26

Odp: Prawidłowa konfiguracja OpenVPN

No, to już wiemy, że na telefonie nie masz w ogóle routingu do podsieci 192.168.10.x. Masz tylko do 10.8.0.0 i tyle.
W konfiguracji serwera openvpn powinieneś mieć wpisane wypychanie (push route) do klienta routingu do podsieci 192.168.10.0.

27

Odp: Prawidłowa konfiguracja OpenVPN

Ale to mam zrobić na telefonie czy na routerze ? Bo jeśli na routerze to robiłem już w pliku /etc/openvpn/server.conf

wpis:

push "topology subnet" bo inaczej nie moglem się wogole telefonem polaczyc...

28

Odp: Prawidłowa konfiguracja OpenVPN

Nie, raczej chodziło mi o coś takiego:

push "route-gateway 10.8.0.X"

I chyba w /etc/openvpn/ccd/<klient> coś takiego:

push "route 192.168.10.0 255.255.255.0 10.8.0.X"

Coś w tym stylu, nie znam konfiguracji twoich IP i plików openvpn, więc dokładniej nic nie powiem. Ale generalnie włącz logowanie w kliencie (verb=4) i pewnie zobaczysz jak serwer wypycha trasy routingu do telefonu (szczególnie routing do 192.168.10.0 via tun0). Telefon musi jeszcze umieć to sobie ustawić, busybox w tym znacząco pomaga na androidzie smile

29

Odp: Prawidłowa konfiguracja OpenVPN

Mam przekierowania potów 1101 i 1100 . Przy uruchomieniu openvpn  na porcie 1194 dostaję komunikat
" Port serwera OpenVPN koliduje z wartością wpisaną w polu port redirected to router " .
Czy to można zignorować przez odwrotną konfigurację czy musi być większa odległość portów.

30

Odp: Prawidłowa konfiguracja OpenVPN

uci show firewall

pokaż, bo on o 1194 się buntuje.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

31 (edytowany przez bhb 2013-05-30 21:51:14)

Odp: Prawidłowa konfiguracja OpenVPN

uci show firewall Już się wyjasniło tam była stara konfiguracja z przed aktualizacji.
dzięki

firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@defaults[0].force_router_dns=1
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].network=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=REJECT
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].network=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=lan
firewall.@forwarding[0].dest=wan
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-DHCP-Renew
firewall.@rule[0].src=wan
firewall.@rule[0].proto=udp
firewall.@rule[0].dest_port=68
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[1]=rule
firewall.@rule[1].name=Allow-Ping
firewall.@rule[1].src=wan
firewall.@rule[1].proto=icmp
firewall.@rule[1].icmp_type=echo-request
firewall.@rule[1].family=ipv4
firewall.@rule[1].target=ACCEPT
firewall.@rule[2]=rule
firewall.@rule[2].name=Allow-DHCPv6
firewall.@rule[2].src=wan
firewall.@rule[2].proto=udp
firewall.@rule[2].src_ip=fe80::/10
firewall.@rule[2].src_port=547
firewall.@rule[2].dest_ip=fe80::/10
firewall.@rule[2].dest_port=546
firewall.@rule[2].family=ipv6
firewall.@rule[2].target=ACCEPT
firewall.@rule[3]=rule
firewall.@rule[3].name=Allow-ICMPv6-Input
firewall.@rule[3].src=wan
firewall.@rule[3].proto=icmp
firewall.@rule[3].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-h
firewall.@rule[3].limit=1000/sec
firewall.@rule[3].family=ipv6
firewall.@rule[3].target=ACCEPT
firewall.@rule[4]=rule
firewall.@rule[4].name=Allow-ICMPv6-Forward
firewall.@rule[4].src=wan
firewall.@rule[4].dest=*
firewall.@rule[4].proto=icmp
firewall.@rule[4].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-h
firewall.@rule[4].limit=1000/sec
firewall.@rule[4].family=ipv6
firewall.@rule[4].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@include[1]=include
firewall.@include[1].path=/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall
firewall.openvpn_include_file=include
firewall.openvpn_include_file.path=/etc/openvpn.firewall
firewall.@zone[2]=zone
firewall.@zone[2].name=guest
firewall.@zone[2].network=guest
firewall.@zone[2].input=REJECT
firewall.@zone[2].output=ACCEPT
firewall.@zone[2].forward=REJECT
firewall.@zone[2].forward=REJECT
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].src=guest
firewall.@forwarding[1].dest=wan
firewall.@rule[5]=rule
firewall.@rule[5].src=guest
firewall.@rule[5].proto=udp
firewall.@rule[5].src_port=67-68
firewall.@rule[5].dest_port=67-68
firewall.@rule[5].target=ACCEPT
firewall.@rule[5].family=ipv4
firewall.@rule[6]=rule
firewall.@rule[6].src=guest
firewall.@rule[6].dest_port=53
firewall.@rule[6].target=ACCEPT
firewall.@rule[6].family=ipv4
firewall.@rule[6].proto=tcpudp
firewall.ra_openvpn=remote_accept
firewall.ra_openvpn.zone=wan
firewall.ra_openvpn.proto=udp
firewall.ra_openvpn.local_port=1194
firewall.ra_openvpn.remote_port=1194
firewall.redirect_enabled_number_0=redirect
firewall.redirect_enabled_number_0.name=drv
firewall.redirect_enabled_number_0.src=wan
firewall.redirect_enabled_number_0.dest=lan
firewall.redirect_enabled_number_0.proto=tcp
firewall.redirect_enabled_number_0.src_dport=1100
firewall.redirect_enabled_number_0.dest_ip=192.168.10.20
firewall.redirect_enabled_number_0.dest_port=1100
firewall.redirect_enabled_number_1=redirect
firewall.redirect_enabled_number_1.name=drv
firewall.redirect_enabled_number_1.src=wan
firewall.redirect_enabled_number_1.dest=lan
firewall.redirect_enabled_number_1.proto=udp
firewall.redirect_enabled_number_1.src_dport=1100
firewall.redirect_enabled_number_1.dest_ip=192.168.10.20
firewall.redirect_enabled_number_1.dest_port=1100
firewall.redirect_enabled_number_2=redirect
firewall.redirect_enabled_number_2.name=drv1
firewall.redirect_enabled_number_2.src=wan
firewall.redirect_enabled_number_2.dest=lan
firewall.redirect_enabled_number_2.proto=tcp
firewall.redirect_enabled_number_2.src_dport=1101
firewall.redirect_enabled_number_2.dest_ip=192.168.10.21
firewall.redirect_enabled_number_2.dest_port=1101
firewall.redirect_enabled_number_3=redirect
firewall.redirect_enabled_number_3.name=drv1
firewall.redirect_enabled_number_3.src=wan
firewall.redirect_enabled_number_3.dest=lan
firewall.redirect_enabled_number_3.proto=udp
firewall.redirect_enabled_number_3.src_dport=1101
firewall.redirect_enabled_number_3.dest_ip=192.168.10.21
firewall.redirect_enabled_number_3.dest_port=1101
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@defaults[0].force_router_dns=1
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].network=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=REJECT
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].network=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=lan
firewall.@forwarding[0].dest=wan
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-DHCP-Renew
firewall.@rule[0].src=wan
firewall.@rule[0].proto=udp
firewall.@rule[0].dest_port=68
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[1]=rule
firewall.@rule[1].name=Allow-Ping
firewall.@rule[1].src=wan
firewall.@rule[1].proto=icmp
firewall.@rule[1].icmp_type=echo-request
firewall.@rule[1].family=ipv4
firewall.@rule[1].target=ACCEPT
firewall.@rule[2]=rule
firewall.@rule[2].name=Allow-DHCPv6
firewall.@rule[2].src=wan
firewall.@rule[2].proto=udp
firewall.@rule[2].src_ip=fe80::/10
firewall.@rule[2].src_port=547
firewall.@rule[2].dest_ip=fe80::/10
firewall.@rule[2].dest_port=546
firewall.@rule[2].family=ipv6
firewall.@rule[2].target=ACCEPT
firewall.@rule[3]=rule
firewall.@rule[3].name=Allow-ICMPv6-Input
firewall.@rule[3].src=wan
firewall.@rule[3].proto=icmp
firewall.@rule[3].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-h
firewall.@rule[3].limit=1000/sec
firewall.@rule[3].family=ipv6
firewall.@rule[3].target=ACCEPT
firewall.@rule[4]=rule
firewall.@rule[4].name=Allow-ICMPv6-Forward
firewall.@rule[4].src=wan
firewall.@rule[4].dest=*
firewall.@rule[4].proto=icmp
firewall.@rule[4].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-h
firewall.@rule[4].limit=1000/sec
firewall.@rule[4].family=ipv6
firewall.@rule[4].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@include[1]=include
firewall.@include[1].path=/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall
firewall.openvpn_include_file=include
firewall.openvpn_include_file.path=/etc/openvpn.firewall
firewall.@zone[2]=zone
firewall.@zone[2].name=guest
firewall.@zone[2].network=guest
firewall.@zone[2].input=REJECT
firewall.@zone[2].output=ACCEPT
firewall.@zone[2].forward=REJECT
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].src=guest
firewall.@forwarding[1].dest=wan
firewall.@rule[5]=rule
firewall.@rule[5].src=guest
firewall.@rule[5].proto=udp
firewall.@rule[5].src_port=67-68
firewall.@rule[5].dest_port=67-68
firewall.@rule[5].target=ACCEPT
firewall.@rule[5].family=ipv4
firewall.@rule[6]=rule
firewall.@rule[6].src=guest
firewall.@rule[6].dest_port=53
firewall.@rule[6].target=ACCEPT
firewall.@rule[6].family=ipv4
firewall.@rule[6].proto=tcpudp
firewall.ra_openvpn=remote_accept
firewall.ra_openvpn.zone=wan
firewall.ra_openvpn.proto=udp
firewall.ra_openvpn.local_port=1194
firewall.ra_openvpn.remote_port=1194
firewall.redirect_enabled_number_0=redirect
firewall.redirect_enabled_number_0.name=drv
firewall.redirect_enabled_number_0.src=wan
firewall.redirect_enabled_number_0.dest=lan
firewall.redirect_enabled_number_0.proto=tcp
firewall.redirect_enabled_number_0.src_dport=1100
firewall.redirect_enabled_number_0.dest_ip=192.168.10.20
firewall.redirect_enabled_number_0.dest_port=1100
firewall.redirect_enabled_number_1=redirect
firewall.redirect_enabled_number_1.name=drv
firewall.redirect_enabled_number_1.src=wan
firewall.redirect_enabled_number_1.dest=lan
firewall.redirect_enabled_number_1.proto=udp
firewall.redirect_enabled_number_1.src_dport=1100
firewall.redirect_enabled_number_1.dest_ip=192.168.10.20
firewall.redirect_enabled_number_1.dest_port=1100
firewall.redirect_enabled_number_2=redirect
firewall.redirect_enabled_number_2.name=drv1
firewall.redirect_enabled_number_2.src=wan
firewall.redirect_enabled_number_2.dest=lan
firewall.redirect_enabled_number_2.proto=tcp
firewall.redirect_enabled_number_2.src_dport=1101
firewall.redirect_enabled_number_2.dest_ip=192.168.10.21
firewall.redirect_enabled_number_2.dest_port=1101
firewall.redirect_enabled_number_3=redirect
firewall.redirect_enabled_number_3.name=drv1
firewall.redirect_enabled_number_3.src=wan
firewall.redirect_enabled_number_3.dest=lan
firewall.redirect_enabled_number_3.proto=udp
firewall.redirect_enabled_number_3.src_dport=1101
firewall.redirect_enabled_number_3.dest_ip=192.168.10.21
firewall.redirect_enabled_number_3.dest_port=1101

32

Odp: Prawidłowa konfiguracja OpenVPN

To jego własny wpis jest, otwierający wan dla openvpn. Skasuj całkowicie konfigurację openvpn i zobacz czy znikło to z firewalla. Jeżeli tak to utwórz ją ponownie. Jeżeli się powtórzy - napisz mi dokładnie krok po kroku co wykonałeś żebym mógł powtórzyć ten błąd.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

33 (edytowany przez bhb 2013-05-30 22:01:48)

Odp: Prawidłowa konfiguracja OpenVPN

Podczas aktualizacji zostawiłem stare ustawienia. Na nowym systemie cos mi nie chciało działac openvpn odinstalowałem i zainstalowałem ponownie. Ale deinstalacja pozostwiła wpisy firewala i to cały problem.

Sprawdziłem odinstalowanie pluginu nie powoduje usunięcia reguł firewala.

34

Odp: Prawidłowa konfiguracja OpenVPN

Przywróć ustawienia domyślne i ustaw jeszcze raz. Nie przywracaj konfiguracji.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

35

Odp: Prawidłowa konfiguracja OpenVPN

Tez miałem raz taki problem i reset do ustawien domyślnych tylko pomogł...

36

Odp: Prawidłowa konfiguracja OpenVPN

Pozwólcie krótkie pytanko z innej beczki. Mam działającą instalację gargoyle z vpn. Aktualizuję na czysto i co muszę zrobić, aby nie generować nowych certyfikatów? Mam kopię /etc.

37

Odp: Prawidłowa konfiguracja OpenVPN

Skopiować te które masz z /etc/openvpn.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

38

Odp: Prawidłowa konfiguracja OpenVPN

Tylko zawartość client_conf? A w GUI wyklikać klientów i podmieniać cert, czy tylko odpalić serwer i skopiować?

39

Odp: Prawidłowa konfiguracja OpenVPN

Generalnie to i tak najpierw musisz to włączyć, wyklikać tak samo jak było i podmienić certyfikaty. Chyba że odtworzysz całą konfigurację openvpn - /etc/config/openvpn* i /etc/openvpn/*

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

40

Odp: Prawidłowa konfiguracja OpenVPN

A jednak coś mi nie działa. Nowa instalacja na mr-3420 nowy usb tym razem nie chce przejść przez tworzenie certyfikatu.
firewal przed instalacją openvpn

firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@defaults[0].force_router_dns=1
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].network=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=REJECT
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].network=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=lan
firewall.@forwarding[0].dest=wan
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-DHCP-Renew
firewall.@rule[0].src=wan
firewall.@rule[0].proto=udp
firewall.@rule[0].dest_port=68
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[1]=rule
firewall.@rule[1].name=Allow-Ping
firewall.@rule[1].src=wan
firewall.@rule[1].proto=icmp
firewall.@rule[1].icmp_type=echo-request
firewall.@rule[1].family=ipv4
firewall.@rule[1].target=ACCEPT
firewall.@rule[2]=rule
firewall.@rule[2].name=Allow-DHCPv6
firewall.@rule[2].src=wan
firewall.@rule[2].proto=udp
firewall.@rule[2].src_ip=fe80::/10
firewall.@rule[2].src_port=547
firewall.@rule[2].dest_ip=fe80::/10
firewall.@rule[2].dest_port=546
firewall.@rule[2].family=ipv6
firewall.@rule[2].target=ACCEPT
firewall.@rule[3]=rule
firewall.@rule[3].name=Allow-ICMPv6-Input
firewall.@rule[3].src=wan
firewall.@rule[3].proto=icmp
firewall.@rule[3].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type router-solicitation neighbour-solicitation router-advertisement neighbour-advertisement
firewall.@rule[3].limit=1000/sec
firewall.@rule[3].family=ipv6
firewall.@rule[3].target=ACCEPT
firewall.@rule[4]=rule
firewall.@rule[4].name=Allow-ICMPv6-Forward
firewall.@rule[4].src=wan
firewall.@rule[4].dest=*
firewall.@rule[4].proto=icmp
firewall.@rule[4].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type
firewall.@rule[4].limit=1000/sec
firewall.@rule[4].family=ipv6
firewall.@rule[4].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@include[1]=include
firewall.@include[1].path=/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall

firewall po instalacji

firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@defaults[0].force_router_dns=1
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].network=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=REJECT
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].network=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=lan
firewall.@forwarding[0].dest=wan
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-DHCP-Renew
firewall.@rule[0].src=wan
firewall.@rule[0].proto=udp
firewall.@rule[0].dest_port=68
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[1]=rule
firewall.@rule[1].name=Allow-Ping
firewall.@rule[1].src=wan
firewall.@rule[1].proto=icmp
firewall.@rule[1].icmp_type=echo-request
firewall.@rule[1].family=ipv4
firewall.@rule[1].target=ACCEPT
firewall.@rule[2]=rule
firewall.@rule[2].name=Allow-DHCPv6
firewall.@rule[2].src=wan
firewall.@rule[2].proto=udp
firewall.@rule[2].src_ip=fe80::/10
firewall.@rule[2].src_port=547
firewall.@rule[2].dest_ip=fe80::/10
firewall.@rule[2].dest_port=546
firewall.@rule[2].family=ipv6
firewall.@rule[2].target=ACCEPT
firewall.@rule[3]=rule
firewall.@rule[3].name=Allow-ICMPv6-Input
firewall.@rule[3].src=wan
firewall.@rule[3].proto=icmp
firewall.@rule[3].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type router-solicitation neighbour-solicitation router-advertisement neighbour-advertisement
firewall.@rule[3].limit=1000/sec
firewall.@rule[3].family=ipv6
firewall.@rule[3].target=ACCEPT
firewall.@rule[4]=rule
firewall.@rule[4].name=Allow-ICMPv6-Forward
firewall.@rule[4].src=wan
firewall.@rule[4].dest=*
firewall.@rule[4].proto=icmp
firewall.@rule[4].icmp_type=echo-request echo-reply destination-unreachable packet-too-big time-exceeded bad-header unknown-header-type
firewall.@rule[4].limit=1000/sec
firewall.@rule[4].family=ipv6
firewall.@rule[4].target=ACCEPT
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@include[1]=include
firewall.@include[1].path=/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall
firewall.vpn_zone=zone
firewall.vpn_zone.name=vpn
firewall.vpn_zone.network=vpn
firewall.vpn_zone.input=ACCEPT
firewall.vpn_zone.output=ACCEPT
firewall.vpn_zone.forward=ACCEPT
firewall.vpn_zone.mtu_fix=1
firewall.vpn_zone.masq=1
firewall.vpn_lan_forwarding=forwarding
firewall.vpn_lan_forwarding.src=lan
firewall.vpn_lan_forwarding.dest=vpn
firewall.ra_openvpn=remote_accept
firewall.ra_openvpn.zone=wan
firewall.ra_openvpn.local_port=1194
firewall.ra_openvpn.remote_port=1194
firewall.ra_openvpn.proto=udp
firewall.vpn_wan_forwarding=forwarding
firewall.vpn_wan_forwarding.src=vpn
firewall.vpn_wan_forwarding.dest=wan

log

Jan  1 01:00:57 Gargoyle kern.info kernel: [   57.090000] br-lan: port 2(wlan0) entered forwarding state
Jan  1 01:00:59 Gargoyle kern.info kernel: [   59.090000] br-lan: port 2(wlan0) entered forwarding state
Jan  1 01:00:05 Gargoyle user.info sysinit: Loading defaults
Jan  1 01:00:05 Gargoyle user.info sysinit: Loading synflood protection
Jan  1 01:00:05 Gargoyle user.info sysinit: Adding custom chains
Jan  1 01:00:06 Gargoyle user.info sysinit: Loading zones
Jan  1 01:00:08 Gargoyle user.info sysinit: Loading forwardings
Jan  1 01:00:08 Gargoyle user.info sysinit: Loading rules
Jan  1 01:00:08 Gargoyle user.info sysinit: Loading redirects
Jan  1 01:00:08 Gargoyle user.info sysinit: Loading includes
Jan  1 01:00:10 Gargoyle user.info sysinit: Optimizing conntrack
Jan  1 01:00:10 Gargoyle user.info sysinit: Loading interfaces
Jan  1 01:00:10 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
May 31 09:07:24 Gargoyle authpriv.info dropbear[1831]: Running in background
May 31 09:07:24 Gargoyle daemon.warn httpd_gargoyle[1856]: started as root without requesting chroot(), warning only
May 31 09:07:24 Gargoyle daemon.notice httpd_gargoyle[1856]: httpd_gargoyle/1.0 14mar2008 starting on Gargoyle, port 80
May 31 09:07:26 Gargoyle user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
May 31 09:07:26 Gargoyle user.notice dnsmasq: Allowing 127.0.0.0/8 responses
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: started, version 2.62 cachesize 150
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
May 31 09:07:30 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using local addresses only for domain lan
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: reading /tmp/resolv.conf.auto
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using nameserver 192.168.1.248#53
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using nameserver 213.241.79.38#53
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using nameserver 8.8.8.8#53
May 31 09:07:30 Gargoyle daemon.warn dnsmasq[1977]: ignoring nameserver 192.168.1.1 - local interface
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: using local addresses only for domain lan
May 31 09:07:30 Gargoyle daemon.info dnsmasq[1977]: read /etc/hosts - 2 addresses
May 31 09:07:30 Gargoyle daemon.info dnsmasq-dhcp[1977]: read /etc/ethers - 0 addresses
May 31 09:07:31 Gargoyle user.info sysinit: ERROR: No valid dynamic DNS service configurations defined
May 31 09:07:31 Gargoyle user.info sysinit: (Did you specify correct configuration file path?)
May 31 09:07:31 Gargoyle user.info sysinit: setting up led USB
May 31 09:07:32 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCPDISCOVER(br-lan) 192.168.1.187 00:00:e2:6d:79:15 
May 31 09:07:32 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCPOFFER(br-lan) 192.168.1.187 00:00:e2:6d:79:15 
May 31 09:07:32 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCPREQUEST(br-lan) 192.168.1.187 00:00:e2:6d:79:15 
May 31 09:07:32 Gargoyle daemon.info dnsmasq-dhcp[1977]: DHCPACK(br-lan) 192.168.1.187 00:00:e2:6d:79:15 bb
May 31 09:07:34 Gargoyle kern.warn kernel: [   85.200000] head: sending ioctl 540d to a partition!
May 31 09:07:34 Gargoyle kern.warn kernel: [   85.200000] head: sending ioctl 540d to a partition!
May 31 09:07:34 Gargoyle user.notice ifup: Allowing Router Advertisements on wan (eth1)
May 31 09:07:37 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:07:40 Gargoyle authpriv.info dropbear[2276]: Child connection from 192.168.1.187:53841
May 31 09:07:40 Gargoyle kern.warn kernel: [   91.280000] head: sending ioctl 540d to a partition!
May 31 09:07:40 Gargoyle kern.warn kernel: [   91.280000] head: sending ioctl 540d to a partition!
May 31 09:07:46 Gargoyle kern.warn kernel: [   96.950000] head: sending ioctl 540d to a partition!
May 31 09:07:46 Gargoyle kern.warn kernel: [   96.960000] head: sending ioctl 540d to a partition!
May 31 09:07:47 Gargoyle kern.warn kernel: [   98.540000] ipt_bandwidth: timezone shift of 120 minutes detected, adjusting
May 31 09:07:47 Gargoyle kern.warn kernel: [   98.550000]                old minutes west=0, new minutes west=-120
May 31 09:07:48 Gargoyle authpriv.info dropbear[2276]: Exit before auth (user 'root', 0 fails): Exited normally
May 31 09:07:49 Gargoyle authpriv.info dropbear[2747]: Child connection from 192.168.1.187:53842
May 31 09:07:54 Gargoyle user.notice fstab: mount: mounting /dev/sda3 on /mnt/sda3 failed: Invalid argument
May 31 09:07:59 Gargoyle authpriv.notice dropbear[2747]: Password auth succeeded for 'root' from 192.168.1.187:53842
May 31 09:08:03 Gargoyle user.notice ifup: Enabling Router Solicitations on loopback (lo)
May 31 09:09:41 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:09:41 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:09:47 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:09:47 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:09:52 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:09:52 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:09:58 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:09:58 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:01 Gargoyle daemon.info dnsmasq[1977]: exiting on receipt of SIGTERM
May 31 09:10:01 Gargoyle kern.info kernel: [  232.320000] device wlan0 left promiscuous mode
May 31 09:10:01 Gargoyle kern.info kernel: [  232.330000] br-lan: port 2(wlan0) entered disabled state
May 31 09:10:03 Gargoyle kern.info kernel: [  233.780000] eth0: link down
May 31 09:10:03 Gargoyle kern.info kernel: [  233.780000] br-lan: port 1(eth0) entered disabled state
May 31 09:10:04 Gargoyle kern.info kernel: [  234.760000] device eth0 left promiscuous mode
May 31 09:10:04 Gargoyle kern.info kernel: [  234.760000] br-lan: port 1(eth0) entered disabled state
May 31 09:10:04 Gargoyle kern.info kernel: [  234.770000] eth1: link down
May 31 09:10:05 Gargoyle daemon.notice netifd: Interface 'lan' is now up
May 31 09:10:05 Gargoyle kern.info kernel: [  235.820000] device eth0 entered promiscuous mode
May 31 09:10:05 Gargoyle daemon.notice netifd: Interface 'loopback' is now up
May 31 09:10:05 Gargoyle daemon.notice netifd: wan (3683): udhcpc (v1.19.4) started
May 31 09:10:05 Gargoyle daemon.notice netifd: wan (3683): Sending discover...
May 31 09:10:05 Gargoyle kern.info kernel: [  236.420000] eth0: link up (1000Mbps/Full duplex)
May 31 09:10:05 Gargoyle kern.info kernel: [  236.420000] br-lan: port 1(eth0) entered forwarding state
May 31 09:10:05 Gargoyle kern.info kernel: [  236.430000] br-lan: port 1(eth0) entered forwarding state
May 31 09:10:06 Gargoyle user.notice ifup: Enabling Router Solicitations on lan (br-lan)
May 31 09:10:06 Gargoyle kern.info kernel: [  236.980000] eth1: link up (100Mbps/Full duplex)
May 31 09:10:07 Gargoyle kern.info kernel: [  238.430000] br-lan: port 1(eth0) entered forwarding state
May 31 09:10:08 Gargoyle daemon.notice netifd: wan (3683): Sending discover...
May 31 09:10:08 Gargoyle daemon.notice netifd: wan (3683): Sending select for 77.91.34.10...
May 31 09:10:08 Gargoyle daemon.notice netifd: wan (3683): Lease of 77.91.34.10 obtained, lease time 25143
May 31 09:10:08 Gargoyle daemon.notice netifd: Interface 'wan' is now up
May 31 09:10:10 Gargoyle kern.info kernel: [  241.250000] device wlan0 entered promiscuous mode
May 31 09:10:11 Gargoyle kern.info kernel: [  241.630000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:10:11 Gargoyle kern.info kernel: [  241.630000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:10:13 Gargoyle kern.info kernel: [  243.630000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:10:16 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:16 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:17 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
May 31 09:10:18 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:10:20 Gargoyle user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
May 31 09:10:20 Gargoyle user.notice dnsmasq: Allowing 127.0.0.0/8 responses
May 31 09:10:21 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:21 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: started, version 2.62 cachesize 150
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
May 31 09:10:23 Gargoyle daemon.info dnsmasq-dhcp[4280]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using local addresses only for domain lan
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: reading /tmp/resolv.conf.auto
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using nameserver 192.168.1.248#53
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using nameserver 213.241.79.38#53
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using nameserver 8.8.8.8#53
May 31 09:10:23 Gargoyle daemon.warn dnsmasq[4280]: ignoring nameserver 192.168.1.1 - local interface
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: using local addresses only for domain lan
May 31 09:10:23 Gargoyle daemon.info dnsmasq[4280]: read /etc/hosts - 2 addresses
May 31 09:10:23 Gargoyle daemon.info dnsmasq-dhcp[4280]: read /etc/ethers - 0 addresses
May 31 09:10:27 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:27 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:32 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:32 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:38 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:10:38 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:10:38 Gargoyle user.notice ifup: Allowing Router Advertisements on wan (eth1)
May 31 09:10:39 Gargoyle user.info firewall: removing wan (eth1) from zone wan
May 31 09:10:39 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:11:03 Gargoyle user.notice ifup: Enabling Router Solicitations on loopback (lo)
May 31 09:11:35 Gargoyle daemon.info dnsmasq[4280]: exiting on receipt of SIGTERM
May 31 09:11:36 Gargoyle kern.info kernel: [  326.720000] device wlan0 left promiscuous mode
May 31 09:11:36 Gargoyle kern.info kernel: [  326.730000] br-lan: port 2(wlan0) entered disabled state
May 31 09:11:37 Gargoyle kern.info kernel: [  328.460000] eth0: link down
May 31 09:11:37 Gargoyle kern.info kernel: [  328.460000] br-lan: port 1(eth0) entered disabled state
May 31 09:11:38 Gargoyle kern.info kernel: [  328.980000] eth1: link down
May 31 09:11:38 Gargoyle kern.info kernel: [  329.230000] device eth0 left promiscuous mode
May 31 09:11:38 Gargoyle kern.info kernel: [  329.240000] br-lan: port 1(eth0) entered disabled state
May 31 09:11:39 Gargoyle daemon.notice netifd: Interface 'lan' is now up
May 31 09:11:39 Gargoyle kern.info kernel: [  330.290000] device eth0 entered promiscuous mode
May 31 09:11:39 Gargoyle daemon.notice netifd: Interface 'loopback' is now up
May 31 09:11:40 Gargoyle daemon.notice netifd: wan (5527): udhcpc (v1.19.4) started
May 31 09:11:40 Gargoyle daemon.notice netifd: wan (5527): Sending discover...
May 31 09:11:40 Gargoyle kern.info kernel: [  330.890000] eth0: link up (1000Mbps/Full duplex)
May 31 09:11:40 Gargoyle kern.info kernel: [  330.890000] br-lan: port 1(eth0) entered forwarding state
May 31 09:11:40 Gargoyle kern.info kernel: [  330.900000] br-lan: port 1(eth0) entered forwarding state
May 31 09:11:40 Gargoyle kern.info kernel: [  330.980000] eth1: link up (100Mbps/Full duplex)
May 31 09:11:40 Gargoyle user.notice ifup: Enabling Router Solicitations on lan (br-lan)
May 31 09:11:42 Gargoyle kern.info kernel: [  332.900000] br-lan: port 1(eth0) entered forwarding state
May 31 09:11:43 Gargoyle daemon.notice netifd: wan (5527): Sending discover...
May 31 09:11:43 Gargoyle daemon.notice netifd: wan (5527): Sending select for 77.91.34.10...
May 31 09:11:43 Gargoyle daemon.notice netifd: wan (5527): Lease of 77.91.34.10 obtained, lease time 25048
May 31 09:11:43 Gargoyle daemon.notice netifd: Interface 'wan' is now up
May 31 09:11:45 Gargoyle kern.info kernel: [  335.830000] device wlan0 entered promiscuous mode
May 31 09:11:45 Gargoyle kern.info kernel: [  336.210000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:11:45 Gargoyle kern.info kernel: [  336.210000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:11:47 Gargoyle kern.info kernel: [  338.210000] br-lan: port 2(wlan0) entered forwarding state
May 31 09:11:52 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
May 31 09:11:52 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:11:54 Gargoyle user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
May 31 09:11:54 Gargoyle user.notice dnsmasq: Allowing 127.0.0.0/8 responses
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: started, version 2.62 cachesize 150
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
May 31 09:11:57 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using local addresses only for domain lan
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: reading /tmp/resolv.conf.auto
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using nameserver 192.168.1.248#53
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using nameserver 213.241.79.38#53
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using nameserver 8.8.8.8#53
May 31 09:11:57 Gargoyle daemon.warn dnsmasq[6084]: ignoring nameserver 192.168.1.1 - local interface
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: using local addresses only for domain lan
May 31 09:11:57 Gargoyle daemon.info dnsmasq[6084]: read /etc/hosts - 2 addresses
May 31 09:11:57 Gargoyle daemon.info dnsmasq-dhcp[6084]: read /etc/ethers - 0 addresses
May 31 09:12:12 Gargoyle user.notice ifup: Allowing Router Advertisements on wan (eth1)
May 31 09:12:13 Gargoyle user.info firewall: removing wan (eth1) from zone wan
May 31 09:12:14 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:12:40 Gargoyle user.notice ifup: Enabling Router Solicitations on loopback (lo)
May 31 09:15:59 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: authenticated
May 31 09:15:59 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 IEEE 802.11: associated (aid 1)
May 31 09:16:00 Gargoyle daemon.info hostapd: wlan0: STA 00:03:c9:37:42:01 WPA: pairwise key handshake completed (RSN)
May 31 09:16:00 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCPREQUEST(br-lan) 192.168.1.229 00:03:c9:37:42:01 
May 31 09:16:00 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCPACK(br-lan) 192.168.1.229 00:03:c9:37:42:01 bb
May 31 09:16:34 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCPREQUEST(br-lan) 192.168.1.187 00:00:e2:6d:79:15 
May 31 09:16:34 Gargoyle daemon.info dnsmasq-dhcp[6084]: DHCPACK(br-lan) 192.168.1.187 00:00:e2:6d:79:15 bb

41

Odp: Prawidłowa konfiguracja OpenVPN

W logach nic nie ma. Co z tymi certyfikatami? Dlaczego nie chce?

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

42 (edytowany przez bhb 2013-05-31 08:57:54)

Odp: Prawidłowa konfiguracja OpenVPN

zaraz po okienku to "może potrwać" konczy instalację.
Po restarcie serwer vpn nie uruchamia się.
W katalogu /etc/openvpn jest pusto.

logread

Jan  1 01:00:42 Gargoyle kern.info kernel: [    0.090000] NET: Registered protocol family 16
Jan  1 01:00:42 Gargoyle kern.info kernel: [    0.090000] gpiochip_add: registered GPIOs 0 to 17 on device: ath79
Jan  1 01:00:42 Gargoyle kern.info kernel: [    0.100000] MIPS: machine is TP-LINK TL-MR3420
Jan  1 01:00:42 Gargoyle kern.warn kernel: [    0.500000] registering PCI controller with io_map_base unset
Jan  1 01:00:42 Gargoyle kern.info kernel: [    0.540000] bio: create slab <bio-0> at 0
Jan  1 01:00:42 Gargoyle kern.info kernel: [    0.550000] PCI host bridge to bus 0000:00
Jan  1 01:00:42 Gargoyle kern.info kernel: [    0.550000] pci_bus 0000:00: root bus resource [mem 0x10000000-0x13ffffff]
Jan  1 01:00:42 Gargoyle kern.info kernel: [    0.560000] pci_bus 0000:00: root bus resource [io  0x0000]
Jan  1 01:00:42 Gargoyle kern.debug kernel: [    0.560000] pci 0000:00:00.0: [168c:002e] type 0 class 0x000280
Jan  1 01:00:42 Gargoyle kern.info kernel: [    0.560000] pci 0000:00:00.0: fixup device configuration
Jan  1 01:00:42 Gargoyle kern.debug kernel: [    0.570000] pci 0000:00:00.0: reg 10: [mem 0x10000000-0x1000ffff 64bit]
Jan  1 01:00:42 Gargoyle kern.debug kernel: [    0.570000] pci 0000:00:00.0: supports D1
Jan  1 01:00:42 Gargoyle kern.debug kernel: [    0.570000] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
Jan  1 01:00:42 Gargoyle kern.info kernel: [   11.420000] ehci-platform ehci-platform: USB 2.0 started, EHCI 1.00
Jan  1 01:00:42 Gargoyle kern.info kernel: [   11.420000] hub 1-0:1.0: USB hub found
Jan  1 01:00:42 Gargoyle kern.info kernel: [   11.430000] hub 1-0:1.0: 1 port detected
Jan  1 01:00:42 Gargoyle kern.info kernel: [   11.490000] Initializing USB Mass Storage driver...
Jan  1 01:00:42 Gargoyle kern.info kernel: [   11.500000] usbcore: registered new interface driver usb-storage
Jan  1 01:00:42 Gargoyle kern.info kernel: [   11.500000] USB Mass Storage support registered.
Jan  1 01:00:42 Gargoyle kern.info kernel: [   11.750000] usb 1-1: new high-speed USB device number 2 using ehci-platform
Jan  1 01:00:42 Gargoyle kern.info kernel: [   12.320000] scsi0 : usb-storage 1-1:1.0
Jan  1 01:00:42 Gargoyle kern.notice kernel: [   13.680000] scsi 0:0:0:0: Direct-Access     hp       v165w            4096 PQ: 0 ANSI: 4
Jan  1 01:00:42 Gargoyle kern.notice kernel: [   13.690000] sd 0:0:0:0: [sda] 7913472 512-byte logical blocks: (4.05 GB/3.77 GiB)
Jan  1 01:00:42 Gargoyle kern.notice kernel: [   13.690000] sd 0:0:0:0: [sda] Write Protect is off
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   13.700000] sd 0:0:0:0: [sda] Mode Sense: 43 00 00 00
Jan  1 01:00:42 Gargoyle kern.err kernel: [   13.700000] sd 0:0:0:0: [sda] No Caching mode page present
Jan  1 01:00:42 Gargoyle kern.err kernel: [   13.710000] sd 0:0:0:0: [sda] Assuming drive cache: write through
Jan  1 01:00:42 Gargoyle kern.err kernel: [   13.720000] sd 0:0:0:0: [sda] No Caching mode page present
Jan  1 01:00:42 Gargoyle kern.err kernel: [   13.720000] sd 0:0:0:0: [sda] Assuming drive cache: write through
Jan  1 01:00:42 Gargoyle kern.info kernel: [   13.730000]  sda: sda1 sda2 sda3
Jan  1 01:00:42 Gargoyle kern.err kernel: [   13.740000] sd 0:0:0:0: [sda] No Caching mode page present
Jan  1 01:00:42 Gargoyle kern.err kernel: [   13.750000] sd 0:0:0:0: [sda] Assuming drive cache: write through
Jan  1 01:00:42 Gargoyle kern.notice kernel: [   13.750000] sd 0:0:0:0: [sda] Attached SCSI removable disk
Jan  1 01:00:42 Gargoyle kern.info kernel: [   33.530000] EXT4-fs (sda2): recovery complete
Jan  1 01:00:42 Gargoyle kern.info kernel: [   33.540000] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   33.700000] eth0: link down
Jan  1 01:00:42 Gargoyle kern.info kernel: [   34.230000] Compat-drivers backport release: compat-drivers-2013-01-21-1
Jan  1 01:00:42 Gargoyle kern.info kernel: [   34.230000] Backport based on wireless-testing.git master-2013-02-22
Jan  1 01:00:42 Gargoyle kern.info kernel: [   34.240000] compat.git: wireless-testing.git
Jan  1 01:00:42 Gargoyle kern.info kernel: [   34.420000] cfg80211: Calling CRDA to update world regulatory domain
Jan  1 01:00:42 Gargoyle kern.info kernel: [   34.420000] cfg80211: World regulatory domain updated:
Jan  1 01:00:42 Gargoyle kern.info kernel: [   34.430000] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   34.440000] cfg80211:   (2400000 KHz - 2483000 KHz @ 40000 KHz), (N/A, 3000 mBm)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   34.440000] cfg80211:   (5140000 KHz - 5860000 KHz @ 40000 KHz), (N/A, 3000 mBm)
Jan  1 01:00:42 Gargoyle kern.warn kernel: [   35.420000] PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   35.430000] ath: EEPROM regdomain: 0x0
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   35.430000] ath: EEPROM indicates default country code should be used
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   35.430000] ath: doing EEPROM country->regdmn map search
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   35.430000] ath: country maps to regdmn code: 0x3a
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   35.430000] ath: Country alpha2 being used: US
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   35.430000] ath: Regpair used: 0x3a
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   35.440000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Jan  1 01:00:42 Gargoyle kern.debug kernel: [   35.450000] Registered led device: ath9k-phy0
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.450000] ieee80211 phy0: Atheros AR9287 Rev:2 mem=0xb0000000, irq=40
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.460000] cfg80211: Calling CRDA for country: US
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.460000] cfg80211: Regulatory domain changed to country: US
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.470000] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.470000] cfg80211:   (2400000 KHz - 2483000 KHz @ 40000 KHz), (N/A, 3000 mBm)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.480000] cfg80211:   (5140000 KHz - 5860000 KHz @ 40000 KHz), (N/A, 3000 mBm)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.720000] PPP generic driver version 2.4.2
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.800000] tun: Universal TUN/TAP device driver, 1.6
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.810000] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Jan  1 01:00:42 Gargoyle kern.info kernel: [   35.920000] GRE over IPv4 demultiplexor driver
Jan  1 01:00:42 Gargoyle kern.warn kernel: [   35.950000] ip_gre: Unknown symbol icmpv6_send (err 0)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   36.080000] ip_tables: (C) 2000-2006 Netfilter Core Team
Jan  1 01:00:42 Gargoyle kern.info kernel: [   36.670000] NET: Registered protocol family 24
Jan  1 01:00:42 Gargoyle kern.info kernel: [   36.830000] nf_conntrack version 0.5.0 (455 buckets, 1820 max)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   37.250000] PPTP driver version 0.8.5
Jan  1 01:00:42 Gargoyle kern.info kernel: [   38.000000] xt_time: kernel timezone is -0000
Jan  1 01:00:42 Gargoyle kern.info kernel: [   38.880000]     Hooked IMQ after mangle on PREROUTING
Jan  1 01:00:42 Gargoyle kern.info kernel: [   38.880000]     Hooked IMQ after nat on POSTROUTING
Jan  1 01:00:42 Gargoyle kern.info kernel: [   38.890000] IMQ driver loaded successfully. (numdevs = 2, numqueues = 1)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   39.120000] Netfilter messages via NETLINK v0.30.
Jan  1 01:00:42 Gargoyle kern.notice kernel: [   39.180000] ip_set: protocol 6
Jan  1 01:00:42 Gargoyle kern.info kernel: [   39.920000] usbcore: registered new interface driver cdc_acm
Jan  1 01:00:42 Gargoyle kern.info kernel: [   39.920000] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.080000] usbcore: registered new interface driver usbserial
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.090000] USB Serial support registered for generic
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.090000] usbcore: registered new interface driver usbserial_generic
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.100000] usbserial: USB Serial Driver core
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.150000] usbcore: registered new interface driver cdc_ether
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.240000] usbcore: registered new interface driver cdc_ncm
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.350000] USB Serial support registered for GSM modem (1-port)
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.360000] usbcore: registered new interface driver option
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.360000] option: v0.7.2:USB Driver for GSM modems
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.490000] USB Serial support registered for Sierra USB modem
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.500000] usbcore: registered new interface driver sierra
Jan  1 01:00:42 Gargoyle kern.info kernel: [   40.500000] sierra: v.1.7.16:USB Driver for Sierra Wireless USB modems
Jan  1 01:00:43 Gargoyle kern.info kernel: [   43.870000] Adding 65532k swap on /dev/sda1.  Priority:-1 extents:1 across:65532k 
Jan  1 01:00:44 Gargoyle user.notice usb-modeswitch: 1-0:1.0: Manufacturer=Linux_3.3.8_ehci_hcd Product=Generic_Platform_EHCI_Controller Serial=ehci-platform
Jan  1 01:00:45 Gargoyle user.notice usb-modeswitch: 1-1:1.0: Manufacturer=HP Product=v165w Serial=AA251E2E00000166
Jan  1 01:00:50 Gargoyle daemon.notice netifd: Interface 'lan' is now up
Jan  1 01:00:50 Gargoyle kern.info kernel: [   50.030000] device eth0 entered promiscuous mode
Jan  1 01:00:50 Gargoyle daemon.notice netifd: Interface 'loopback' is now up
Jan  1 01:00:50 Gargoyle daemon.notice netifd: wan (1070): udhcpc (v1.19.4) started
Jan  1 01:00:50 Gargoyle kern.info kernel: [   50.630000] eth0: link up (1000Mbps/Full duplex)
Jan  1 01:00:50 Gargoyle kern.info kernel: [   50.780000] br-lan: port 1(eth0) entered forwarding state
Jan  1 01:00:50 Gargoyle kern.info kernel: [   50.780000] br-lan: port 1(eth0) entered forwarding state
Jan  1 01:00:50 Gargoyle daemon.notice netifd: wan (1070): Sending discover...
Jan  1 01:00:51 Gargoyle user.notice ifup: Enabling Router Solicitations on lan (br-lan)
Jan  1 01:00:52 Gargoyle kern.info kernel: [   52.220000] eth1: link up (100Mbps/Full duplex)
Jan  1 01:00:52 Gargoyle kern.info kernel: [   52.780000] br-lan: port 1(eth0) entered forwarding state
Jan  1 01:00:53 Gargoyle daemon.notice netifd: wan (1070): Sending discover...
Jan  1 01:00:53 Gargoyle daemon.notice netifd: wan (1070): Sending select for 77.91.34.10...
Jan  1 01:00:53 Gargoyle daemon.notice netifd: wan (1070): Lease of 77.91.34.10 obtained, lease time 23228
Jan  1 01:00:54 Gargoyle daemon.notice netifd: Interface 'wan' is now up
Jan  1 01:00:58 Gargoyle kern.info kernel: [   58.110000] device wlan0 entered promiscuous mode
Jan  1 01:00:58 Gargoyle kern.info kernel: [   58.790000] br-lan: port 2(wlan0) entered forwarding state
Jan  1 01:00:58 Gargoyle kern.info kernel: [   58.800000] br-lan: port 2(wlan0) entered forwarding state
Jan  1 01:01:00 Gargoyle kern.info kernel: [   60.800000] br-lan: port 2(wlan0) entered forwarding state
Jan  1 01:00:05 Gargoyle user.info sysinit: Loading defaults
Jan  1 01:00:05 Gargoyle user.info sysinit: Loading synflood protection
Jan  1 01:00:05 Gargoyle user.info sysinit: Adding custom chains
Jan  1 01:00:06 Gargoyle user.info sysinit: Loading zones
Jan  1 01:00:09 Gargoyle user.info sysinit: Loading forwardings
Jan  1 01:00:09 Gargoyle user.info sysinit: Loading rules
Jan  1 01:00:10 Gargoyle user.info sysinit: Loading redirects
Jan  1 01:00:10 Gargoyle user.info sysinit: Loading includes
Jan  1 01:00:12 Gargoyle user.info sysinit: Optimizing conntrack
Jan  1 01:00:12 Gargoyle user.info sysinit: Loading interfaces
Jan  1 01:00:12 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
Jan  1 01:00:16 Gargoyle authpriv.info dropbear[1948]: Running in background
Jan  1 01:00:17 Gargoyle daemon.warn httpd_gargoyle[1980]: started as root without requesting chroot(), warning only
Jan  1 01:00:17 Gargoyle daemon.notice httpd_gargoyle[1980]: httpd_gargoyle/1.0 14mar2008 starting on Gargoyle, port 80
Jan  1 01:00:19 Gargoyle user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Jan  1 01:00:19 Gargoyle user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: started, version 2.62 cachesize 150
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq-dhcp[2128]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: using local addresses only for domain lan
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: reading /tmp/resolv.conf.auto
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: using nameserver 192.168.1.248#53
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: using nameserver 213.241.79.38#53
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: using nameserver 8.8.8.8#53
Jan  1 01:00:23 Gargoyle daemon.warn dnsmasq[2128]: ignoring nameserver 192.168.1.1 - local interface
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: using local addresses only for domain lan
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq[2128]: read /etc/hosts - 2 addresses
Jan  1 01:00:23 Gargoyle daemon.info dnsmasq-dhcp[2128]: read /etc/ethers - 0 addresses
May 31 09:42:35 Gargoyle user.info sysinit: ERROR: No valid dynamic DNS service configurations defined
May 31 09:42:35 Gargoyle user.info sysinit: (Did you specify correct configuration file path?)
May 31 09:42:36 Gargoyle user.info sysinit: setting up led USB
May 31 09:42:37 Gargoyle daemon.info dnsmasq-dhcp[2128]: DHCPDISCOVER(br-lan) 192.168.1.187 00:00:e2:6d:79:15 
May 31 09:42:37 Gargoyle daemon.info dnsmasq-dhcp[2128]: DHCPOFFER(br-lan) 192.168.1.187 00:00:e2:6d:79:15 
May 31 09:42:37 Gargoyle daemon.info dnsmasq-dhcp[2128]: DHCPREQUEST(br-lan) 192.168.1.187 00:00:e2:6d:79:15 
May 31 09:42:37 Gargoyle daemon.info dnsmasq-dhcp[2128]: DHCPACK(br-lan) 192.168.1.187 00:00:e2:6d:79:15 bb
May 31 09:42:37 Gargoyle kern.warn kernel: [   88.000000] head: sending ioctl 540d to a partition!
May 31 09:42:37 Gargoyle kern.warn kernel: [   88.000000] head: sending ioctl 540d to a partition!
May 31 09:42:37 Gargoyle user.notice ifup: Allowing Router Advertisements on wan (eth1)
May 31 09:42:40 Gargoyle user.info firewall: adding wan (eth1) to zone wan
May 31 09:42:43 Gargoyle kern.warn kernel: [   94.100000] head: sending ioctl 540d to a partition!
May 31 09:42:43 Gargoyle kern.warn kernel: [   94.110000] head: sending ioctl 540d to a partition!
May 31 09:42:48 Gargoyle kern.warn kernel: [   98.570000] head: sending ioctl 540d to a partition!
May 31 09:42:48 Gargoyle kern.warn kernel: [   98.570000] head: sending ioctl 540d to a partition!
May 31 09:42:48 Gargoyle kern.warn kernel: [   98.670000] ipt_bandwidth: timezone shift of 120 minutes detected, adjusting
May 31 09:42:48 Gargoyle kern.warn kernel: [   98.680000]                old minutes west=0, new minutes west=-120
May 31 09:42:52 Gargoyle user.notice fstab: mount: mounting /dev/sda3 on /mnt/sda3 failed: Invalid argument
May 31 09:43:17 Gargoyle daemon.err openvpn(custom_config)[3094]: Options error: In [CMD-LINE]:1: Error opening configuration file: /etc/openvpn/server.conf
May 31 09:43:17 Gargoyle daemon.warn openvpn(custom_config)[3094]: Use --help for more information.
May 31 09:43:18 Gargoyle user.notice ifup: Enabling Router Solicitations on loopback (lo)
May 31 09:46:09 Gargoyle authpriv.info dropbear[3276]: Child connection from 192.168.1.187:54073
May 31 09:46:16 Gargoyle authpriv.notice dropbear[3276]: Password auth succeeded for 'root' from 192.168.1.187:54073

43

Odp: Prawidłowa konfiguracja OpenVPN

A openvpn zainstalowałeś z repo gargoyle czy openwrt?

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

44

Odp: Prawidłowa konfiguracja OpenVPN

zainstalowałem przez stronę jako do dodatek

45

Odp: Prawidłowa konfiguracja OpenVPN

Odinstaluj, zrób to ręcznie i zobacz z jakiego źródła pobiera.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

46

Odp: Prawidłowa konfiguracja OpenVPN

nie wiem jak sprawdzić wypisuje coś takiego

 opkg install openvpn
Preparing to install the following packages, which will require 849858 bytes:
    liblzo, zlib, libopenssl, openvpn

Preparing to install package liblzo...
    Downloading...
    Downloaded liblzo successfully.
    Installing liblzo...
    Successfully installed liblzo.
....

47 (edytowany przez bhb 2013-05-31 09:15:43)

Odp: Prawidłowa konfiguracja OpenVPN

jeszcze raz

root@Gargoyle:/etc/openvpn# opkg install plugin-gargoyle-openvpn
Preparing to install the following packages, which will require 428810 bytes:
    openvpn-easy-rsa, zip, plugin-gargoyle-openvpn, openssl-util, openvpn

Preparing to install package openssl-util...
    Downloading...
    Downloaded openssl-util successfully.
    Installing openssl-util...
    Successfully installed openssl-util.
Preparing to install package openvpn-easy-rsa...

48

Odp: Prawidłowa konfiguracja OpenVPN

Jeszcze raz, odinstaluj. Zmień /etc/opkg.conf, zostaw tylko repo gargoylepl, resztę zaremuj/wywal. Restart routera i zainstaluj ponowie.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

49

Odp: Prawidłowa konfiguracja OpenVPN

nie instaluje się

opkg.conf

dest root /                                                                                                                  
dest ram /tmp                                                                                                                
dest plugin_root /plugin_root                                                                                                
lists_dir ext /var/opkg-lists                                                                                                
option overlay_root /overlay                                                                                                 
src/gz gargoylepl http://ecco.selfip.net/gargoyle-pl/attitude_adjustment/ar71xx/packages
opkg install plugin-gargoyle-openvpn
Preparing to install the following packages, which will require 1141016 bytes:
    openvpn-easy-rsa, liblzo, zip, zlib, libopenssl, plugin-gargoyle-openvpn, openssl-util, openvpn

Preparing to install package zlib...
ERROR: Could determine download  URL for package zlib
An error occurred during Installation, removing partially installed packages.
Removing package openvpn-easy-rsa...
Finished removing openvpn-easy-rsa.

Removing package zlib...
Finished removing zlib.

Removing package plugin-gargoyle-openvpn...
Finished removing plugin-gargoyle-openvpn.

Finished removing partially installed packages

50

Odp: Prawidłowa konfiguracja OpenVPN

Zainstaluj ręcznie zlib wcześniej, bo on jest w standardowym repo.

cd /tmp
wget http://downloads.openwrt.org/attitude_adjustment/12.09/ar71xx/generic/packages/zlib_1.2.7-1_ar71xx.ipk
opkg install ./zlib_1.2.7-1_ar71xx.ipk

I jeżeli będzie się o coś jeszcze buntował to dokładnie w analogiczny sposób.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.