Odp: Gargoyle 1.5.5, nowy plugin OpenVPN
OK, bede kombinować.
dzieki!
1.6.2.2 (r42647), by obsy oraz NAS z MiniDLNA i Transmission
wcześnej: HUB aktywny + drukarka + USB 2,5" + miniDLNA z napisami + torrent
Nie jesteś zalogowany. Proszę się zalogować lub zarejestrować.
eko.one.pl → Oprogramowanie / Software → Gargoyle 1.5.5, nowy plugin OpenVPN
Strony Poprzednia 1 … 7 8 9 10 11 12 13 Następna
Zaloguj się lub zarejestruj by napisać odpowiedź
OK, bede kombinować.
dzieki!
Więc tak
Podmontowałem zasoby z NAS`a przez NFS do TP-linka i ustawiłem ścieżkę dostępu do /mnt/nas Zapisuje, ale tylko gdy łączę się przez OpenVPN, czyli przez adres: ftp://192.168.1.1 Gdy próbuje przez adres dyndns niestety jest brak strony. Mam zaznaczone oczywiście 'zezwalaj na dostęp WAN'
Nie mogę pokazac firewalla, gdyż jest:
root@Gargoyle:~$ /etc/config/firewall
-ash: /etc/config/firewall: Permission denied
root@Gargoyle:~$ /etc/firewall.user
-ash: /etc/firewall.user: Permission deniedcat /etc/config/firewall
lub uci show firewall
Pokaż to i jeszcze wynik ifconfig
OK, więc tak:
ipconfig:
root@Gargoyle:~$ ifconfig
br-lan Link encap:Ethernet HWaddr B0:48:7A:BE:D6:64
inet addr:192.168.1.1 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:33067 errors:0 dropped:0 overruns:0 frame:0
TX packets:38366 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:9097910 (8.6 MiB) TX bytes:23895349 (22.7 MiB)
eth0 Link encap:Ethernet HWaddr B0:48:7A:BE:D6:64
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:87846 errors:0 dropped:0 overruns:185198 frame:0
TX packets:72360 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:35051147 (33.4 MiB) TX bytes:33901299 (32.3 MiB)
Interrupt:4
eth0.1 Link encap:Ethernet HWaddr B0:48:7A:BE:D6:64
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:33067 errors:0 dropped:0 overruns:0 frame:0
TX packets:38366 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:9230198 (8.8 MiB) TX bytes:24048813 (22.9 MiB)
eth0.2 Link encap:Ethernet HWaddr B0:48:7A:BE:D6:64
inet addr:93.175.80.238 Bcast:255.255.255.255 Mask:255.255.248.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:52983 errors:0 dropped:0 overruns:0 frame:0
TX packets:33992 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:24419609 (23.2 MiB) TX bytes:9851401 (9.3 MiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:24 errors:0 dropped:0 overruns:0 frame:0
TX packets:24 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:1854 (1.8 KiB) TX bytes:1854 (1.8 KiB)
mon.wlan0 Link encap:UNSPEC HWaddr B0-48-7A-BE-D6-64-00-00-00-00-00-00-00-00-00-00
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5926 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:32
RX bytes:778469 (760.2 KiB) TX bytes:0 (0.0 B)
tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:10.8.0.1 P-t-P:10.8.0.1 Mask:255.255.255.0
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
wlan0 Link encap:Ethernet HWaddr B0:48:7A:BE:D6:64
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:75 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:32
RX bytes:0 (0.0 B) TX bytes:28542 (27.8 KiB)
root@Gargoyle:~$I /etc/config/firewall Nie mieścił mi się cały w PuTTY, więc wklejam zawartość z WinSCP:
config 'defaults'
option 'syn_flood' '1'
option 'input' 'ACCEPT'
option 'output' 'ACCEPT'
option 'forward' 'REJECT'
config 'zone'
option 'name' 'lan'
option 'network' 'lan'
option 'input' 'ACCEPT'
option 'output' 'ACCEPT'
option 'forward' 'REJECT'
config 'zone'
option 'name' 'wan'
option 'network' 'wan'
option 'input' 'REJECT'
option 'output' 'ACCEPT'
option 'forward' 'REJECT'
option 'masq' '1'
option 'mtu_fix' '1'
config 'forwarding'
option 'src' 'lan'
option 'dest' 'wan'
config 'rule'
option 'name' 'Allow-DHCP-Renew'
option 'src' 'wan'
option 'proto' 'udp'
option 'dest_port' '68'
option 'target' 'ACCEPT'
option 'family' 'ipv4'
config 'rule'
option 'name' 'Allow-Ping'
option 'src' 'wan'
option 'proto' 'icmp'
option 'icmp_type' 'echo-request'
option 'family' 'ipv4'
option 'target' 'ACCEPT'
config 'rule'
option 'name' 'Allow-DHCPv6'
option 'src' 'wan'
option 'proto' 'udp'
option 'src_ip' 'fe80::/10'
option 'src_port' '547'
option 'dest_ip' 'fe80::/10'
option 'dest_port' '546'
option 'family' 'ipv6'
option 'target' 'ACCEPT'
config 'rule'
option 'name' 'Allow-ICMPv6-Input'
option 'src' 'wan'
option 'proto' 'icmp'
list 'icmp_type' 'echo-request'
list 'icmp_type' 'destination-unreachable'
list 'icmp_type' 'packet-too-big'
list 'icmp_type' 'time-exceeded'
list 'icmp_type' 'bad-header'
list 'icmp_type' 'unknown-header-type'
list 'icmp_type' 'router-solicitation'
list 'icmp_type' 'neighbour-solicitation'
list 'icmp_type' 'router-advertisement'
list 'icmp_type' 'neighbour-advertisement'
option 'limit' '1000/sec'
option 'family' 'ipv6'
option 'target' 'ACCEPT'
config 'rule'
option 'name' 'Allow-ICMPv6-Forward'
option 'src' 'wan'
option 'dest' '*'
option 'proto' 'icmp'
list 'icmp_type' 'echo-request'
list 'icmp_type' 'destination-unreachable'
list 'icmp_type' 'packet-too-big'
list 'icmp_type' 'time-exceeded'
list 'icmp_type' 'bad-header'
list 'icmp_type' 'unknown-header-type'
option 'limit' '1000/sec'
option 'family' 'ipv6'
option 'target' 'ACCEPT'
config 'include'
option 'path' '/etc/firewall.user'
config 'include'
option 'path' '/usr/lib/gargoyle_firewall_util/gargoyle_additions.firewall'
config 'rule'
option '_name' 'transmission'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '51413'
config 'rule'
option '_name' 'transmission_wan'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '9091'
config 'rule'
option 'target' 'ACCEPT'
option '_name' 'transmissionsynology'
option 'src' 'wan'
option 'proto' 'tcp'
option 'dest_port' '9091'
config 'redirect' 'redirect_enabled_number_0'
option 'name' 'xbox'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '3074'
option 'dest_ip' '192.168.1.102'
option 'dest_port' '3074'
config 'redirect' 'redirect_enabled_number_1'
option 'name' 'xbox'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '3074'
option 'dest_ip' '192.168.1.102'
option 'dest_port' '3074'
config 'redirect' 'redirect_enabled_number_2'
option 'name' 'laptop'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '14856'
option 'dest_ip' '192.168.1.103'
option 'dest_port' '14856'
config 'redirect' 'redirect_enabled_number_3'
option 'name' 'laptop'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '14856'
option 'dest_ip' '192.168.1.103'
option 'dest_port' '14856'
config 'redirect' 'redirect_enabled_number_4'
option 'name' 'torrent'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '14857'
option 'dest_ip' '192.168.1.101'
option 'dest_port' '14857'
config 'redirect' 'redirect_enabled_number_5'
option 'name' 'torrent'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '14857'
option 'dest_ip' '192.168.1.101'
option 'dest_port' '14857'
config 'redirect' 'redirect_enabled_number_6'
option 'name' 'utorrent_nas'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '51413'
option 'dest_ip' '192.168.1.172'
option 'dest_port' '51413'
config 'redirect' 'redirect_enabled_number_7'
option 'name' 'utorrent_nas'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '51413'
option 'dest_ip' '192.168.1.172'
option 'dest_port' '51413'
config 'redirect' 'redirect_enabled_number_8'
option 'name' 'nsa310-cifs'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '445'
option 'dest_ip' '192.168.1.172'
option 'dest_port' '445'
config 'redirect' 'redirect_enabled_number_9'
option 'name' 'nsa310-cifs'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '445'
option 'dest_ip' '192.168.1.172'
option 'dest_port' '445'
config 'redirect' 'redirect_enabled_number_10'
option 'name' 'nsa_hhtp'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '88'
option 'dest_ip' '192.168.1.172'
option 'dest_port' '88'
config 'redirect' 'redirect_enabled_number_11'
option 'name' 'nsa_hhtp'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '88'
option 'dest_ip' '192.168.1.172'
option 'dest_port' '88'
config 'redirect' 'redirect_enabled_number_12'
option 'name' 'nsa_ftp'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '21'
option 'dest_ip' '192.168.1.172'
option 'dest_port' '21'
config 'redirect' 'redirect_enabled_number_13'
option 'name' 'nsa_ftp'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '21'
option 'dest_ip' '192.168.1.172'
option 'dest_port' '21'
config 'redirect' 'redirect_enabled_number_14'
option 'name' 'torrentNSA'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'tcp'
option 'src_dport' '9091-9091'
option 'dest_port' '9091-9091'
option 'dest_ip' '192.168.1.172'
config 'redirect' 'redirect_enabled_number_15'
option 'name' 'torrentNSA'
option 'src' 'wan'
option 'dest' 'lan'
option 'proto' 'udp'
option 'src_dport' '9091-9091'
option 'dest_port' '9091-9091'
option 'dest_ip' '192.168.1.172'
config 'remote_accept' 'ra_443_443'
option 'local_port' '443'
option 'remote_port' '443'
option 'proto' 'tcp'
option 'zone' 'wan'
config 'remote_accept' 'ra_80_80'
option 'local_port' '80'
option 'remote_port' '80'
option 'proto' 'tcp'
option 'zone' 'wan'
config 'remote_accept' 'ra_22_22'
option 'local_port' '22'
option 'remote_port' '22'
option 'proto' 'tcp'
option 'zone' 'wan'
config 'zone' 'vpn_zone'
option 'name' 'vpn'
option 'network' 'vpn'
option 'input' 'ACCEPT'
option 'output' 'ACCEPT'
option 'forward' 'ACCEPT'
option 'mtu_fix' '1'
option 'masq' '1'
config 'forwarding' 'vpn_lan_forwarding'
option 'src' 'lan'
option 'dest' 'vpn'
config 'remote_accept' 'ra_openvpn'
option 'zone' 'wan'
option 'local_port' '1194'
option 'remote_port' '1194'
option 'proto' 'udp'
config 'forwarding' 'vpn_wan_forwarding'
option 'src' 'vpn'
option 'dest' 'wan'
config 'rule'
option '_name' 'openvpn'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'udp'
option 'dest_port' '1194'
config 'rule' 'ftp_wan'
option 'src' 'wan'
option 'target' 'ACCEPT'
option 'proto' 'tcp'
option 'dest_port' '21'Dzieki ![]()
A ftp://93.175.80.238 możesz się dostać? Zresztą tak samo jak do ssh czy panelu gargoyle czy transmission.
Nie mam publicznego IP, więc korzystam z dyndns. Przez dydns mogę się dostać do SSH, panelu gargoyle oraz transmission. WinSCP sobie jedynie jeszcze nie ustawiłem. Jedynie FTP nie działa.
To tu też musisz.
zrób ps i zobacz czy proces vsftpd jest uruchomiony. Pokaż też wynik iptables -v -L
ps
root@Gargoyle:~$ ps
PID USER VSZ STAT COMMAND
1 root 1384 S init
2 root 0 SW [kthreadd]
3 root 0 SW [ksoftirqd/0]
4 root 0 SW [events/0]
5 root 0 SW [khelper]
8 root 0 SW [async/mgr]
41 root 0 SW [sync_supers]
43 root 0 SW [bdi-default]
45 root 0 SW [kblockd/0]
71 root 0 SW [kswapd0]
72 root 0 SW [aio/0]
73 root 0 SW [crypto/0]
85 root 0 SW [mtdblockd]
91 root 0 SW [ar71xx-spi]
223 root 0 SW [ipolldevd]
276 root 0 SWN [jffs2_gcd_mtd3]
292 root 1384 S init
306 root 1388 S syslogd -C16
308 root 1372 S klogd
322 root 836 S /sbin/hotplug2 --override --persistent --set-worker /
518 root 0 SW [events_nrt]
561 root 0 SW [cfg80211]
692 root 0 SW [khubd]
744 root 0 SW [phy0]
764 root 0 SW [rpciod/0]
788 root 0 SW [nfsiod]
1664 root 1472 S hostapd -P /var/run/wifi-phy0.pid -B /var/run/hostapd
2110 root 1380 S /usr/sbin/ntpd -n -p 0.pool.ntp.org -p 1.pool.ntp.org
2390 root 1132 S /usr/sbin/dropbear -P /var/run/dropbear.1.pid -p 22
2399 root 752 S /usr/sbin/p9100d -b -f /dev/lp0 0
2500 root 1052 S /usr/sbin/vsftpd /tmp/vsftpd/vsftpd.conf
2515 root 1344 S httpd_gargoyle -c cgi-bin/**|**.sh|**.cgi|**.csv -d /
2893 nobody 916 S /usr/sbin/dnsmasq -K -D -y -Z -b -E -s lan -S /lan/ -
3095 root 1444 S /usr/bin/ddns_gargoyle -P /etc/ddns_providers.conf -C
3133 root 1400 S crond -c /etc/crontabs -l 9
3144 root 3196 S /usr/sbin/openvpn --syslog openvpn(custom_config) --w
3149 root 1380 S watchdog -t 5 /dev/watchdog
3301 root 1388 S udhcpc -t 0 -i eth0.2 -b -p /var/run/dhcp-eth0.2.pid
3371 root 1204 S /usr/sbin/dropbear -P /var/run/dropbear.1.pid -p 22
3376 root 1388 S -ash
3681 root 1204 S /usr/sbin/dropbear -P /var/run/dropbear.1.pid -p 22
3706 root 1388 S -ash
3711 root 1376 R psi iptables -v -l
2 tcp dpt:3074
0 0 ACCEPT udp -- any any anywhere 192.168.1.102 udp dpt:3074
0 0 ACCEPT tcp -- any any anywhere TV tcp dpt:14856
0 0 ACCEPT udp -- any any anywhere TV udp dpt:14856
0 0 ACCEPT tcp -- any any anywhere user-stacjonarny tcp dpt:14857
0 0 ACCEPT udp -- any any anywhere user-stacjonarny udp dpt:14857
0 0 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:51413
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:51413
0 0 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:microsoft-ds
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:microsoft-ds
0 0 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:kerberos
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:kerberos
0 0 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:ftp
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:21
0 0 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:9091
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:9091
Chain reject (7 references)
pkts bytes target prot opt in out source destination
3 140 REJECT tcp -- any any anywhere anywhere reject-with tcp-reset
1329 151K REJECT all -- any any anywhere anywhere reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
89 4424 RETURN tcp -- any any anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 25/sec burst 50
0 0 DROP all -- any any anywhere anywhere
Chain zone_lan (1 references)
pkts bytes target prot opt in out source destination
66 6955 input_lan all -- any any anywhere anywhere
66 6955 zone_lan_ACCEPT all -- any any anywhere anywhere
Chain zone_lan_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- any br-lan anywhere anywhere
66 6955 ACCEPT all -- br-lan any anywhere anywhere
Chain zone_lan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- any br-lan anywhere anywhere
0 0 DROP all -- br-lan any anywhere anywhere
Chain zone_lan_REJECT (1 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- any br-lan anywhere anywhere
0 0 reject all -- br-lan any anywhere anywhere
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
4014 291K pf_loopback_B all -- any any anywhere anywhere
0 0 ACCEPT all -- br-lan br-lan anywhere anywhere
4014 291K zone_vpn_ACCEPT all -- any any anywhere anywhere
4014 291K zone_wan_ACCEPT all -- any any anywhere anywhere
0 0 forwarding_lan all -- any any anywhere anywhere
0 0 zone_lan_REJECT all -- any any anywhere anywhere
Chain zone_vpn (1 references)
pkts bytes target prot opt in out source destination
2 96 input_vpn all -- any any anywhere anywhere
2 96 zone_vpn_ACCEPT all -- any any anywhere anywhere
Chain zone_vpn_ACCEPT (4 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- any tun0 anywhere anywhere
2 96 ACCEPT all -- tun0 any anywhere anywhere
Chain zone_vpn_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- any tun0 anywhere anywhere
0 0 DROP all -- tun0 any anywhere anywhere
Chain zone_vpn_REJECT (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- any tun0 anywhere anywhere
0 0 reject all -- tun0 any anywhere anywhere
Chain zone_vpn_forward (1 references)
pkts bytes target prot opt in out source destination
444 21312 zone_wan_ACCEPT all -- any any anywhere anywhere
0 0 forwarding_vpn all -- any any anywhere anywhere
0 0 zone_vpn_ACCEPT all -- any any anywhere anywhere
Chain zone_wan (1 references)
pkts bytes target prot opt in out source destination
848 303K ACCEPT udp -- any any anywhere anywhere udp dpt:bootpc
5 300 ACCEPT icmp -- any any anywhere anywhere icmp echo-request
52 2220 ACCEPT tcp -- any any anywhere anywhere tcp dpt:51413
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:9091
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:9091
1 42 ACCEPT udp -- any any anywhere anywhere udp dpt:openvpn
0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ftp
1381 153K input_wan all -- any any anywhere anywhere
1332 151K zone_wan_REJECT all -- any any anywhere anywhere
Chain zone_wan_ACCEPT (3 references)
pkts bytes target prot opt in out source destination
4872 342K ACCEPT all -- any eth0.2 anywhere anywhere
0 0 ACCEPT all -- eth0.2 any anywhere anywhere
Chain zone_wan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- any eth0.2 anywhere anywhere
0 0 DROP all -- eth0.2 any anywhere anywhere
Chain zone_wan_REJECT (2 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- any eth0.2 anywhere anywhere
1332 151K reject all -- eth0.2 any anywhere anywhere
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- any any anywhere 192.168.1.102 tcp dpt:3074
0 0 ACCEPT udp -- any any anywhere 192.168.1.102 udp dpt:3074
0 0 ACCEPT tcp -- any any anywhere TV tcp dpt:14856
0 0 ACCEPT udp -- any any anywhere TV udp dpt:14856
0 0 ACCEPT tcp -- any any anywhere user-stacjonarny tcp dpt:14857
0 0 ACCEPT udp -- any any anywhere user-stacjonarny udp dpt:14857
8014 420K ACCEPT tcp -- any any anywhere nsa310 tcp dpt:51413
59291 6926K ACCEPT udp -- any any anywhere nsa310 udp dpt:51413
0 0 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:microsoft-ds
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:microsoft-ds
0 0 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:kerberos
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:kerberos
15 728 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:ftp
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:21
1 48 ACCEPT tcp -- any any anywhere nsa310 tcp dpt:9091
0 0 ACCEPT udp -- any any anywhere nsa310 udp dpt:9091
0 0 forwarding_wan all -- any any anywhere anywhere
0 0 zone_wan_REJECT all -- any any anywhere anywhere
root@Gargoyle:~$Nie jest całe, da sie w PuTTY zobaczyć brakującą cześć? Obecnie łączę się przez dyndns. OpenVPN, który działa super, narazie jest wyłączony.
Po prostu przewiń ekran.
Zauważyłeś że masz i otwarty port dla ftp i jednocześnie przekierowany z wan port 21 na nsa310 ? Tak się nie da, albo to albo to.
Fakt, wyłączyłem tę wartość i działa
Dziwne, bo nie dodawałem jej. Jest to możliwe, że w NAS, sam dodał port 21 do przekierowania? Postaram się pokombinować z montowaniem zasobów przez NFS lub CIFS do routera i to udostepnić przez FTP
Co do OpenVPN - świetne, naprawne świetne narzędzie. Dzieki za pomoc.
pozdrawiam
Nazewnictwo reguły jednak sugeruje że zrobiłeś to samodzielnie z gui. Jedyną ew. możliwością przekierowania portu przez nas było by UPNP, ale tego w regułach byś nie miał.
Nie mogę sie z tym nie zgodzić
Pewnie przez przypadek to zrobiłem. Ale w każdym bądź razie jest to logiczne dla mnie, że nie działało. Jeśli mógłbym prosić o wytłumaczenie jednej rzeczy. Próbowałem udostępnić zasoby NAS`a przez NFS, ale oprogramowanie ZyXELL`a pozwala tylko i wyłącznie tworzyć nowe udziały, a nie udostępniać istniejące. Używam w NAS FFP sticka, ale chyba tam nie ma możliwości wgrania innego NFS. Zdecydowałem się na CIFS. Zaisntalowałem na TP-Linku odpowiednie pakiety i generalnie działa. Ale generalnie. Gdy przez GUI ustawię ściężkę do podmontowanego zasobu tj.: /mnt/nas i dam dostęp anonimowy bez zapisu, to mogę przeglądać i kopiować dane. Natomiast gdy zaznaczę zapis na anonimowym, lub stworzę nowego usera z zapisem, to niestety nie mogę nic zapisać. Stworzyłem nowego usera, o nazwie jakiej używam w Sambie NAS`a i takim samym hasłem, ale to też nic nie dało. Rozumiem, że hasła i userzy z Samby to co innego niż w Linuxie? Gdy na TP-linku daje start i stop usługi ftp jest:
root@Gargoyle:~$ /etc/init.d/vsftpd stop
Terminated
root@Gargoyle:~$ /etc/init.d/vsftpd start
Changing password for admin
New password:
Retype password:
Password for admin changed by rootMoje pytanie, czy jest możliwość zapisywania przez FTP na ZyXELL`a korzystając z zamontowanego zasobu przez CIFS?
Dziwne to pytanie, ale mam nadzieje, że sensowne.
dzieki
Ale - mówisz o jednej rzeczy a piszesz o drugiej. W tej chwili wypisałeś o trzech usługach na openwrt które nie są tym samym - nfs, ftp i samba (cifs). I jeszcze zyxela do tego dokładasz
. GUI z gargoyle nie zawiera opcji montowania zasobów przez nfs czy cfis tylko udostępniania zasobów lokalnych.
Więc co chcesz i gdzie chcesz udostępnić? ![]()
Masło maślane, fakt, sorry
Więc tak, chcę udostępnić istniejący na ZyXELL`u katalog przez CIFS do TP-Linka, aby tego udostępnić z zapisywaniem przez FTP. Mniej więcej tak
Oryginalny firmware ZyXELL`a niestety nie umożliwia udostępniania istniejących folderów przez NFS, tylko nowo powstałe. Więc zostaje mi tylko CIFS, tak? ![]()
Obecnie podmontowałem ZyXELL`a przez CIFS do TP-Linka. Jest to zamontowane z /mnt/zyxel Ale nie mam możliwości zapisu przez FTP
Wejdź do routera, wejdź do katalogu /mnt/zyxel i zrób touch test.txt. Utworzył się? Jak nie to masz problem z udostępnienien zasobów na zyxelu.
Zrobiłem jak mówiłeś i utworzył się.
No to teraz tylko chmod 777 /mnt/zyxel i uruchom ftp na nim.
Zrobiłem tak i nie mogę przez FTP nic zapisać
Przez PuTTY jak najbardziej.
Oto log z mount
//192.168.1.172/public on /mnt/zyxel type cifs (rw,mand,relatime,unc=\\192.168.1.172\public,username=root,uid=0,noforceuid,gid=0,noforcegid,addr=192.168.1.172,file_mode=0755,dir_mode=0755,serverino,rsize=16384,wsize=57344)Zamontowałem poleceniem:
root@Gargoyle:~$ mount.cifs \\\\192.168.1.172\\public /mnt/zyxel -o user=user
ls -al /mnt/zyxel pokaż
Jakieś pierdoły po nagrywałem
root@Gargoyle:~$ ls -al /mnt/zyxel
drwxr-xr-x 1 root root 0 Aug 25 18:58 .
drwxrwxrwx 4 root root 0 Aug 25 18:45 ..
-rwxr-xr-x 1 root root 873251 Aug 19 17:17 GT_Racing_Motor_Academy_PL.jar
-rwxr-xr-x 1 root root 1143813 Aug 21 09:04 MiploSyncSetup-release-1901.exe
-rwxr-xr-x 1 root root 169789 Jul 26 2009 Supreme_Com_320x240.jar
-rwxr-xr-x 1 root root 0 Aug 25 18:47 test.txt
-rwxr-xr-x 1 root root 0 Aug 25 18:47 test2.txt
-rwxr-xr-x 1 root root 0 Aug 25 18:47 test3.txtPliki test tworzyłem przez PuTTy. Pojawiały się również na ZyXELL`u
I dmesg | tail
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: cifs_mount failed w/return code = -13
CIFS VFS: Autodisabling the use of server inode numbers on \\192.168.1.172\publ ic. This server doesn't seem to support them properly. Hardlinks will not be rec ognized on this mount. Consider mounting with the "noserverino" option to silenc e this message.Mam zainstalowane pakiety:
cifsmount - 1.5-2
kmod-fs-cifs - 2.6.32.27-1cj
EDIT: Zrobiłem. Dodałem przy montowaniu zasobów przez cifs, coś takiego:
mount.cifs \\\ipserwera\\zasob /mnt/zyxel -o user=admin,iocharset=utf8,file_mode=0777,dir_mode=0777
Zapytał o hasło i działa, mogę zapisywać. Poszukam na forum, bo było jak dodać do autostartu te montowanie.
dzieki i pozdrawiam
Witam
Uruchomiłem dziś Aero2. Ale niestety nie mogę się połączyć przez OpenVPN z internetem. Bez niego wszystko działa OK. Oto log z logread:
Jan 2 21:40:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2500 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:40:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2500 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:40:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2500 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: MULTI: multi_create_instance called
Jan 2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Re-using SSL/TLS context
Jan 2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 LZO compression initialized
Jan 2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Jan 2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Jan 2 21:41:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 TLS: Initial packet from 78.30.106.27:2672, sid=4c91a95b cb40db57
Jan 2 21:41:18 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 VERIFY OK: depth=1, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Jan 2 21:41:18 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 VERIFY OK: depth=0, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=client1/name=client1/emailAddress=client1@.com
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: 78.30.106.27:2672 [client1] Peer Connection Initiated with 78.30.106.27:2672
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificat
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/client1
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: MULTI: Learn: 10.8.0.2 -> client1/78.30.106.27:2672
Jan 2 21:41:24 Gargoyle daemon.notice openvpn(custom_config)[1870]: MULTI: primary virtual IP for client1/78.30.106.27:2672: 10.8.0.2
Jan 2 21:41:26 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 PUSH: Received control message: 'PUSH_REQUEST'
Jan 2 21:41:26 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 SENT CONTROL [client1]: 'PUSH_REPLY,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.1.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.0'
Jan 2 21:41:36 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:36 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:37 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:40 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:43 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:44 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:54 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:41:56 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:02 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:05 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:08 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:10 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:11 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:13 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:13 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:15 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:21 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:23 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:25 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:33 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:33 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:34 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:35 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:35 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:35 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:41 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:41 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:43 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:44 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:45 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:48 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:49 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:50 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:50 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:51 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:52 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 Replay-window backtrack occurred [7]
Jan 2 21:42:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:53 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:54 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:54 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:54 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:55 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:56 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:56 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:56 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:57 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
Jan 2 21:42:57 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/78.30.106.27:2672 MULTI: bad source address from client [78.30.106.27], packet dropped
SuccessI w kliencie OpenVPN na kompie
Wed Jan 02 21:42:34 2013 us=812000 Replay-window backtrack occurred [2]Dodać jeszcze jakieś logi?
Tzn masz serwer openvpn na aero2? Zapomnij, porty wejściowe są blokowane, jak u każdego operatora komórkowego.
Nie, nie. Źle się wyraziłem. Serwer OpenVPN jest bez zmian na Tp-linku. Natomiast laptop łączę obecnie przez Aero2 z siecią OpenVPN która kiedyś działała, ale na publicznych pkt dostępowych.
Wracając do tematu. Oto mój log:
Fri Jan 11 11:20:43 2013 us=125000 Current Parameter Settings:
Fri Jan 11 11:20:43 2013 us=125000 config = 'client1.ovpn'
Fri Jan 11 11:20:43 2013 us=125000 mode = 0
Fri Jan 11 11:20:43 2013 us=125000 show_ciphers = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 show_digests = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 show_engines = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 genkey = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 key_pass_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 show_tls_ciphers = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 Connection profiles [default]:
Fri Jan 11 11:20:43 2013 us=125000 proto = udp
Fri Jan 11 11:20:43 2013 us=125000 local = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 local_port = 0
Fri Jan 11 11:20:43 2013 us=125000 remote = 'publiczny dndns .org'
Fri Jan 11 11:20:43 2013 us=125000 remote_port = 1194
Fri Jan 11 11:20:43 2013 us=125000 remote_float = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 bind_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 bind_local = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 connect_retry_seconds = 5
Fri Jan 11 11:20:43 2013 us=125000 connect_timeout = 10
Fri Jan 11 11:20:43 2013 us=125000 connect_retry_max = 0
Fri Jan 11 11:20:43 2013 us=125000 socks_proxy_server = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 socks_proxy_port = 0
Fri Jan 11 11:20:43 2013 us=125000 socks_proxy_retry = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 Connection profiles END
Fri Jan 11 11:20:43 2013 us=125000 remote_random = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 ipchange = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 dev = 'tun'
Fri Jan 11 11:20:43 2013 us=125000 dev_type = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 dev_node = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 lladdr = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 topology = 3
Fri Jan 11 11:20:43 2013 us=125000 tun_ipv6 = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 ifconfig_local = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 ifconfig_remote_netmask = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 ifconfig_noexec = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 ifconfig_nowarn = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 shaper = 0
Fri Jan 11 11:20:43 2013 us=125000 tun_mtu = 1500
Fri Jan 11 11:20:43 2013 us=125000 tun_mtu_defined = ENABLED
Fri Jan 11 11:20:43 2013 us=125000 link_mtu = 1500
Fri Jan 11 11:20:43 2013 us=125000 link_mtu_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 tun_mtu_extra = 0
Fri Jan 11 11:20:43 2013 us=125000 tun_mtu_extra_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 fragment = 0
Fri Jan 11 11:20:43 2013 us=125000 mtu_discover_type = -1
Fri Jan 11 11:20:43 2013 us=125000 mtu_test = 0
Fri Jan 11 11:20:43 2013 us=125000 mlock = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 keepalive_ping = 0
Fri Jan 11 11:20:43 2013 us=125000 keepalive_timeout = 0
Fri Jan 11 11:20:43 2013 us=125000 inactivity_timeout = 0
Fri Jan 11 11:20:43 2013 us=125000 ping_send_timeout = 0
Fri Jan 11 11:20:43 2013 us=125000 ping_rec_timeout = 0
Fri Jan 11 11:20:43 2013 us=125000 ping_rec_timeout_action = 0
Fri Jan 11 11:20:43 2013 us=125000 ping_timer_remote = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 remap_sigusr1 = 0
Fri Jan 11 11:20:43 2013 us=125000 explicit_exit_notification = 0
Fri Jan 11 11:20:43 2013 us=125000 persist_tun = ENABLED
Fri Jan 11 11:20:43 2013 us=125000 persist_local_ip = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 persist_remote_ip = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 persist_key = ENABLED
Fri Jan 11 11:20:43 2013 us=125000 mssfix = 1450
Fri Jan 11 11:20:43 2013 us=125000 resolve_retry_seconds = 1000000000
Fri Jan 11 11:20:43 2013 us=125000 username = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 groupname = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 chroot_dir = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 cd_dir = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 writepid = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 up_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 down_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=125000 down_pre = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 up_restart = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 up_delay = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 daemon = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 inetd = 0
Fri Jan 11 11:20:43 2013 us=125000 log = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 suppress_timestamps = DISABLED
Fri Jan 11 11:20:43 2013 us=125000 nice = 0
Fri Jan 11 11:20:43 2013 us=125000 verbosity = 5
Fri Jan 11 11:20:43 2013 us=125000 mute = 0
Fri Jan 11 11:20:43 2013 us=125000 gremlin = 0
Fri Jan 11 11:20:43 2013 us=125000 status_file = 'current_status'
Fri Jan 11 11:20:43 2013 us=125000 status_file_version = 1
Fri Jan 11 11:20:43 2013 us=125000 status_file_update_freq = 60
Fri Jan 11 11:20:43 2013 us=125000 occ = ENABLED
Fri Jan 11 11:20:43 2013 us=125000 rcvbuf = 0
Fri Jan 11 11:20:43 2013 us=125000 sndbuf = 0
Fri Jan 11 11:20:43 2013 us=125000 sockflags = 0
Fri Jan 11 11:20:43 2013 us=140000 fast_io = DISABLED
Fri Jan 11 11:20:43 2013 us=140000 lzo = 7
Fri Jan 11 11:20:43 2013 us=140000 route_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=140000 route_default_gateway = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=140000 route_default_metric = 0
Fri Jan 11 11:20:43 2013 us=140000 route_noexec = DISABLED
Fri Jan 11 11:20:43 2013 us=140000 route_delay = 5
Fri Jan 11 11:20:43 2013 us=140000 route_delay_window = 30
Fri Jan 11 11:20:43 2013 us=140000 route_delay_defined = ENABLED
Fri Jan 11 11:20:43 2013 us=140000 route_nopull = DISABLED
Fri Jan 11 11:20:43 2013 us=140000 route_gateway_via_dhcp = DISABLED
Fri Jan 11 11:20:43 2013 us=140000 max_routes = 100
Fri Jan 11 11:20:43 2013 us=140000 allow_pull_fqdn = DISABLED
Fri Jan 11 11:20:43 2013 us=140000 management_addr = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=140000 management_port = 0
Fri Jan 11 11:20:43 2013 us=140000 management_user_pass = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000 management_log_history_cache = 250
Fri Jan 11 11:20:43 2013 us=171000 management_echo_buffer_size = 100
Fri Jan 11 11:20:43 2013 us=171000 management_write_peer_info_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000 management_client_user = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000 management_client_group = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000 management_flags = 0
Fri Jan 11 11:20:43 2013 us=171000 shared_secret_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=171000 key_direction = 0
Fri Jan 11 11:20:43 2013 us=171000 ciphername_defined = ENABLED
Fri Jan 11 11:20:43 2013 us=171000 ciphername = 'BF-CBC'
Fri Jan 11 11:20:43 2013 us=171000 authname_defined = ENABLED
Fri Jan 11 11:20:43 2013 us=171000 authname = 'SHA1'
Fri Jan 11 11:20:43 2013 us=171000 prng_hash = 'SHA1'
Fri Jan 11 11:20:43 2013 us=171000 prng_nonce_secret_len = 16
Fri Jan 11 11:20:43 2013 us=171000 keysize = 16
Fri Jan 11 11:20:43 2013 us=203000 engine = DISABLED
Fri Jan 11 11:20:43 2013 us=203000 replay = ENABLED
Fri Jan 11 11:20:43 2013 us=203000 mute_replay_warnings = DISABLED
Fri Jan 11 11:20:43 2013 us=203000 replay_window = 64
Fri Jan 11 11:20:43 2013 us=203000 replay_time = 15
Fri Jan 11 11:20:43 2013 us=203000 packet_id_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 use_iv = ENABLED
Fri Jan 11 11:20:43 2013 us=203000 test_crypto = DISABLED
Fri Jan 11 11:20:43 2013 us=203000 tls_server = DISABLED
Fri Jan 11 11:20:43 2013 us=203000 tls_client = ENABLED
Fri Jan 11 11:20:43 2013 us=203000 key_method = 2
Fri Jan 11 11:20:43 2013 us=203000 ca_file = 'ca.crt'
Fri Jan 11 11:20:43 2013 us=203000 ca_path = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 dh_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 cert_file = 'client1.crt'
Fri Jan 11 11:20:43 2013 us=203000 priv_key_file = 'client1.key'
Fri Jan 11 11:20:43 2013 us=203000 pkcs12_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 cryptoapi_cert = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 cipher_list = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 tls_verify = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 tls_export_cert = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 tls_remote = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 crl_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=203000 ns_cert_type = 64
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=203000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000 remote_cert_ku[i] = 0
Fri Jan 11 11:20:43 2013 us=234000 remote_cert_eku = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=234000 tls_timeout = 2
Fri Jan 11 11:20:43 2013 us=234000 renegotiate_bytes = 0
Fri Jan 11 11:20:43 2013 us=234000 renegotiate_packets = 0
Fri Jan 11 11:20:43 2013 us=234000 renegotiate_seconds = 3600
Fri Jan 11 11:20:43 2013 us=234000 handshake_window = 60
Fri Jan 11 11:20:43 2013 us=234000 transition_window = 3600
Fri Jan 11 11:20:43 2013 us=234000 single_session = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 push_peer_info = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 tls_exit = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 tls_auth_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=234000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_protected_authentication = DISABLED
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=250000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_private_mode = 00000000
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=265000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_cert_private = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_pin_cache_period = -1
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_id = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=281000 pkcs11_id_management = DISABLED
Fri Jan 11 11:20:43 2013 us=281000 server_network = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=281000 server_netmask = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=281000 server_bridge_ip = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 server_bridge_netmask = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 server_bridge_pool_start = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 server_bridge_pool_end = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 ifconfig_pool_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=296000 ifconfig_pool_start = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 ifconfig_pool_end = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 ifconfig_pool_netmask = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 ifconfig_pool_persist_filename = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000 ifconfig_pool_persist_refresh_freq = 600
Fri Jan 11 11:20:43 2013 us=296000 n_bcast_buf = 256
Fri Jan 11 11:20:43 2013 us=296000 tcp_queue_limit = 64
Fri Jan 11 11:20:43 2013 us=296000 real_hash_size = 256
Fri Jan 11 11:20:43 2013 us=296000 virtual_hash_size = 256
Fri Jan 11 11:20:43 2013 us=296000 client_connect_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000 learn_address_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000 client_disconnect_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000 client_config_dir = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=296000 ccd_exclusive = DISABLED
Fri Jan 11 11:20:43 2013 us=296000 tmp_dir = 'C:\DOCUME~1\UYTKOW~1\USTAWI~1\Temp\'
Fri Jan 11 11:20:43 2013 us=296000 push_ifconfig_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=296000 push_ifconfig_local = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 push_ifconfig_remote_netmask = 0.0.0.0
Fri Jan 11 11:20:43 2013 us=296000 enable_c2c = DISABLED
Fri Jan 11 11:20:43 2013 us=296000 duplicate_cn = DISABLED
Fri Jan 11 11:20:43 2013 us=296000 cf_max = 0
Fri Jan 11 11:20:43 2013 us=296000 cf_per = 0
Fri Jan 11 11:20:43 2013 us=296000 max_clients = 1024
Fri Jan 11 11:20:43 2013 us=296000 max_routes_per_client = 256
Fri Jan 11 11:20:43 2013 us=312000 auth_user_pass_verify_script = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=312000 auth_user_pass_verify_script_via_file = DISABLED
Fri Jan 11 11:20:43 2013 us=312000 ssl_flags = 0
Fri Jan 11 11:20:43 2013 us=312000 client = ENABLED
Fri Jan 11 11:20:43 2013 us=312000 pull = ENABLED
Fri Jan 11 11:20:43 2013 us=312000 auth_user_pass_file = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=312000 show_net_up = DISABLED
Fri Jan 11 11:20:43 2013 us=312000 route_method = 0
Fri Jan 11 11:20:43 2013 us=312000 ip_win32_defined = DISABLED
Fri Jan 11 11:20:43 2013 us=312000 ip_win32_type = 3
Fri Jan 11 11:20:43 2013 us=312000 dhcp_masq_offset = 0
Fri Jan 11 11:20:43 2013 us=312000 dhcp_lease_time = 31536000
Fri Jan 11 11:20:43 2013 us=312000 tap_sleep = 0
Fri Jan 11 11:20:43 2013 us=312000 dhcp_options = DISABLED
Fri Jan 11 11:20:43 2013 us=312000 dhcp_renew = DISABLED
Fri Jan 11 11:20:43 2013 us=312000 dhcp_pre_release = DISABLED
Fri Jan 11 11:20:43 2013 us=343000 dhcp_release = DISABLED
Fri Jan 11 11:20:43 2013 us=343000 domain = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=343000 netbios_scope = '[UNDEF]'
Fri Jan 11 11:20:43 2013 us=343000 netbios_node_type = 0
Fri Jan 11 11:20:43 2013 us=343000 disable_nbt = DISABLED
Fri Jan 11 11:20:43 2013 us=343000 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Fri Jan 11 11:20:43 2013 us=343000 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Fri Jan 11 11:20:43 2013 us=500000 LZO compression initialized
Fri Jan 11 11:20:43 2013 us=500000 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jan 11 11:20:43 2013 us=515000 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Jan 11 11:20:43 2013 us=515000 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jan 11 11:20:43 2013 us=515000 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jan 11 11:20:43 2013 us=515000 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jan 11 11:20:43 2013 us=515000 Local Options hash (VER=V4): '41690919'
Fri Jan 11 11:20:43 2013 us=515000 Expected Remote Options hash (VER=V4): '530fdded'
Fri Jan 11 11:20:43 2013 us=531000 UDPv4 link local: [undef]
Fri Jan 11 11:20:43 2013 us=531000 UDPv4 link remote: xxx.xxx.xxx.xxx.:1194
Fri Jan 11 11:20:43 2013 us=640000 TLS: Initial packet from xxx.xxx.xxx.xxx:1194, sid=0c353331 9b885437
Fri Jan 11 11:20:44 2013 us=468000 VERIFY OK: depth=1, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Fri Jan 11 11:20:44 2013 us=484000 VERIFY OK: nsCertType=SERVER
Fri Jan 11 11:20:44 2013 us=484000 VERIFY OK: depth=0, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Fri Jan 11 11:20:45 2013 us=843000 NOTE: Options consistency check may be skewed by version differences
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'version' is used inconsistently, local='version V4', remote='version V0 UNDEF'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'dev-type' is present in local config but missing in remote config, local='dev-type tun'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'link-mtu' is present in local config but missing in remote config, local='link-mtu 1542'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'tun-mtu' is present in local config but missing in remote config, local='tun-mtu 1500'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'proto' is present in local config but missing in remote config, local='proto UDPv4'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'cipher' is present in local config but missing in remote config, local='cipher BF-CBC'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'auth' is present in local config but missing in remote config, local='auth SHA1'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'keysize' is present in local config but missing in remote config, local='keysize 128'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'key-method' is present in local config but missing in remote config, local='key-method 2'
Fri Jan 11 11:20:45 2013 us=843000 WARNING: 'tls-server' is present in local config but missing in remote config, local='tls-server'
Fri Jan 11 11:20:45 2013 us=843000 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Jan 11 11:20:45 2013 us=843000 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jan 11 11:20:45 2013 us=843000 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Jan 11 11:20:45 2013 us=843000 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jan 11 11:20:45 2013 us=843000 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Fri Jan 11 11:20:45 2013 us=843000 [mfnlhglfmebsrho] Peer Connection Initiated with xxx.xxx.xxx.xxx:1194
Fri Jan 11 11:20:48 2013 us=109000 SENT CONTROL [mfnlhglfmebsrho]: 'PUSH_REQUEST' (status=1)
Fri Jan 11 11:20:48 2013 us=296000 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.1.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.0'
Fri Jan 11 11:20:48 2013 us=296000 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jan 11 11:20:48 2013 us=296000 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jan 11 11:20:48 2013 us=296000 OPTIONS IMPORT: route options modified
Fri Jan 11 11:20:48 2013 us=296000 OPTIONS IMPORT: route-related options modified
Fri Jan 11 11:20:48 2013 us=359000 ROUTE default_gateway=78.30.101.206
Fri Jan 11 11:20:48 2013 us=390000 TAP-WIN32 device [Połączenie lokalne OpenVPN] opened: \\.\Global\{9EF02630-0B5D-4705-8C0E-36B4A3DE8962}.tap
Fri Jan 11 11:20:48 2013 us=390000 TAP-Win32 Driver Version 9.9
Fri Jan 11 11:20:48 2013 us=390000 TAP-Win32 MTU=1500
Fri Jan 11 11:20:48 2013 us=406000 Set TAP-Win32 TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Fri Jan 11 11:20:48 2013 us=406000 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {9EF02630-0B5D-4705-8C0E-36B4A3DE8962} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Fri Jan 11 11:20:48 2013 us=406000 Successful ARP Flush on interface [3] {9EF02630-0B5D-4705-8C0E-36B4A3DE8962}
Fri Jan 11 11:20:53 2013 us=546000 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Fri Jan 11 11:20:53 2013 us=546000 C:\WINDOWS\system32\route.exe ADD xxx.xxx.xxx.xxx MASK 255.255.255.255 78.30.101.206
Fri Jan 11 11:20:53 2013 us=546000 Route addition via IPAPI succeeded [adaptive]
Fri Jan 11 11:20:53 2013 us=546000 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Fri Jan 11 11:20:53 2013 us=546000 Route addition via IPAPI succeeded [adaptive]
Fri Jan 11 11:20:53 2013 us=546000 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Fri Jan 11 11:20:53 2013 us=562000 Route addition via IPAPI succeeded [adaptive]
Fri Jan 11 11:20:53 2013 us=562000 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.8.0.1
Fri Jan 11 11:20:53 2013 us=562000 Route addition via IPAPI succeeded [adaptive]
Fri Jan 11 11:20:53 2013 us=562000 Initialization Sequence Completed
Fri Jan 11 11:33:00 2013 us=328000 Replay-window backtrack occurred [1]
Fri Jan 11 11:33:00 2013 us=796000 Replay-window backtrack occurred [3]I log z gargoyle:
Jan 11 09:50:42 Gargoyle daemon.notice openvpn(custom_config)[1870]: client1/151.248.33.83:1171 MULTI: bad source address from client [151.248.33.83], packet dropped
Jan 11 09:52:01 Gargoyle cron.err crond[19557]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:52:03 Gargoyle cron.err crond[19608]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:52:11 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
Jan 11 09:52:12 Gargoyle user.info firewall: adding wan (eth0.2) to zone wan
Jan 11 09:52:16 Gargoyle cron.err crond[20252]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:52:21 Gargoyle cron.err crond[20893]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:19 Gargoyle cron.err crond[21158]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:20 Gargoyle cron.err crond[21209]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:28 Gargoyle user.info firewall: adding lan (br-lan) to zone lan
Jan 11 09:54:28 Gargoyle user.info firewall: adding wan (eth0.2) to zone wan
Jan 11 09:54:31 Gargoyle user.info firewall: adding vpn (tun0) to zone vpn
Jan 11 09:54:34 Gargoyle cron.err crond[21897]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:38 Gargoyle cron.err crond[22538]: crond (busybox 1.15.3) started, log level 9
Jan 11 09:54:38 Gargoyle daemon.err openvpn(custom_config)[1870]: event_wait : Interrupted system call (code=4)
Jan 11 09:54:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: TCP/UDP: Closing socket
Jan 11 09:54:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: Closing TUN/TAP interface
Jan 11 09:54:38 Gargoyle daemon.notice openvpn(custom_config)[1870]: /sbin/ifconfig tun0 0.0.0.0
Jan 11 09:54:39 Gargoyle daemon.notice openvpn(custom_config)[1870]: SIGTERM[hard,] received, process exiting
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: OpenVPN 2.2.2 mips-openwrt-linux [SSL] [LZO2] [EPOLL] built on Jul 6 2012
Jan 11 09:54:40 Gargoyle daemon.warn openvpn(custom_config)[22575]: NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: Diffie-Hellman initialized with 1024 bit key
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: Socket Buffers: R=[114688->131072] S=[114688->131072]
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: TUN/TAP device tun0 opened
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: TUN/TAP TX queue length set to 100
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: /sbin/ifconfig tun0 10.8.0.1 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: UDPv4 link local (bound): [undef]:1194
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: UDPv4 link remote: [undef]
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: MULTI: multi_init called, r=256 v=256
Jan 11 09:54:40 Gargoyle daemon.notice openvpn(custom_config)[22575]: Initialization Sequence Completed
Jan 11 09:54:41 Gargoyle user.notice ifup: Enabling Router Solicitations on vpn (tun0)
Jan 11 09:54:41 Gargoyle user.info firewall: removing vpn (tun0) from zone vpn
Jan 11 09:54:42 Gargoyle user.info firewall: adding vpn (tun0) to zone vpn
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: MULTI: multi_create_instance called
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Re-using SSL/TLS context
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 LZO compression initialized
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Jan 11 09:56:20 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 TLS: Initial packet from 151.248.33.83:1407, sid=ff51f33d dc81fc68
Jan 11 09:56:26 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 VERIFY OK: depth=1, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Jan 11 09:56:26 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 VERIFY OK: depth=0, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=client1/name=client1/emailAddress=client1@.com
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: 151.248.33.83:1407 [client1] Peer Connection Initiated with 151.248.33.83:1407
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/client1
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 MULTI: Learn: 10.8.0.2 -> client1/151.248.33.83:1407
Jan 11 09:56:27 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 MULTI: primary virtual IP for client1/151.248.33.83:1407: 10.8.0.2
Jan 11 09:56:29 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 PUSH: Received control message: 'PUSH_REQUEST'
Jan 11 09:56:29 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 SENT CONTROL [client1]: 'PUSH_REPLY,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.1.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.
Jan 11 09:56:53 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 Replay-window backtrack occurred [1]
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: service provider=dyndns.com
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: domain=publiczny.org
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: Successfully retrieved local ip from url: http://checkip.org
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: local IP = xxx.xxx.xxx.xxx
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: remote IP = xxx.xxx.xxx.xxx
Jan 11 10:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: Update not needed, IPs match
Jan 11 10:06:42 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 [client1] Inactivity timeout (--ping-restart), restarting
Jan 11 10:06:42 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/151.248.33.83:1407 SIGUSR1[soft,ping-restart] received, client-instance restarting
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: service provider=dyndns.com
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: domain=publiczny.org
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: Successfully retrieved local ip from url: http://automation.whatismyip.com/n09230945.asp
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: local IP = xxx.xxx.xxx.xxx
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: remote IP = xxx.xxx.xxx.xxx
Jan 11 10:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: Update not needed, IPs match
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: service provider=dyndns.com
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: domain=publiczny.org
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: Could not determine local ip from url: http://myip.dk
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: Successfully retrieved local ip from url: http://www.ip-address.org
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: local IP = xxx.xxx.xxx.xxx
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: remote IP = xxx.xxx.xxx.xxx
Jan 11 10:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: Update not needed, IPs match
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]: service provider=dyndns.com
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]: domain=publiczny.org
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]: Successfully retrieved local ip from url: http://my-ip-address.com
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]: local IP = xxx.xxx.xxx.xxx
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]: remote IP = xxx.xxx.xxx.xxx
Jan 11 10:48:38 Gargoyle daemon.info ddns_gargoyle[1835]: Update not needed, IPs match
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: service provider=dyndns.com
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: domain=publiczny.org
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: Successfully retrieved local ip from url: http://www.selfseo.com/what_is_my_ip.php
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: local IP = xxx.xxx.xxx.xxx
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: remote IP = xxx.xxx.xxx.xxx
Jan 11 11:03:38 Gargoyle daemon.info ddns_gargoyle[1835]: Update not needed, IPs match
Jan 11 11:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 11:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: service provider=dyndns.com
Jan 11 11:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: domain=publiczny.org
Jan 11 11:18:38 Gargoyle daemon.info ddns_gargoyle[1835]: Could not determine local ip from url: http://aruljohn.com
Jan 11 11:18:39 Gargoyle daemon.info ddns_gargoyle[1835]: Successfully retrieved local ip from url: http://www.lawrencegoetz.com/programs/ipinfo/
Jan 11 11:18:39 Gargoyle daemon.info ddns_gargoyle[1835]: local IP = xxx.xxx.xxx.xxx
Jan 11 11:18:39 Gargoyle daemon.info ddns_gargoyle[1835]: remote IP = xxx.xxx.xxx.xxx
Jan 11 11:18:39 Gargoyle daemon.info ddns_gargoyle[1835]: Update not needed, IPs match
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: MULTI: multi_create_instance called
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Re-using SSL/TLS context
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 LZO compression initialized
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Jan 11 11:20:32 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 TLS: Initial packet from 78.30.101.205:1047, sid=d942d7a5 fc470baa
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 VERIFY OK: depth=1, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=mfnlhglfmebsrho/name=mfnlhglfmebsrho/emailAddress=mfnlhglfmebsrho@atstgigbtdcmbkc.com
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 VERIFY OK: depth=0, /C=__/ST=UnknownProvince/L=UnknownCity/O=UnknownOrg/OU=UnknownOrgUnit/CN=client1/name=client1/emailAddress=client1@.com
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: 78.30.101.205:1047 [client1] Peer Connection Initiated with 78.30.101.205:1047
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/client1
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 MULTI: Learn: 10.8.0.2 -> client1/78.30.101.205:1047
Jan 11 11:20:34 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 MULTI: primary virtual IP for client1/78.30.101.205:1047: 10.8.0.2
Jan 11 11:20:37 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 PUSH: Received control message: 'PUSH_REQUEST'
Jan 11 11:20:37 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 SENT CONTROL [client1]: 'PUSH_REPLY,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.1.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.
Jan 11 11:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: Checking whether update needed:
Jan 11 11:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: service provider=dyndns.com
Jan 11 11:33:38 Gargoyle daemon.info ddns_gargoyle[1835]: domain=publiczny.org
Jan 11 11:33:39 Gargoyle daemon.info ddns_gargoyle[1835]: Successfully retrieved local ip from url: http://myipinfo.net
Jan 11 11:33:39 Gargoyle daemon.info ddns_gargoyle[1835]: local IP = xxx.xxx.xxx.xxx
Jan 11 11:33:39 Gargoyle daemon.info ddns_gargoyle[1835]: remote IP = xxx.xxx.xxx.xxx
Jan 11 11:33:39 Gargoyle daemon.info ddns_gargoyle[1835]: Update not needed, IPs match
Jan 11 11:34:05 Gargoyle daemon.info hostapd: wlan0: STA 00:13:e8:73:d2:29 IEEE 802.11: authenticated
Jan 11 11:34:05 Gargoyle daemon.info hostapd: wlan0: STA 00:13:e8:73:d2:29 IEEE 802.11: associated (aid 1)
Jan 11 11:34:06 Gargoyle daemon.info hostapd: wlan0: STA 00:13:e8:73:d2:29 WPA: pairwise key handshake completed (RSN)
Jan 11 11:34:07 Gargoyle daemon.info dnsmasq-dhcp[25312]: DHCPREQUEST(br-lan) 192.168.1.102 00:13:e8:73:d2:29
Jan 11 11:34:07 Gargoyle daemon.info dnsmasq-dhcp[25312]: DHCPACK(br-lan) 192.168.1.102 00:13:e8:73:d2:29 Laptop-44af739d4f
Jan 11 11:38:51 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 [client1] Inactivity timeout (--ping-restart), restarting
Jan 11 11:38:51 Gargoyle daemon.notice openvpn(custom_config)[22575]: client1/78.30.101.205:1047 SIGUSR1[soft,ping-restart] received, client-instance restarting
SuccessNiestety dalej nie działa OpenVPN. Zastanawiam się nie zaktualizować firmware. Jak coś, to wgrac ten?
http://ecco.selfip.net/gargoyle-pl/back … pgrade.bin
Wydaje mi sie, że zrobiłem. W ustawieniach połączenia Aero2, w zakładce zaawansowane, musiałem zaznaczyć na zezwolenie do łączenia się OpenVPN i jak narazie chodzi. Sprawdzę jeszcze później.
Próbuję skonfigurować klienta Cyberghost na openvpn. Router domowy to Fritz!Box z VDSL na oryginalnym sofcie. Do niego podłączony jest routerek na Gargoyle jako klient WiFi a do portu LAN laptop, którym wprowadzam ustawienia VPN i który po podłączeniu do Fritza ma działać normalnie a po podłączeniu do Gargoyla przez VPN Cybergosta.
Generalnie uzyskuję połączenie i w OpenVPN pokazuje się na zielono przez chwilę, że klient jest podłączony, ale nie udaje mi się uzyskać żadnego połączenia a po chwili w logach systemowych znajduję komunikaty typu:
Gargoyle daemon.err openvpn(custom_config)[7973]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: No route to host (code=148)
Gargoyle daemon.err openvpn(custom_config)[9683]: read UDPv4 [EHOSTUNREACH]: No route to host (code=148)
Podejrzewam jakiś problem z routingiem/firewallem, ale nie mam niestety wystarczającego doświadczenia, żeby rozwiązać powyższy problem. Stąd prośba o pomoc.
Strony Poprzednia 1 … 7 8 9 10 11 12 13 Następna
Zaloguj się lub zarejestruj by napisać odpowiedź
eko.one.pl → Oprogramowanie / Software → Gargoyle 1.5.5, nowy plugin OpenVPN
Forum oparte o PunBB, wspierane przez Informer Technologies, Inc