CBC
pull
auth-user-pass userpass.txt

logi z MT v. 5.3

21:01:18 ovpn,info <ovpn-0>: dialing... 
21:01:21 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:01:21 ovpn,info <ovpn-0>: disconnected 
21:01:26 ovpn,info TCP connection established from 192.168.178.10 
21:01:26 ovpn,info <ovpn-0>: dialing... 
21:01:30 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:01:30 ovpn,info <ovpn-0>: disconnected 
21:01:35 ovpn,info TCP connection established from 192.168.178.10 
21:01:35 ovpn,info <ovpn-0>: dialing... 
21:01:38 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:01:38 ovpn,info <ovpn-0>: disconnected 
21:01:43 ovpn,info TCP connection established from 192.168.178.10 
21:01:43 ovpn,info <ovpn-0>: dialing... 
21:01:47 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:01:47 ovpn,info <ovpn-0>: disconnected 
21:01:52 ovpn,info TCP connection established from 192.168.178.10 
21:01:52 ovpn,info <ovpn-0>: dialing... 
21:01:55 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:01:55 ovpn,info <ovpn-0>: disconnected 
21:02:00 ovpn,info TCP connection established from 192.168.178.10 
21:02:00 ovpn,info <ovpn-0>: dialing... 
21:02:04 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:02:04 ovpn,info <ovpn-0>: disconnected 
21:02:09 ovpn,info TCP connection established from 192.168.178.10 
21:02:09 ovpn,info <ovpn-0>: dialing... 
21:02:13 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:02:13 ovpn,info <ovpn-0>: disconnected 
21:02:18 ovpn,info TCP connection established from 192.168.178.10 
21:02:18 ovpn,info <ovpn-0>: dialing... 
21:02:21 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:02:21 ovpn,info <ovpn-0>: disconnected 
21:02:26 ovpn,info TCP connection established from 192.168.178.10 
21:02:26 ovpn,info <ovpn-0>: dialing... 
21:02:30 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:02:30 ovpn,info <ovpn-0>: disconnected 
21:02:35 ovpn,info TCP connection established from 192.168.178.10 
21:02:35 ovpn,info <ovpn-0>: dialing... 
21:02:39 ovpn,info <ovpn-0>: terminating... - unkown auth alg 
21:02:39 ovpn,info <ovpn-0>: disconnected 
21:02:39 system,info,account user admin logged in via local 

cipher próbowałem na sto różnych sposobów zmieniać ale bez rezultatów
Może ty Cezary wpadniesz na coś. Podpowiedz coś.

25

Odp: openvpn klient - server mikrotik

Cezary to co ty o tym sądzisz?