- Mitglied seit
- 14 Jul 2020
- Beiträge
- 23
- Punkte für Reaktionen
- 1
- Punkte
- 3
Hallo Leute,
ich komme mit meinem Problem nicht weiter. Habe OpenVpn erfolgreich am laufen. Verbindung wird aufgebaut vom Client zur FritzBox ohne Probleme.
Leider erreiche ich über diese Verbindung nur die Fritrzbox. Nichts geht über die Fritzbox raus als wie wenn ab dieser alles geblockt wird. Gleiches Problem hatte ich zuvor mit WireGuard.
Ich poste hier mal meine Einstellungen und Protokolle. Eventuell kann mir jemand den entscheidenden Tip geben.
ich komme mit meinem Problem nicht weiter. Habe OpenVpn erfolgreich am laufen. Verbindung wird aufgebaut vom Client zur FritzBox ohne Probleme.
Leider erreiche ich über diese Verbindung nur die Fritrzbox. Nichts geht über die Fritzbox raus als wie wenn ab dieser alles geblockt wird. Gleiches Problem hatte ich zuvor mit WireGuard.
Ich poste hier mal meine Einstellungen und Protokolle. Eventuell kann mir jemand den entscheidenden Tip geben.
mode server
proto udp4
dev tun
tls-server
port 54201
tun-mtu 1500
mssfix
verb 3
cipher AES-256-CBC
keepalive 10 120
#auth SHA256
#ecdh-curve prime256v1
topology subnet
remote-cert-tls client
#tls-version-min 1.2
#tls-cipher AES256-SHA
#push "redirect-gateway def1"
#client-to-client
#syslog
#askpass "/tmp/flash/openvpn/stdin.txt"
auth-nocache
ca /tmp/flash/openvpn/ca.crt
cert /tmp/flash/openvpn/box.crt
key /tmp/flash/openvpn/box.key
crl-verify /tmp/flash/openvpn/crl.pem
#tls-auth /tmp/flash/openvpn/static.key 0
tls-crypt /tmp/flash/openvpn/static.key
#dh none
dh /tmp/flash/openvpn/dh.pem
user openvpn
group openvpn
#chroot /var/tmp/openvpn
log /var/tmp/debug_openvpn.out
server 10.8.0.0 255.255.255.0
# Set your primary domain name server address for clients
push "dhcp-option DNS 10.8.0.1"
push "block-outside-dns"
# Override the Client default gateway by using 0.0.0.0/1 and
# 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of
# overriding but not wiping out the original default gateway.
push "redirect-gateway def1"
client-to-client
persist-tun
persist-key
proto udp4
dev tun
tls-server
port 54201
tun-mtu 1500
mssfix
verb 3
cipher AES-256-CBC
keepalive 10 120
#auth SHA256
#ecdh-curve prime256v1
topology subnet
remote-cert-tls client
#tls-version-min 1.2
#tls-cipher AES256-SHA
#push "redirect-gateway def1"
#client-to-client
#syslog
#askpass "/tmp/flash/openvpn/stdin.txt"
auth-nocache
ca /tmp/flash/openvpn/ca.crt
cert /tmp/flash/openvpn/box.crt
key /tmp/flash/openvpn/box.key
crl-verify /tmp/flash/openvpn/crl.pem
#tls-auth /tmp/flash/openvpn/static.key 0
tls-crypt /tmp/flash/openvpn/static.key
#dh none
dh /tmp/flash/openvpn/dh.pem
user openvpn
group openvpn
#chroot /var/tmp/openvpn
log /var/tmp/debug_openvpn.out
server 10.8.0.0 255.255.255.0
# Set your primary domain name server address for clients
push "dhcp-option DNS 10.8.0.1"
push "block-outside-dns"
# Override the Client default gateway by using 0.0.0.0/1 and
# 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of
# overriding but not wiping out the original default gateway.
push "redirect-gateway def1"
client-to-client
persist-tun
persist-key
client
dev tun
proto udp4
remote mein.myddns.me 54201
resolv-retry infinite
nobind
remote-cert-tls server
#tls-version-min 1.2
#verify-x509-name raspberrypi-micha_ca7a0a7c-ff72-47ca-9757-f9dfccf2fad3 name
cipher AES-256-CBC
#auth SHA256
auth-nocache
verb 3
ifconfig 10.8.0.1 255.255.255.0
route 192.168.1.0 255.255.255.0
#askpass
#tls-cipher AES256-SHA
<ca>
-----BEGIN CERTIFICATE-----
MIIDaTCCAlGgAwIBAgIUKvQg/z4TjkEU/J8pd84On62POOYwDQYJKoZIhvcNAQEL
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
MIIDbTCCAlWgAwIBAgIRANqob0GKT8T0rx+H3DE4xnAwDQYJKoZIhvcNAQELBQAw
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDFU8Np6m6Djw3D
ewxwddmXKaXRPWQxKaTWYmo0
-----END PRIVATE KEY-----
</key>
<dh>
-----BEGIN DH PARAMETERS-----
MIIBCAKCAQEArpj5FojwffGkD2aobSi+D7wB+v+sQfM0ffFkFH7AIe+Kp+BzIITT
Mr3I4RnlECKIr3DwTXa+InB0YjCPvCWqIwIBAg==
-----END DH PARAMETERS-----
</dh>
<tls-crypt>
-----BEGIN OpenVPN Static key V1-----
c1c6ad6984b2d43b0c9094e731c8af6d
-----END OpenVPN Static key V1-----
</tls-crypt>
dev tun
proto udp4
remote mein.myddns.me 54201
resolv-retry infinite
nobind
remote-cert-tls server
#tls-version-min 1.2
#verify-x509-name raspberrypi-micha_ca7a0a7c-ff72-47ca-9757-f9dfccf2fad3 name
cipher AES-256-CBC
#auth SHA256
auth-nocache
verb 3
ifconfig 10.8.0.1 255.255.255.0
route 192.168.1.0 255.255.255.0
#askpass
#tls-cipher AES256-SHA
<ca>
-----BEGIN CERTIFICATE-----
MIIDaTCCAlGgAwIBAgIUKvQg/z4TjkEU/J8pd84On62POOYwDQYJKoZIhvcNAQEL
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
MIIDbTCCAlWgAwIBAgIRANqob0GKT8T0rx+H3DE4xnAwDQYJKoZIhvcNAQELBQAw
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDFU8Np6m6Djw3D
ewxwddmXKaXRPWQxKaTWYmo0
-----END PRIVATE KEY-----
</key>
<dh>
-----BEGIN DH PARAMETERS-----
MIIBCAKCAQEArpj5FojwffGkD2aobSi+D7wB+v+sQfM0ffFkFH7AIe+Kp+BzIITT
Mr3I4RnlECKIr3DwTXa+InB0YjCPvCWqIwIBAg==
-----END DH PARAMETERS-----
</dh>
<tls-crypt>
-----BEGIN OpenVPN Static key V1-----
c1c6ad6984b2d43b0c9094e731c8af6d
-----END OpenVPN Static key V1-----
</tls-crypt>
Sun Jul 26 14:22:18 2020 OpenVPN 2.4.9 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [AEAD] built on Jul 26 2020
Sun Jul 26 14:22:18 2020 library versions: OpenSSL 1.0.2u 20 Dec 2019, LZO 2.10
Sun Jul 26 14:22:18 2020 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Sun Jul 26 14:22:19 2020 Diffie-Hellman initialized with 2048 bit key
Sun Jul 26 14:22:19 2020 CRL: loaded 1 CRLs from file /tmp/flash/openvpn/crl.pem
Sun Jul 26 14:22:19 2020 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Jul 26 14:22:19 2020 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Jul 26 14:22:19 2020 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Jul 26 14:22:19 2020 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Jul 26 14:22:19 2020 TUN/TAP device tun0 opened
Sun Jul 26 14:22:19 2020 TUN/TAP TX queue length set to 100
Sun Jul 26 14:22:19 2020 /sbin/ip link set dev tun0 up mtu 1500
Sun Jul 26 14:22:19 2020 /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
Sun Jul 26 14:22:19 2020 Socket Buffers: R=[229376->229376] S=[229376->229376]
Sun Jul 26 14:22:19 2020 UDPv4 link local (bound): [AF_INET][undef]:54201
Sun Jul 26 14:22:19 2020 UDPv4 link remote: [AF_UNSPEC]
Sun Jul 26 14:22:19 2020 GID set to openvpn
Sun Jul 26 14:22:19 2020 UID set to openvpn
Sun Jul 26 14:22:19 2020 MULTI: multi_init called, r=256 v=256
Sun Jul 26 14:22:19 2020 IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
Sun Jul 26 14:22:19 2020 Initialization Sequence Completed
Sun Jul 26 14:22:18 2020 library versions: OpenSSL 1.0.2u 20 Dec 2019, LZO 2.10
Sun Jul 26 14:22:18 2020 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Sun Jul 26 14:22:19 2020 Diffie-Hellman initialized with 2048 bit key
Sun Jul 26 14:22:19 2020 CRL: loaded 1 CRLs from file /tmp/flash/openvpn/crl.pem
Sun Jul 26 14:22:19 2020 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Jul 26 14:22:19 2020 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Jul 26 14:22:19 2020 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Jul 26 14:22:19 2020 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Jul 26 14:22:19 2020 TUN/TAP device tun0 opened
Sun Jul 26 14:22:19 2020 TUN/TAP TX queue length set to 100
Sun Jul 26 14:22:19 2020 /sbin/ip link set dev tun0 up mtu 1500
Sun Jul 26 14:22:19 2020 /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
Sun Jul 26 14:22:19 2020 Socket Buffers: R=[229376->229376] S=[229376->229376]
Sun Jul 26 14:22:19 2020 UDPv4 link local (bound): [AF_INET][undef]:54201
Sun Jul 26 14:22:19 2020 UDPv4 link remote: [AF_UNSPEC]
Sun Jul 26 14:22:19 2020 GID set to openvpn
Sun Jul 26 14:22:19 2020 UID set to openvpn
Sun Jul 26 14:22:19 2020 MULTI: multi_init called, r=256 v=256
Sun Jul 26 14:22:19 2020 IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
Sun Jul 26 14:22:19 2020 Initialization Sequence Completed
Sun Jul 26 14:24:45 2020 109.41.195.196:12895 TLS: Initial packet from [AF_INET]109.41.195.196:12895, sid=ef6b7415 aeed5080
Sun Jul 26 14:24:46 2020 109.41.195.196:12895 tls-crypt unwrap error: bad packet ID (may be a replay): [ #2 / time = (1595766285) Sun Jul 26 14:24:45 2020 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Sun Jul 26 14:24:46 2020 109.41.195.196:12895 tls-crypt unwrap error: packet replay
Sun Jul 26 14:24:46 2020 109.41.195.196:12895 TLS Error: tls-crypt unwrapping failed from [AF_INET]109.41.195.196:12895
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 VERIFY OK: depth=1, CN=mein.myddns.me
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 VERIFY KU OK
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 Validating certificate extended key usage
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 VERIFY EKU OK
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 VERIFY OK: depth=0, CN=clientname
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 tls-crypt unwrap error: bad packet ID (may be a replay): [ #6 / time = (1595766285) Sun Jul 26 14:24:45 2020 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 tls-crypt unwrap error: packet replay
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 TLS Error: tls-crypt unwrapping failed from [AF_INET]109.41.195.196:12895
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_VER=3.git::3e56f9a6
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_PLAT=ios
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_NCP=2
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_TCPNL=1
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_PROTO=2
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_IPv6=0
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_AUTO_SESS=1
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.2.0-3253
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_SSO=openurl
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 [clientname] Peer Connection Initiated with [AF_INET]109.41.195.196:12895
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 MULTI: Learn: 10.8.0.2 -> clientname/109.41.195.196:12895
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 MULTI: primary virtual IP for clientname/109.41.195.196:12895: 10.8.0.2
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 PUSH: Received control message: 'PUSH_REQUEST'
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 SENT CONTROL [clientname]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 Data Channel: using negotiated cipher 'AES-256-GCM'
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jul 26 14:24:46 2020 109.41.195.196:12895 tls-crypt unwrap error: bad packet ID (may be a replay): [ #2 / time = (1595766285) Sun Jul 26 14:24:45 2020 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Sun Jul 26 14:24:46 2020 109.41.195.196:12895 tls-crypt unwrap error: packet replay
Sun Jul 26 14:24:46 2020 109.41.195.196:12895 TLS Error: tls-crypt unwrapping failed from [AF_INET]109.41.195.196:12895
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 VERIFY OK: depth=1, CN=mein.myddns.me
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 VERIFY KU OK
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 Validating certificate extended key usage
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 VERIFY EKU OK
Sun Jul 26 14:24:47 2020 109.41.195.196:12895 VERIFY OK: depth=0, CN=clientname
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 tls-crypt unwrap error: bad packet ID (may be a replay): [ #6 / time = (1595766285) Sun Jul 26 14:24:45 2020 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 tls-crypt unwrap error: packet replay
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 TLS Error: tls-crypt unwrapping failed from [AF_INET]109.41.195.196:12895
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_VER=3.git::3e56f9a6
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_PLAT=ios
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_NCP=2
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_TCPNL=1
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_PROTO=2
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_IPv6=0
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_AUTO_SESS=1
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.2.0-3253
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 peer info: IV_SSO=openurl
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sun Jul 26 14:24:48 2020 109.41.195.196:12895 [clientname] Peer Connection Initiated with [AF_INET]109.41.195.196:12895
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 MULTI: Learn: 10.8.0.2 -> clientname/109.41.195.196:12895
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 MULTI: primary virtual IP for clientname/109.41.195.196:12895: 10.8.0.2
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 PUSH: Received control message: 'PUSH_REQUEST'
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 SENT CONTROL [clientname]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 Data Channel: using negotiated cipher 'AES-256-GCM'
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jul 26 14:24:48 2020 clientname/109.41.195.196:12895 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Zuletzt bearbeitet: